node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4 values |
|---|---|---|---|---|
6,685 | 4 | Greynet:greynet within context corporate organizational networks greynet grayware elusive networked computer application downloaded installed end user systems without express permission network administrators often without awareness cognition deeply embedded organization ’ network fabric applications may marginal use user inevitably consume system network resources addition greynet applications often open door end use systems become compromised additional applications security risks malware computer workstations become connected internet variety programs proliferated offer ability extend communications gather deliver information serve needs marketing concerns among first emerge instant messaging clients icq aol instant messenger msn messenger developments technology added video capability webcam units worked together take advantage available bandwidth single small network corporate environments growth greynets takes advantage software hardware developments informal networks appearing provide variety streaming media content supplied modified end users emerging category podcasting users generate content widespread download portable mp3 players problem greynet programs fourfold first greynet programs create network security risks causing broad vectors malware dissemination second create privacy issues network opening large holes information leakage third greynet programs create compliance issues computer network creating invisible parallel communications network fourth create issues local machines consumption local system resources possible operating system program stability concerns things increase network administration time costs added corporate work environment loss meaningful production time due non-work related distractions greynet applications individual network environment policies may vary non-existent full lockdown end user system privileges see risks liabilities section instant messaging detailed overview threats risks solutions problems prevalent greynet programs public im dealing security aspects greynets led emergence specific administrative software packages monitor control traffic well enhancement security suites adware clients among first prevalent specific administrative software packages products secure networks threats borne im p2p networks products first introduced 2002 protect 10 15 u.s. corporations | [
651,
5571
] | Train |
6,686 | 9 | Discriminator:discriminator distributed computing discriminator typed tag field present omg idl discriminated union type value definitions determines union member selected current union instance unlike conventional programming languages offering support unions discriminator idl identical selected field name example idl union type definition effective value register type may contain ax selected field discriminator value may either b stored memory separately therefore idl logically separates information currently selected field name union effective value information current discriminator value example discriminator value may anything following b c well characters belonging idl codice_1 type since codice_2 branch specified example register type allows use remaining characters well microsoft interface definition language also supports tagged unions allowing choose discriminator via attribute enclosing structure function | [
7299,
243,
977
] | Test |
6,687 | 3 | HP_2100:hp 2100 hp 2100 series 16-bit minicomputers produced hewlett-packard hp mid-1960s early 1990s tens thousands machines series sold twenty-five year lifetime making hp fourth largest minicomputer vendor 1970s design started data systems inc dsi originally known dsi-1000 hp purchased company 1964 merged dymec division original model 2116a built using integrated circuits magnetic-core memory released 1966 next four years several new versions released including sub-models c different types memory expansion 2115 2114 cost-reduced versions 2116 models replaced hp 2100 series 1971 21mx series 1974 magnetic-core memory replaced semiconductor memory models also packaged hp 2000 combining 2100-series machine optional components order run basic programming language multi-user time sharing fashion hp time-shared basic popular 1970s many early basic programs written platform notably seminal star trek popular early home computer era people computer company published programs hp 2000 format introduction hp 3000 1974 provided high-end competition 2100 series entire line renamed hp 1000 1977 positioned real-time computers greatly redesigned version introduced 1979 1000 l-series using cmos large scale integration chips introducing desk-side tower case model first version break backward compatibility previous 2100-series expansion cards final upgrade a-series new processors capable 1 mips performance final a990 released 1990 hp formed dynac 1956 act development shop projects main company would normally undertake original logo simply hp logo turned upside forming something approximating dy learning westinghouse owned trademark name 1958 changed dymec company brought in-house 1959 become dymec division november 1967 renamed palo alto division dymec originally made variety products hp family time became primarily integrator building test equipment similar systems used hp 1964 kay magleby paul stoft began experimenting use pdp-5 pdp-8 computers act controllers complex test systems however felt machines would require changes truly suit needs time digital equipment corporation dec still small company takeover target however david packard found ken olsen difficult deal plans went nowhere looking another design could purchase packard led five-person data systems inc. dsi detroit dsi owned union carbide packard asked union carbide came computer company hp labs manager barney oliver replied n't demand answer question bill hewlett initially refused consider development minicomputer packard reframed instrument controller deal approved dsi purchased 1964 initially set dymec four original five employees dsi number employees coming hp instrumentation divisions computer group later moved offices cupertino california building purchased varian associates becoming cupertino division led magleby new division completed design 2116a demonstrated 7–10 november 1966 joint computer conference san francisco one earliest 16-bit minis hit market notable unusual new instrumentation computer highly expandable design real-time support system featured oversized cabinet held 16 expansion cards could expanded 48 cards external expansion cage system launched 20 different instrumentation cards including counters nuclear scalers electronic thermometers digital voltmeters ac/ohms converters data amplifiers input scanners additional set added input/output devices like tape drives printers punched cards paper tape peripherals real-time service provided card slot assigned fixed interrupt vector called appropriate device driver machine entered market quickly became clear selling much rapidly business data processing market originally targeted instrumentation market led introduction 2115a 1967 removed much expansion capabilities make lower-cost offering commercial users simplified version shipped 2114a 1968 eight slots leaving room power supply incorporated main chassis 2115 2114 also lacked extensive dma control 2116 removed mathematical operations ran slightly slower speeds original models using core memory hardwired cpu november 1968 company released 2000a timeshare system later known hp 2000/access based 2116b 2116a expanded 8k core memory running hp time-shared basic used separate 2114 terminal server t-s basic allowed multiple user accounts created 16 users logged newer models 2000 b f used newer versions underlying cpu introduced models used low-end versions cpu terminal server 2000f instance used 2100s main cpu primary storage controller 2100a acted terminal server b c f models dual-processor last version 2000f 2100s 2100a cpu used 2100a connected 32 serial terminals via serial multiplexer interfaces spite relatively high costs — 2000f cost 105,000 1974 — first minicomputer offer time-shared basic made popular early-to-mid 1970s hp 2000 series introduced 1969 sold june 1978 supported 1985 versions many seminal basic games written ported platform notable among mike mayfield star trek 1971 popularity made dialect basic lingua franca many basic listings normally provided format people computer company published programs hp 2000 format 32 users largest configuration hp-2000 part university timesharing life used coursework much somewhat later case decsystem-20 1970s lineup constantly improved new models remained compatible software expansion original 2116 early 1970 fred allard formerly ampex memory core division asked design new magnetic-core memory system systems rather continue purchasing ampex using newer 18 mil cores 22 mil using single sense/inhibit line able fit 8 kw memory onto single expansion card used starting 2116c models 1971 updated 2100a replaced entire existing 211x lineup overall system similar earlier models continued based core memory physically resembled 2114 power supply built-in limited internal expansion however cpu rebuilt microcode could user-programmed added hardware multiply divide added simple memory protection system caused high-priority interrupt triggered two-channel dma controller provided higher throughput optional floating-point unit also available front panel buttons illuminated small incandescent lamps burned use use switched-mode power supply allowed chassis significantly smaller earlier models 1972 hp shipped 4,500 minis making one largest companies market year merged mountain view division made magnetic tape drives cupertino division create data systems division dsd time hp 3000 project serious trouble february 1973 packard sent paul ely take division sales 2100 series remained strong 6000th shipped august 1973 8000th february 1974 10,000th february 1975 declared obsolete 1978 1972 division decided move 4kbit sram memory chips place core twice fast contemporary low-cost core much smaller allowing 32kword machines built 2114-like form factor time made decision 4kbit srams actually available experimental machines using core 2100 series used initially replaced 1kbit sram first appeared 4k parts would available time rest machine upgraded company canvassed various manufacturers found aggressively developing 4k parts particular intel mostek motorola texas instruments suggesting parts would available quantity late 1974 using memories expansion chassis like earlier systems meant room much memory megaword range however cpu use 15-bit addresses limited size 32kwords address desire larger systems hp developed dynamic mapping system dms dms expanded address format 15 20 bits allowing maximum 1,048,576 words dramatic expansion original system changes led 1974 introduction first 21mx series machines stood 21-m processor 21-x memory memory control systems separated cpu order provide flexibility case chosen 4k parts changed production proved useful practice machines shipped memories using either motorola texas instruments parts could mixed single machine higher density system based 16-pin mostek parts could supported replacing normal 21-x/2 controller 21-x/1 entire 2100 series replaced 1974 first 21mx series machines using highest-density parts new machines could support 1.2 mb largest models cpu upgraded 1976 new models became 21mx e-series original models retroactively became 21mx m-series main difference e e used clever timing improve speed twice m. wider variety machine styles released part 21mx series including smaller systems four slots larger ones 9 14 slots 21mx series featured memory management unit semiconductor memory expandable 1,048,576 words one megaword bit displays front panel buttons used small red light-emitting diodes leds instead burnout-prone incandescent bulbs used earlier versions 21mx ran hp rte real time operating system os started refrigerator-sized 19-inch rackmount systems lights switches front panels last models would use 1-chip processor fit desk using console terminal rather front panel new l series models hp-ib interface ability hp systems time blinking led lights removed front panel despite customer demands real-time ability hp r efforts using installable real-time card rte-a os good real-time operations rte 21mx important reason computer hard kill many companies use real-time operations take measurements control processes — turn pump heater valve speed slow motor etc end 1977 entire line renamed hp 1000 becoming hp 1000 m-series hp 1000 e-series next year hp 1000 f-series introduced e-series added floating point unit 1978 success line propelled hp become fourth largest manufacturer minicomputer space trailing dec ibm data general 1980 hp 1000 l-series introduced used new processor based hp large scale integration silicon sapphire process additionally expansion cards also equipped processors allowed access main memory conduct input/output without bothering cpu although made expansion cards incompatible earlier models first time also greatly improved overall performance models lacked memory management unit l-series turn replaced 1982 hp 1000 a-series included new lightning cpu design reached 1 mips even faster magic cpu 3 mips wide variety different models produced including desk-side towers variety different size rack-mount systems low-end a400 model introduced 1986 final high-end a990 released 1990 addressable 32 mb ram 2000 2100 desginations reused hp 2100 designed era ram form magnetic core memory falling dollars pennies per bit implementing processor registers using transistors small-scale integration remained expensive favored designs registers storage ram turn influenced instruction set architecture isa use memory-memory memory-accumulator design basic concept first widely introduced seminal 12-bit pdp-8 spawned many similar designs like 2100 2100 addresses 15-bits long allowing total 32k 16-bit words memory 64kb modern terms smallest addressable unit memory 16-bit word instructions fetch single 8-bit byte address broken two parts 5 significant bits refer one 32 pages 10 least significant bits displacement pointing single word within 1,024-word page dms system 21mx series upper 5 bits instead used select one 32 registers holds 12 bits least significant 10 bits register placed front original 10-bit displacement produce 20-bit address two significant bits used implement memory protection processing handled two b registers 16 bits wide registers also accessible memory locations 0 1 respectively means one load value accumulator using normal register-save operation instance codice_1 load value register memory location 1 thereby copying value b addition b registers cpu also includes register holds current memory address register holds value address p register used program counter automatically incremented every instruction also used base address memory accesses see calculated placed m. also two one-bit registers overflow extend additionally 16-bit witch /d isplay register used input output front panel certain areas memory reserved special purposes like locations 0 1 used accumulators additional words lowest 64-locations memory used direct memory access dma vectored interrupts see later models highest 64 words available memory reserved boot loader original instruction set contained 68 70 instructions 68 instructions standard instruction set 16 bits long execute one memory cycle 16 clock cycles although indirect addressing codice_2 use 36 cycles conditional branching done conditional skip-over-one instruction one instruction normally jump instruction stack subroutines instead first memory location routine reserved return address written location codice_3 instruction means internal support re-entrant code support added via user implemented stack three basic styles instructions isa memory references register references input/output certain models extended isa add-on hardware adding instance floating point instructions additional integer math memory instructions would fall three basic categories memory instructions use four bits instruction two special flags total six bits 16-bit word leaves room 10-bit address instruction stored least significant bits lsbs 0 9 bit 15 set indicates indirect addressing instead direct direct mode address instruction address operand indirect mode address pointer another memory location contained address operand one could set bit 15 location well allowing indirection required depth ending one locations 0 bit 15 addition direct/indirect mode bit 10 instruction controls z/c flag set 0 means address upper five bits zero lower 10 value instruction allows fast access z ero page first 1,024 words memory set 1 address constructed combining 10 bits instruction top 5 bits p register c urrent page memory allowing memory accessed 32 pages 1024 words thus 2,048 words addressed given time 1,024 within page zero another 1,024 within page instruction performing reference register instructions require address thus free bits work used pack four eight instructions single memory word used properly significantly speed operations total 39 register operations included broken shift-and-rotate instructions alter-and-skip instructions indicated bit 10 bit 11 indicates whether applied register b two general classes register instructions shift-and-rotate group alter-and-skip first used basic bitwise manipulation values register four instructions per word although two instructions middle always codice_4 clear e skip a/b zero second group eight instructions perform increments registers conditional branch normally used implement loops input/output instructions normally communicate accumulators instruction format starts bits 1000 significant bits followed single bit indicating register use a=0 b=1 followed 1 h/c flag bit three bits instruction remaining six bits i/o device id channel allowing 64 devices device numbers used system i/o initiated clearing flag bit codice_5 setting c bit using codice_6 hardware notices pattern begins operation operation complete device sets flag bit program loads resulting data card using codice_7 instruction sends card codice_8 actual data transfer normally accomplished using interrupt system memory locations 4 63 decimal hold addresses routines jump interrupt fired providing 60 interrupt levels location 4 7 hard-wired power failures parity check errors later models memory protection errors locations 8 user-accessible interrupt vectors mapped i/o channel arranged priority order i/o device 13 produced interrupt cpu jumps location memory location 13 masked higher-priority interrupt 1 12 another key feature 2100 series separate direct memory access controller uses cycle stealing access memory cpu using times performing internal calculations instance using feature lengthy i/o processes completed cpu works problems system set sending instruction dma controller using i/o commands dma controller channel 6 initially sent instruction containing number i/o device wants use dma whether input write memory device output read memory device starting location memory data number words setup code often installed one interrupt vectors automating process dms separate tables cpu dma system dma load data separate parts extended memory hp supplied three-pass assembler machine using column-delimited format first area left line code label start column 1 present next comes instruction mnemonic parameters rest line used comment assembler allows basic mathematical expressions written directly instead using mnemonics also includes number pseudo-instructions like codice_9 set base address program addition assembler associated linker machines initially shipped fortran 66 compiler operating system i/o drivers time additional languages added including basic algol fortran iv fortran 77 hp ported implementations agl platform added commands basic produce graphics graphics terminals plotters similar expansion fortran called graphics/1000 2100s normally used real time executive operating system rte short several versions rte released different versions machine rte-ii 2114-2116 rte-iii 2100s rte-iv 21mx series rte-a series operating system shell even late 1970s primitive single-level file system file manager fmgr example command run fortran compiler would follows meaning run f77 program using special characters distinguish source file object executable files hp 1000 also one minicomputers restricted file names five characters rather six common time made porting even writing programs challenge later rte-a hp 1000 provided conventional directory structure 16.4 file names made ru command optional tods test oriented disk system developed technician hp board repair center improve turn-around time center used load diagnostics central repository opposed loading individual paper tapes tods also used hp 2116 thru 21mx-f series test systems missiles phoenix 9206b harpoon 9500d-354 tomahawk many others early test sets 9500a evolving 9500d followed ats automated test system specific hp test systems 9500d-a46 minuteman launch component test set ats-e35 peacekeeper/minuteman launch component test set hp 8580/8542 microwave ana/asa automatic network analyzer automated spectrum analyzer ran tods tdrss microwave transponder test set used tods large system also mtos magnetic tape operating system similar tods hp 9810 9820 9830 desktop computers use slow serialized ttl version 2116 cpu although ultimately use operating system application software instead relying user-friendly rom-based interpreters basic work powered integrated keyboards displays rather disks standard terminals 1975 hp introduced bpc one world first 16-bit microprocessors using hp nmos-ii process bpc usually packaged ceramic hybrid module emc ioc chips added extended math i/o instructions hybrid developed heart new 9825 desktop computer later 9845 workstation added mmu chip forerunners personal computers technical workstations major differences original 2116 architecture bpc microprocessor completely redesigned i/o structure removal multiple levels indirect addressing provision stack register subroutine call return elimination multiple indirection made additional bit available memory word containing indirect address allowing maximum memory capacity increased 32k 16-bit words 64k bpc also added input allowing current page relative location current instruction rather power-of-two aligned page bpc used wide range hp computers peripherals test equipment discontinued late 1980s poland manufactured hp 2114b clone since 1973 polish clones called prototype 1973 pilot production 17 machines 1975-1977 production series 150 machines 1978-1987 czechoslovakia produced hp 1000 compatible clones designated 4300 4500 4700 4900 1000 units delivered vendors aritma prague development zpa čakovice zpa trutnov 1973 1990 computers served power plants including nuclear ones industry military universities etc. high reliability real-time features operating systems dos/adt several versions unix oldest hybrid adt7000 1974 composed digital adt4000 analog adt3000 parts digital part interesting customers adt4316 1976 16k words ferrite core memory adt4500 1978 4m words semiconductor ram adt 4900 designed single-board computer mass production start czechoslovak people army used adt based momi 1 momi 2 mobile minicomputers built container carried tatra 148 truck | [
708,
3347,
5012,
3764,
1254,
4662,
4221,
1361,
823,
7541,
5571,
5487,
1015,
1992,
1568,
1570,
3807,
336,
2602,
5962,
3747,
6778,
2163,
2803
] | Test |
6,688 | 4 | SpySubtract:spysubtract spysubtract name anti-spyware application microsoft windows developed intermute maintained trend micro new name trend micro anti-spyware came effect version 3.0 previous versions trend micro branding trend micro anti-spyware later discontinued november 30 2007 replaced trend micro antivirus plus antispyware 2008 program shareware available download 30-day trial previously spysubtract often pre-installed new desktop notebook computers | [
4759,
5571,
7904,
88
] | Test |
6,689 | 7 | Yottaa:yottaa yottaa web mobile optimization services company based waltham massachusetts main product platform helps website conversions well performance security featured publications include xconomy techcrunch boston globe wall street journal yottaa founded 2009 boston coach wei tsinghua university mit alumnus robert buffone studied applied mathematics suny brockport prior yottaa wei founded served chairman nexaweb apart office boston yottaa opened office beijing described anti-lean startup due rather big global team inception coach wei served ceo 2009 late 2014 continues executive chairman robert buffone serve company cto respectively vick viren vaishnavi acts ceo since late 2014 series round 2010 yottaa raised 4 million venture funding general catalyst partners stata venture partners cambridge west ventures build acceleration platform 2012 yottaa named raymie stata former cto yahoo board directors series b round 2012 company raised additional 9 million expand platform technology include monitoring security features following round yottaa masstlc award innovative technology year cloud beating likes acquia basho technologies 16 million raised 2013 round led intel capital also attracting funding previous investors expand sales marketing operations attract enterprise customers equity issuance december 2014 yottaa received 10.45 million early 2015 yottaa moved offices boston waltham massachusetts yottaa developed web mobile optimization platform providing cloud services improve website speed visibility device company initial target group mid-sized enterprises smes yottaa aiming sell platform software service yottaa platform combines adaptive content delivery network dynamic site acceleration web analytics internet security yottaa deals problem website speed software optimization problem instead dealing problem bits movement different places require code changes yottaa platform named context intelligence identifies user location browser device interaction web content sort application content delivery thus modifying web content match end user browsing context context intelligence comprises several components adaptivecdn delivery component appsequencing neutralizing ad-blocking software ensuring websites speed reduced instanton accelerating component contextsafe provides security platform impactanalytics offers web analytics | [
7232,
2789,
4600,
2258,
330,
6092
] | Test |
6,690 | 7 | Univa:univa univa privately held software company develops workload management products manage applications services containers univa software-defined computing infrastructure workload orchestration solutions enable companies scale computer resources across on-premises cloud computing hybrid systems company based chicago offices canada germany univa develops sells supports univa grid engine software univa version grid engine workload distributed resource management technology univa announced january 2011 hired personnel formerly working oracle sun microsystems grid engine development october 2 2014 univa roll new version grid engine new functionality improved scalability performance resource control small large clusters october 22 2013 univa announced acquired intellectual property copyrights trademarks pertaining grid engine technology oracle would support oracle grid engine customers univa announced navops may 2016 new business unit products enable enterprises easily migrate cloud hybrid cloud navops launch migrates hpc workload cloud univa offers consulting services installation tuning configuration products univa founded 2004 name univa corporation carl kesselman ian foster steve tuecke time primarily known providing open source products technical support based around globus toolkit september 17 2007 company announced would merge austin texas-based united devices operate new name univa ud company operated univa ud formally dropping ud returning common use univa corporation leadership current ceo gary tyreman univa announced january 17 2011 hired principal founding engineers grid engine team oct 22 2013 univa announced acquired intellectual property well copyrights trademarks pertaining grid engine technology oracle take supporting oracle grid engine customers june 2014 technical partnership racing point f1 team formerly sahara force india univa announced may 2016 univa announced new business unit navops product line based grid engine cluster workload scheduling technology originally sun microsystems later acquired univa oracle navops line differs univa grid engine enables enterprises easily migrate cloud hybrid could increase efficiencies run containers scale march 2018 univa open sources navops launch née unicloud project tortuga apache 2.0 license | [
7930,
817,
2961,
4159,
1023,
1256,
3155,
1923,
2441,
6068
] | Test |
6,691 | 5 | Virtual_Link_Aggregation_Control_Protocol:virtual link aggregation control protocol virtual lacp vlacp avaya extension link aggregation control protocol provide layer 2 handshaking protocol detect end-to-end failure two physical ethernet interfaces allows switch detect unidirectional bi-directional link failures irrespective intermediary devices enables link recovery less one second vlacp far-end failures detected allows link aggregation trunk fail properly end-to-end connectivity guaranteed certain links internet aggregation group remote link failure detected change propagated partner port | [
883,
4926,
6927,
899,
2534,
7095
] | Train |
6,692 | 5 | EGL_(API):egl api egl interface khronos rendering apis opengl opengl es openvg underlying native platform windowing system egl handles graphics context management surface/buffer binding rendering synchronization enables high-performance accelerated mixed-mode 2d 3d rendering using khronos apis egl managed non-profit technology consortium khronos group acronym egl initialism starting egl version 1.2 refers khronos native platform graphics interface prior version 1.2 name egl specification opengl es native platform graphics interface x.org development documentation glossary defines egl embedded-system graphics library | [
3915,
5571,
7310,
3632,
1284,
7912,
7669,
1435
] | Test |
6,693 | 3 | TIM-600:tim-600 tim-600 important pc computer system series tim microcomputers mihajlo pupin institute-belgrade developed 1987-1988 see ref.lit 1 2 6 based intel microprocessor types 80386 80387 word-length 32 bits basic cycle time 20 mhz operating system unix v.3 ref.lit. 3 6 computer system tim-600 exposed munich international computer exhibition september 1988 fig.1 tim designers tim-600 architecture based three system buses 32 16 8-bits respectively cpu performs 5,000.000 simple operations per second primary memory ram 8 x 2 mb capacity max eight tim terminals equipment units max connected rs-232c centronics types interface used line printers also possibilities connections two hard disks well magnetic cassettes diskettes tim-600 uses programming languages c++ fortran cobol basic pascal data base management performed informix oracle software ref.lit 4 5 6 computer system tim-600 used business data processing many offices serbia example public health scientific organizations process automation industrial production road traffic control banks military government services etc | [
4803,
5948,
7423,
5571,
5347,
7225,
2803
] | Test |
6,694 | 4 | List_of_computer_security_certifications:list computer security certifications credentialing process establishing qualifications licensed professionals organizational members organizations assessing background legitimacy computer security information security fields number tracks professional take demonstrate qualifications four sources categorizing many credentials licenses certifications quality acceptance vary worldwide security credentials well-known high quality examples like master degree field accredited school cissp microsoft certification controversial list many dozens lesser known credentials organizations addition certification obtained taking courses and/or passing exams case cissp others noted demonstrating experience and/or recommended given reference existing credential holder award certificates also given winning government university industry sponsored competitions including team competitions contests scope note article certification credentialing individuals include certification organizations classified computer systems authorizing accrediting approval bodies authorities meeting prescribed set safeguards | [
3932,
6515,
3517,
3681,
3448,
2105,
6004,
651,
2566,
6725,
5485,
1376,
4783,
3794,
5401,
221,
2310,
6823,
7192,
2491,
5149,
6376,
1034,
6756,
6043,
7486,
2789,
74,
7865,
4646,
3680,
1805
] | Test |
6,695 | 9 | B32_Business_Basic:b32 business basic b32 business basic competitor data general business basic written murray haszard 1986 ran data general eclipse mv line computers initially ported unix 1989 dos 1991 b32 software company developed supported b32 business basic original site auckland new zealand supplemented sales support centre blue ash ohio b32 interpreter highly compatible data general business basic dgbb also enhanced extended language many ways like dgbb b32 could access data general infos ii database could use dgbb lock server improved version b32 twice fast number crunching string manipulation disk i/o many internal restrictions dgbb removed b32 allowed 32,767 line numbers 65,535 later versions compared dgbb 9,999 b32 allowed memory programs simultaneous locks files open language enhancements included high-speed internal sort routine do-while blocks ability step backwards indexed file debugging facilities also significantly improved dgbb b32 allowed programs run full cursor positioning attribute support non-data general terminals even programs data general control sequences hard-coded b32 carried arithmetic quad precision i.e 64-bit emulated triple precision double precision versions dgbb runtime avoided subtle incompatibilities two versions dgbb unix dos b32 emulated commonly used system calls data general aos/vs rdos operating systems including implementing symbolic links sco xenix dos 1991 features war b32 one competitors transoft universal business basic saw major improvements b32 language b32 added bluebird business basic emulation mode made line numbers optional added subroutine calls name parameter passing transoft greater financial resources b32 effective marketing purchased b32 1992 dos unix versions b32 discarded universal business basic ran operating systems eclipse mv version b32 continued sold mv line lasted b32 software staff blue ash moved transoft atlanta georgia office new zealand staff went found binary research | [
4751
] | Train |
6,696 | 2 | Windows_RSS_Platform:windows rss platform windows rss platform included internet explorer 7 later windows vista later platform exposes feed handling management windows applications rss support internet explorer built windows rss platform windows rss platform consists three components start | [
7149,
6420,
714,
720,
5378,
1460,
7176,
2928,
7907,
5747,
2953,
6840,
422,
6495,
4017,
6504,
4022,
4026,
7607,
1526,
458,
3687,
2283,
5479,
7263,
5850,
150,
6933,
1970,
519,
3052,
4448,
3407,
1232,
2702,
7687,
1989,
4848,
555,
4129,
807... | Test |
6,697 | 2 | Android_Jelly_Bean:android jelly bean android jelly bean tenth version android codename given three major point releases android mobile operating system developed google spanning versions 4.1 4.3.1 operating systems run android 4.3/4.4 asus nexus 7 2013 first three 4.1 unveiled google i/o developer conference june 2012 focusing performance improvements designed give operating system smoother responsive feel improvements notification system allowing expandable notifications action buttons internal changes two releases made jelly bean name october 2012 july 2013 respectively including 4.2—which included optimizations multi-user support tablets lock screen widgets quick settings screen savers 4.3—contained improvements updates underlying android platform jelly bean versions longer supported google statistics issued google indicate 3.2 android devices accessing google play run jelly bean android 4.1 jelly bean first unveiled google i/o developer conference june 27 2012 focus delightful improvements platform user interface along improvements google search experience platform knowledge graph integration new digital assistant google unveiling asus-produced nexus 7 tablet unveiling nexus q media player jelly bean work made optimizing operating system visual performance responsiveness series changes referred project butter graphical output triple buffered vsync used across drawing operations cpu brought full power touch input detected—preventing lag associated inputs made processor low-power state changes allow operating system run full 60 frames per second capable hardware following 4.1 two android releases made jelly bean codename releases focused primarily performance improvements changes android platform contained relatively user-facing changes alongside android 4.1 google also began decouple apis services android new system-level component known google play services serviced google play store allows addition certain forms functionality without distribute upgrade operating system addressing infamous fragmentation problems experienced android ecosystem attendees google i/o conference given nexus 7 tablets pre-loaded android 4.1 galaxy nexus smartphones could upgraded 4.1 google announced intent release 4.1 updates existing nexus devices motorola xoom tablet mid-july android 4.1 upgrade released general public gsm galaxy nexus models july 10 2012 late 2012 following official release jelly bean number third-party android oems began prepare distribute updates 4.1 existing smartphones tablets including devices acer htc lg motorola samsung sony toshiba august 2012 nightly builds aftermarket firmware cyanogenmod based 4.1 branded cyanogenmod 10 began released selected devices including nexus devices nexus galaxy nexus samsung galaxy galaxy ii galaxy tab 2 7.0 motorola xoom asus transformer october 29 2012 google unveiled android 4.2 dubbed sweeter tasting jelly bean alongside accompanying launch devices nexus 4 nexus 10 firmware updates nexus 7 galaxy nexus released november 2012 android 4.3 subsequently released july 24 2013 via firmware updates galaxy nexus 2012 nexus 7 nexus 4 nexus 10 visually jelly bean interface reflects refinement holo appearance introduced android 4.0 default home screen jelly bean received new features ability shortcuts widgets home screen page re-arrange fit item moved resized notification system also improved addition expandable actionable notifications individual notifications display additional content action buttons call back message missed call accessible dragging open notification two finger gesture notifications also disabled individually per-app android 4.2 added additional features user interface lock screen swiped left display widget pages swiped right go camera pane quick settings toggles feature often seen oem android skins also added notification area—accessible either swiping two fingers phones swiping top-right edge screen tablets pressing button top-right corner notifications pane previous browser application officially deprecated 4.2 favor google chrome android 4.2 also adds gesture typing keyboard redesigned clock app new screen saver system known daydreams tablets android 4.2 also supports multiple users promote consistency device classes android tablets use expanded version interface layout home screen used phones default centered navigation keys status bar across top changes took effect small tablets nexus 7 4.1 larger tablets 4.2 small tablets android optimized primarily use portrait vertical orientation giving apps expanded versions layouts used phones used landscape horizontal orientation apps adjust widescreen-oriented layouts seen larger tablets large tablets navigation buttons previously placed bottom-left bar along bottom screen clock notification area bottom-right developers 4.1 also added new accessibility apis expanded language support bi-directional text support user-supplied keymaps support managing external input devices video game controllers support multichannel usb gapless audio new media routing api low-level access hardware software audio video codecs dns-based service discovery pre-associated service discovery wi-fi android beam also used initiate bluetooth file transfers near-field communication android 4.2 added rewritten bluetooth stack changing previous bluez stack gpl originated qualcomm rewritten broadcom open source stack called bluedroid new stack initially considered immature promised several forward-looking benefits including improved support multiple displays support miracast native right-to-left support updated developer tools accessibility improvements zooming gestures number internal security improvements always-on vpn support app verification new nfc stack added time android 4.3 consisted low-level changes including bluetooth low energy avrcp support selinux opengl es 3.0 new digital rights management drm apis ability apps read notifications vp8 encoder improvements android 4.3 also included hidden privacy feature known app ops allowed users individually deny permissions apps however feature later removed android 4.4.2 google spokesperson stated feature experimental could prevent certain apps functioning correctly used certain ways concept revisited basis redesigned notifications system android 6.0 | [
3933,
5372,
6427,
1095,
740,
4340,
42,
3309,
3310,
7924,
2591,
5771,
5775,
6153,
7956,
6874,
5455,
6176,
5473,
474,
6183,
822,
831,
5141,
1202,
6916,
136,
2317,
2673,
6209,
1582,
2683,
855,
6937,
168,
6232,
6950,
2712,
4116,
5195,
2003,... | Train |
6,698 | 3 | Penryn_(microarchitecture):penryn microarchitecture intel tick-tock cycle 2007/2008 tick shrink core microarchitecture 45 nanometers cpuid model 23 core 2 processors used code names penryn socket p wolfdale lga 775 yorkfield mcm lga 775 also sold celeron pentium xeon processors xeon brand wolfdale-dp harpertown code names used lga 771 based mcms two four active wolfdale cores architectural improvements 65 nanometer core 2 cpus include new divider reduced latency new shuffle engine sse4.1 instructions enabled new single-cycle shuffle engine maximum l2 cache size per chip increased 4 6 mb l2 associativity increased 16-way 24-way cut-down versions 3 mb l2 also exist commonly called penryn-3m wolfdale-3m well yorkfield-6m respectively single-core version penryn listed penryn-l separate model like merom-l version penryn-3m model one active core processors core microarchitecture categorized number cores cache size socket combination unique code name product code used across number brands instance code name allendale product code 80557 two cores 2 mb l2 cache uses desktop socket 775 marketed celeron pentium core 2 xeon different sets features enabled mobile desktop processors come two variants differ size l2 cache specific amount l2 cache product also reduced disabling parts production time wolfdale-dp quad-core processors except dunnington qc multi-chip modules combining two dies 65 nm processors product code shared processors different dies specific information one used derived stepping model 23 cpuid 01067xh intel started marketing stepping full 6 mib reduced 3 mib l2 cache time giving identical cpuid values steppings new sse4.1 instructions stepping c1/m1 bug fix version c0/m0 specifically quad core processors used stepping e0/r0 adds two new instructions xsave/xrstor replaces earlier steppings mobile processors stepping c0/m0 used intel mobile 965 express santa rosa refresh platform whereas stepping e0/r0 supports later intel mobile 4 express montevina platform model 29 stepping a1 cpuid 106d1h adds l3 cache well six instead usual two cores leads unusually large die size 503 mm² february 2008 found way high-end xeon 7400 series dunnington | [
2449,
2814,
5802,
6332,
6793,
3942,
3849,
4765,
6170,
3443,
6344,
4108,
4314,
1465,
1841,
7449,
7453,
3020,
7364,
3717,
5669,
5670,
4968,
3803,
6647,
1867,
3565,
4077,
4985,
766,
691,
5343,
6057,
4098,
7499,
352,
6152,
2351,
2977,
3248
] | Validation |
6,699 | 2 | Windows_Advanced_Rasterization_Platform:windows advanced rasterization platform windows advanced rasterization platform warp software rasterizer component directx graphics runtime windows 7 later available windows vista windows server 2008 platform update windows vista warp used compatible hardware available kernel mode applications headless environment remote rendering direct2d/directwrite remote desktop connection clients warp full-featured direct3d 10.1 renderer device performance par current low-end graphics cards intel gma 3000 running multi-core cpus achieve level rendering performance warp employs advanced techniques just-in-time compilation x86 machine code support advanced vector extensions sse2 sse4.1 warp supports direct3d 11 runtime compatible feature levels 10_1 10_0 9_3 9_2 9_1 direct3d 11.1 runtime warp additionally supports feature levels 11_0 11_1 windows 8 warp provides functionality microsoft basic render driver replaces kernel-mode vga driver windows 8.1 warp updated support feature level 11_1 tiled resources windows 10 warp updated support direct3d 12 feature level 12_1 direct3d 12 warp also replaces reference rasterizer | [
4022,
7149,
4026,
7607,
1526,
6696,
458,
3687,
4759,
4848,
6420,
714,
2283,
4129,
3598,
8073,
7438,
720,
6000,
6002,
1460,
2018,
5479,
6989,
6991,
7263,
2928,
8094,
5747,
1755,
4156,
930,
590,
5321,
2953,
4077,
6840,
150,
422,
7029,
519... | Test |
6,700 | 7 | Deutsche_Börse_Cloud_Exchange_AG:deutsche börse cloud exchange ag deutsche börse cloud exchange ag dbce joint venture established may 2013 deutsche börse ag zimory gmbh operates international marketplace buying selling cloud resources users marketplace either cover additional storage computing requirements offer iaas capacities begin february 2016 dbce publicly announced discontinuing operations march 2016 website www.cloud.exchange following message deutsche börse cloud exchange discontinues operations dear visitor shareholders deutsche börse cloud exchange decided cease operations marketplace evaluating business model approach company ended registration new users marketplace january 18 existing contracts fulfilled expire accordance individual agreements public marketplace scheduled retired march 2016 thank interest cooperation support please contact us directly case questions dbce team vendor-agnostic iaas marketplace dbce functions neutral intermediary cloud providers cloud users marketplace providers offer infrastructure resources cpu storage ram service side buyers opportunity search buy subsequently use appropriate iaas offers providers access marketplace reserved companies open private individuals marketplace dbce platform worldwide iaas resources compared purchased used paid standardized basis makes individual offers providers directly comparable creating transparency buyer 2013 dbce established joint venture deutsche börse ag zimory gmbh beginning 2014 marked beta launch cloud marketplace various providers already linked services marketplace official launch marketplace may 20 2015 start five providers various european countries offered iaas resources via dbce contrast marketplaces cloud services dbce seeks make available vendor-agnostic cloud resources procured via marketplace means system behind trading platform offers central interface api standard cloud technologies enables provision purchased resources independent technologies used customers therefore enables companies liberate proprietary systems order guarantee quality security services dbce cooperation tüv rheinland developed special testing procedure providers prerequisite access marketplace existing suppliers marketplace annual review various parameters conducted including performance services offered well modifications storage location servers marketplace based consistent standardization concept addition standardized seek buy procedure agreements buyers dbce standardized well intended accelerate normally drawn-out contract negotiations providers users cloud sector dbce acts controlling entity thus ensures certain security compliance procedures always upheld services traded via marketplace also standardized order enable comparison individual provider offers storage available blocks 100 gigabytes memory gibibytes compute resources dbce introduced performance unit pu dbce differentiates cloud providers different cpu offers normally difficult compare dbce specifies pu defined standard cpu offers marketplace means matter provider buyer procuring cpu resources via marketplace pu always delivers comparable performance independent underlying hardware dbce 49 employees comprising experts cloud computing industry financial sector members management board deutsche börse cloud exchange ag randolf roth maximilian ahrens | [] | Test |
6,701 | 8 | CakePHP:cakephp cakephp open-source web framework follows model–view–controller mvc approach written php modeled concepts ruby rails distributed mit license cakephp uses well-known software engineering concepts software design patterns convention configuration model–view–controller active record association data mapping front controller cakephp started april 2005 polish programmer michal tatarynowicz wrote minimal version rapid application development framework php dubbing cake published framework mit license opened online community developers december 2005 l. masters g. j. woodworth founded cake software foundation promote development related cakephp version 1.0 released may 2006 one project inspirations ruby rails using many concepts community since grown spawned several sub-projects october 2009 project manager woodworth developer n. abele resigned project focus projects including lithium web framework previously part cakephp project remaining development team continued focus original roadmap previously defined cake software foundation operates annual conference focusing cakephp called cakefest initially held bi-annual event 2008 | [
2451,
3684,
2180,
5983,
4296,
1445,
1819,
103,
6428,
7347,
1737,
4944,
6095,
2740,
3368,
1643,
5571,
5575,
486,
6191,
3543,
6029,
933,
417,
54,
7848,
2870,
4535,
7933,
5433,
5965,
4998,
3915,
6061,
2619,
5092
] | Test |
6,702 | 4 | Index_of_coincidence:index coincidence cryptography coincidence counting technique invented william f. friedman putting two texts side-by-side counting number times identical letters appear position texts count either ratio total normalized dividing expected count random source model known index coincidence ic short index coincidence provides measure likely draw two matching letters randomly selecting two letters given text chance drawing given letter text number times letter appears length text chance drawing letter without replacement appearances 1 text length 1 product two values gives chance drawing letter twice row one find product letter appears text sum products get chance drawing two kind probability normalized multiplying coefficient typically 26 english express index coincidence ic given letter-frequency distribution summation n length text n n frequencies integers c letters alphabet c 26 monocase english sum n necessarily n products count number combinations n elements taken two time actually counts pair twice extra factors 2 occur numerator denominator formula thus cancel n occurrences -th letter matches remaining occurrences letter total letter pairs entire text 1/ c probability match pair assuming uniform random distribution characters null model see thus formula gives ratio total number coincidences observed total number coincidences one would expect null model expected average value ic computed relative letter frequencies source language letters alphabet equally probable expected index would 1.0 actual monographic ic telegraphic english text around 1.73 reflecting unevenness natural-language letter distributions sometimes values reported without normalizing denominator example english values may called κ kappa-plaintext rather ic κ kappa-random used denote denominator expected coincidence rate uniform distribution alphabet english index coincidence useful analysis natural-language plaintext analysis ciphertext cryptanalysis even ciphertext available testing plaintext letter identities disguised coincidences ciphertext caused coincidences underlying plaintext technique used cryptanalyze vigenère cipher example repeating-key polyalphabetic cipher arranged matrix coincidence rate within column usually highest width matrix multiple key length fact used determine key length first step cracking system coincidence counting help determine two texts written language using alphabet technique used examine purported bible code causal coincidence count texts distinctly higher accidental coincidence count texts different languages texts using different alphabets gibberish texts see imagine alphabet two letters b suppose language letter used 75 time letter b used 25 time two texts language laid side side following pairs expected overall probability coincidence 62.5 56.25 aa 6.25 bb consider case messages encrypted using simple monoalphabetic substitution cipher replaces b vice versa overall probability coincidence situation 62.5 6.25 aa 56.25 bb exactly unencrypted plaintext case effect new alphabet produced substitution uniform renaming original character identities affect whether match suppose one message say second encrypted using substitution cipher b → b following pairs expected probability coincidence 37.5 18.75 aa 18.75 bb noticeably lower probability same-language same-alphabet texts used evidently coincidences likely frequent letters text principle applies real languages like english certain letters like e occur much frequently letters—a fact used frequency analysis substitution ciphers coincidences involving letter e example relatively likely two english texts compared coincidence count higher english text foreign-language text used easily imagined effect subtle example similar languages higher coincidence count dissimilar languages also n't hard generate random text frequency distribution similar real text artificially raising coincidence count nevertheless technique used effectively identify two texts likely contain meaningful information language using alphabet discover periods repeating keys uncover many kinds nonrandom phenomena within among ciphertexts expected values various languages description introduction use index coincidence related general concept correlation various forms index coincidence devised delta i.c given formula effect measures autocorrelation single distribution whereas kappa i.c used matching two text strings although applications constant factors formula_4 formula_5 ignored general situations considerable value truly indexing i.c value expected null hypothesis usually match uniform random symbol distribution every situation expected value correlation 1.0 thus form i.c expressed ratio number coincidences actually observed number coincidences expected according null model using particular test setup foregoing easy see formula kappa i.c formula_5 common aligned length two texts b bracketed term defined 1 formula_8-th letter text matches formula_8-th letter text b otherwise 0 related concept bulge distribution measures discrepancy observed i.c null value 1.0 number cipher alphabets used polyalphabetic cipher may estimated dividing expected bulge delta i.c single alphabet observed bulge message although many cases repeating key used better techniques available practical illustration use i.c. suppose intercepted following ciphertext message suspecting english plaintext encrypted using vigenère cipher normal a–z components short repeating keyword consider ciphertext stacked number columns example seven key size happens assumed number columns letters within single column enciphered using key letter effect simple caesar cipher applied random selection english plaintext characters corresponding set ciphertext letters roughness frequency distribution similar english although letter identities permuted shifted constant amount corresponding key letter therefore compute aggregate delta i.c columns delta bar around 1.73 hand incorrectly guessed key size number columns aggregate delta i.c around 1.00 compute delta i.c assumed key sizes one ten see key size likely five actual size five would expect width ten also report high i.c. since columns also corresponds simple caesar encipherment confirm stack ciphertext five columns try determine likely key letter column considered separately performing trial caesar decryption entire column 26 possibilities a–z key letter choosing key letter produces highest correlation decrypted column letter frequencies relative letter frequencies normal english text correlation n't need worry normalizing readily computed formula_11 observed column letter frequencies formula_12 relative letter frequencies english try best-fit key letters reported codice_1 recognize actual word using vigenère decryption produces plaintext one obtains word divisions restored obvious positions codice_2 evidently null characters used pad final group transmission entire procedure could easily packaged automated algorithm breaking ciphers due normal statistical fluctuation algorithm occasionally make wrong choices especially analyzing short ciphertext messages | [
6049,
4614,
2566,
3829,
1353
] | Test |
6,703 | 8 | Varnish_(software):varnish software varnish http accelerator designed content-heavy dynamic web sites well apis contrast web accelerators squid began life client-side cache apache nginx primarily origin servers varnish designed http accelerator varnish focused exclusively http unlike proxy servers often support ftp smtp network protocols varnish used websites including wikipedia online newspaper sites new york times guardian gulf news hindu corriere della sera social media content sites facebook twitter reddit spotify vimeo tumblr 2012 5 top 10,000 sites web used software project initiated online branch norwegian tabloid newspaper verdens gang architect lead developer danish independent consultant poul-henning kamp well-known freebsd core developer management infrastructure additional development originally provided norwegian linux consulting company linpro support management development varnish later spun separate company varnish software varnish free open source software available two-clause bsd license commercial support available varnish software amongst others version 1.0 varnish released 2006 varnish 2.0 2008 varnish 3.0 2011 varnish 4.0 2014 varnish 5.0 2016 varnish 6.0 march 2018 varnish stores data virtual memory leaves task deciding stored memory gets paged disk operating system helps avoid situation operating system starts caching data moved disk application varnish heavily threaded client connection handled separate worker thread configured limit number active worker threads reached incoming connections placed overflow queue queue reaches configured limit incoming connections rejected principal configuration mechanism varnish configuration language vcl domain-specific language dsl used write hooks called critical points handling request policy decisions left vcl code making varnish configurable adaptable http accelerators vcl script loaded translated c compiled shared object system compiler loaded directly accelerator thus reconfigured without restart number run-time parameters control things maximum minimum number worker threads various timeouts etc command-line management interface allows parameters modified new vcl scripts compiled loaded activated without restarting accelerator order reduce number system calls fast path minimum log data stored shared memory task monitoring filtering formatting writing log data disk delegated separate application varnish designed reduce contention threads minimum authors claim performance good system pthreads implementation additionally slow malloc implementation like ones microsoft windows msvcrt may add unnecessary contention thereby limit performance hence general recommendation running varnish linux unix based environments varnish cache speed information delivery factor several hundred ensure proper operation performance varnish exposes metrics monitored following areas varnish cache ships monitoring logging tools one used varnishstat gives detailed snapshot varnish ’ current performance provides access in-memory statistics cache hits misses resource consumption threads created running varnishstat command line returns continuously updating list available varnish metrics -1 flag added varnishstat exit printing list one time varnishstat used standalone tool spot-check health cache order graph metrics time correlate statistics across infrastructure set alerts problems may arise monitoring services integrate varnish collect varnishstat metrics varnishlog tool used debug tune varnish configuration provides detailed information individual request varnish supports load balancing using round robin random director per-backend weighting basic health-checking backends also available varnish cache also features | [
4759,
8066,
1640,
2291,
5571,
6908,
578,
841,
3219,
6477,
6489,
4828,
3338,
1435
] | Test |
6,704 | 9 | FarCry_CMS:farcry cms farcry cms popular open-source content management system cfml built farcry core addition standard cms features menu management system administration page layout customization farcry features also include farcry framework actively maintained daemon internet consultants | [
3186,
6095,
3915,
2456,
5571,
103,
5490,
2752,
3543,
6362
] | Test |
6,705 | 2 | IBM_8100_DPCX:ibm 8100 dpcx dpcx distributed processing control executive operating system ibm 8100 small computer system ibm hoped would help installed base ibm 3790 customers migrate 8100 dppx operating system mainly deployed support word processing system distributed office support facility dosf derived earlier ibm 3730 word processing system like dppx written pl/s-like pl/ds language applications including much dosf however written interpreted language compiled using system/370 assembler macro facility 8100/dpcx/dosf system first type distributed system connect ibm distributed office support system disoss running data host later versions disoss relied sna distribution system snads eventually became peer-to-peer communication documents complied document interchange architecture dia document content architecture dca types distributed system gained disoss support – scanmaster displaywriter 5520 office system | [
1522,
4291,
7605,
8173,
7172,
5571,
4421,
402,
6025,
839,
4428,
2786,
607,
2431,
3664,
4544,
6849,
265,
1516,
1994
] | Test |
6,706 | 2 | Workgroup_(computer_networking):workgroup computer networking workgroup microsoft term peer-to-peer local area network computers running microsoft operating systems workgroup may share files printers internet connection workgroup contrasts domain computers rely centralized authentication | [
1710,
6025,
5480,
458,
4759,
170,
5571,
5637
] | Train |
6,707 | 2 | Carrier_Grade_Linux:carrier grade linux carrier grade linux cgl set specifications detail standards availability scalability manageability service response characteristics must met order linux kernel-based operating system considered carrier grade i.e ready use within telecommunications industry term particularly applicable telecom converges technically data networks commercial off-the-shelf commoditized components blade servers carrier-grade term public network telecommunications products require 5 nines 6 nines 99.999 99.9999 percent availability translates downtime per year 30 seconds 6 nines 5 minutes 5 nines term 5 nines usually associated carrier-class servers 6 nines usually associated carrier-class switches primary motivation behind cgl effort present open architecture alternative closed proprietary software proprietary hardware systems currently used telecommunication systems proprietary systems monolithic hardware software applications integrated tightly operate well unit however hard maintain scale telecommunications companies utilize services vendor even relatively minor enhancements system cgl seeks progressively reduce eliminate dependence proprietary systems provide path easy deployment scalability utilizing cheap cots systems assemble telecommunications system cgl effort started open source development lab cgl working group specification combined linux foundation latest specification release cgl 5.0 several cgl-registered linux distributions exist including montavista wind river systems red flag linux osdl cglwg defines three main types applications carrier-grade linux support — gateways signaling servers management | [
3256,
2182,
3613,
7528,
7532,
5744,
6443,
2942,
6117,
4341,
5762,
412,
415,
3666,
2970,
5447,
7956,
5453,
5460,
7242,
1535,
1924,
6892,
1176,
1933,
5829,
1208,
6211,
4435,
5865,
7669,
3404,
1227,
1596,
165,
7312,
1607,
5884,
1991,
890,
... | Test |
6,708 | 9 | Trace_scheduling:trace scheduling trace scheduling optimization technique developed josh fisher used compilers computer programs compiler often rearranging generated machine instructions faster execution improve program performance increases ilp instruction level parallelism along important execution path statically predicting frequent execution path trace scheduling one many known techniques trace sequence instructions including branches including loops executed input data trace scheduling uses basic block scheduling method schedule instructions entire trace beginning trace highest frequency adds compensation code entry exit trace compensate effects order execution may result large increases code sizes poor erratic performance program behavior varies significantly input trace scheduling originally developed long instruction word vliw machines form global code motion works converting loop long straight-line code sequence using loop unrolling static branch prediction process separates unlikely code adds handlers exits trace goal common case executed sequential set instructions without branches | [
1854,
4154
] | Test |
6,709 | 9 | Unreferenced_variable:unreferenced variable unreferenced variable source code computer program variable defined never used may result harmless waste memory many compilers detect variables allocate storage i.e. optimize away storage generally also issuing warning coding guideline documents consider unreferenced variable symptom potential coding fault hand unreferenced variables used temporary placeholders indicate expected future developments code c example j unreferenced variable | [
1361,
1435
] | Test |
6,710 | 4 | Corporate_Emergency_Access_System:corporate emergency access system corporate emergency access system ceas credentialing program united states company critical employees event disaster serious emergency employees show ceas id cards first responders admitted business location ceas helps businesses mitigate damage loss resulting allowing rapid access restricted areas ceas helps businesses mitigate damage loss allowing critical employees rapid access restricted areas allows rapidly recover essential operations retrieve assets securities valuables vital records computer hardware critical equipment core systems also conduct damage assessments ceas developed new york state 1990s business network emergency resources not-for-profit organization pioneered emergency-identification-card-based capability ceas access system adopted boston cambridge massachusetts chester county philadelphia pennsylvania erie nassau suffolk counties new york new york city baltimore stamford connecticut order businesses enroll ceas local municipalities must adopt ceas program receive id cards local authorities implement ceas following emergency immediate threats life stabilized participating businesses select pre-determined number employees receive ceas access id cards based total employee population | [] | Test |
6,711 | 2 | XigmaNAS:xigmanas xigmanas network-attached storage nas server software dedicated management web interface written php free software terms simplified bsd license xigmanas continuation original freenas code developed 2005 late 2011 released name nas4free 22 march 2012 name changed xigmanas july 2018 sourceforge elected “ 'community choice project month ” twice august 2015 march 2017 respectively xigmanas embedded open-source nas software distribution based latest release freebsd developed original freenas 7 code updated work current latest freebsd releases however xigmanas preserves freenas ’ original m0n0wall/php architecture introduces experimental support arm architecture xigmanas supports sharing across windows apple unix-like systems includes zfs v5000 software raid 0,1,5 disk encryption s.m.a.r.t email reports etc. following protocols smb samba active directory domain controller ad ftp nfs tftp afp rsync unison file synchronizer iscsi initiator target hast carp bridge upnp bittorrent configurable web interface xigmanas installable almost boot media including livecd optionally small usb flash drive config storage necessary x86-64 x86-32 computer platforms version 10.3 version 11.0 xigmanas longer supports x86-32 version 10.3 still getting updates xigmanas installed compact flash usb flash drive ssd hard drive bootable devices supports advanced formatted drives using 4 kb sectors booted livecd liveusb software distribution currently distributed iso image .iso ~370 mb usb flash drive image .img ~320 mb format source form special small footprint embedded image also available .img ~150 mb preferred method embedded installation onto usb stick compact flash card cf hard disk hdd/ssd xigmanas designed xigmanas os load system memory eliminating system writes drive flash devices energy efficient updating process done webgui browser downloading installing new firmware image original freenas project derives m0n0wall freenas 0.7 branch end-of-life 'd late 2011 freenas name legally acquired ixsystems inc starting version 8.x new ixsystems developers rewrote freenas legacy freenas 0.7 longer available download legacy freenas 0.7 code unable developed longer name name change necessary founder freenas olivier cochard-labbé donated original freenas source code nas4free project support former developers namely daisuke aoyama michael zoon carries original freenas code base freenas 8.x.y software fork original freenas new rewritten code-base continuing old branded name 2018 project applied xigmanas trademark order protect brand prior release v11.2 | [
4295,
7514,
732,
3636,
5760,
3986,
5065,
6477,
765,
424,
6489,
2254,
6149,
5440,
6860,
6505,
4382,
1523,
1534,
1547,
481,
2300,
1193,
4059,
8001,
499,
6918,
6211,
4806,
5859,
4441,
5865,
6583,
8037,
875,
1254,
191,
4498,
7355,
3457,
557... | Test |
6,712 | 9 | Second-generation_programming_language:second-generation programming language second-generation programming language 2gl generational way categorize assembly languages term coined provide distinction higher level machine independent third-generation programming languages 3gl cobol earlier first-generation programming languages machine code second-generation programming languages following properties second-generation languages sometimes used parts kernels device drivers sometimes used video games graphics programs intensive programs modern programs second generation assembly languages rarely used second generation languages may advantages mainly speed programming low level assembly language downsides downsides requirements programmers lead decline assembly vast majority programs written third-generation programming language fourth-generation programming language assembly main advantage speed degraded fact well written c code often fast even faster hand written assembly second generation languages perhaps significant place computing history long time second generation assembly languages good option development many machines nes commodore 64 second generation languages represented massive step away tradition programmers conforming needs machine first step towards machine accommodating programmer phenomenon would repeated subsequent programming language generations | [
6507,
1908,
3944,
3852,
3966,
214,
1435,
1102,
7557,
2866,
4078,
336,
5171,
6497,
6498,
1803,
5190
] | Validation |
6,713 | 3 | Shanghai_(video_game):shanghai video game shanghai computerized version mahjong solitaire published activision 1986 amiga atari st atari 8-bit family commodore 64 ibm pc macintosh apple iigs master system shanghai originally programmed brodie lockard winning game tiles reveal three-dimensional blinking eye dragon behind game screen macintosh master system versions show animated dragon spitting fire shanghai sold 500,000 copies 1991 computer gaming world december 1986 published varying opinions gregg williams stated could n't believe activision wasted resources putting charles ardai called probably best game year info gave amiga version four-plus stars five stating program ought illegal impossible play 'just one game describing gameplay swift deceptively simple magazine warned plan spending lot time one gave commodore 64 version three-plus stars five describing shanghai fanatically addictive criticizing user interface graphics magazine concluded 'll find hard quit compute reviewed game favorably reporting shanghai mania proportions beginning fear health 1988 dragon gave game 5 5 stars 1996 computer gaming world declared shanghai 146th-best computer game ever released dragon magazine also gave atari lynx version 5 stars may 1992 issue robert jung ign gave game score 10 10 review cvg magazine reviewed game march 1991 issue giving score 84 100 sequel shanghai ii dragon eye published 1990 ms-dos ports released macintosh fm towns msx pc-98 sharp x68000 windows sega genesis super nes genesis version re-released wii virtual console pal regions november 27 2009 north america january 11 2010 later delisted end 2013 | [
6380,
3421,
4277,
6939,
2934,
63
] | Train |
6,714 | 8 | Service_choreography:service choreography service choreography form service composition interaction protocol several partner services defined global perspective idea underlying notion service choreography summarised follows dancers dance following global scenario without single point control run-time participant service choreography executes part according behavior participants choreography role specifies expected messaging behavior participants play terms sequencing timing messages consume produce choreography describes sequence conditions data exchanged two participants order meet useful purpose service choreography better understood comparison another paradigm service composition service orchestration one hand service choreographies logic message-based interactions among participants specified global perspective service orchestration hand logic specified local point view one single participant called orchestrator service orchestration language bpel example specification service orchestration e.g bpel process file workflow deployed service infrastructure example bpel execution engine like apache ode deployment service orchestration specification transforms workflow composite service sense service choreography orchestrations two flips coin one hand roles service choreography extracted service orchestrations process called projection projection possible realize skeletons i.e incomplete service orchestrations used baselines realize web services participate service choreography hand already existing service orchestrations may composed service choreographies service choreographies executed enacted service choreography enacted participants execute roles unlike service orchestration service choreographies run engine service infrastructure “ happen roles executed logic service choreography specified global point view thus realized one single service like service orchestration key question much research choreography seeks answer suppose global choreography constructed describes possible interactions participants collaboration conditions choreography need obey guaranteed collaboration succeeds succeeds means emergent behaviour results collaboration enacted participant acting independently according skeleton exactly follows choreography skeletons originally projected case choreography said realizable general determining realizability choreography non-trivial question particularly collaboration uses asynchronous messaging possible different participants send messages simultaneously ambit specifications concerning web services following specifications focused defining languages model service choreographies moreover omg specification bpmn version 2.0 includes diagrams model service choreographies academic proposals service choreography languages include moreover number service choreography formalisms proposed based web service choreography ws-choreography specification w3c defining xml-based business process modeling language describes collaboration protocols cooperating web service participants services act peers interactions may long-lived stateful orchestration another term similar still different meaning main effort get choreography w3c web services choreography working group closed 10 july 2009 leaving ws-cdl candidate recommendation many presentations w3c workshop web services 11–12 april 2001 pointed need common interface composition language help address choreography web services architecture requirements working draft created web services architecture working group also lists idea web service choreography capabilities critical success factor support several different top-level goals nascent web services architecture problem choreography great interest industry time efforts wscl web service conversation language wsci web service choreography interface submitted w3c published technical notes moreover complementary efforts launched june 2002 intalio sun bea sap released joint specification named web services choreography interface wsci specification also submitted w3c note august 2002 w3c since formed new working group called web services choreography working group within web services activity wsci specification one primary inputs web services choreography working group published candidate recommendation ws-cdl version 1.0 november 9th 2005 xlang wsfl wsci longer supported standard organization companies bpel replaced xlang wsfl wsci superseded ws-cdl upcoming business process modeling notation version 2.0 introduce diagrams specifying service choreographies academic field put forward service choreography languages example let dance bpel4chor map service choreographies specify message-based interactions among participants global perspective way programming languages grouped programming paradigms service choreography languages grouped styles several active research projects topic service choreography | [
1760,
1700,
4203
] | Validation |
6,715 | 4 | Storm_botnet:storm botnet storm botnet storm worm botnet also known dorf botnet ecard malware remotely controlled network zombie computers botnet linked storm worm trojan horse spread e-mail spam height september 2007 storm botnet running anywhere 1 million 50 million computer systems accounted 8 malware microsoft windows computers first identified around january 2007 distributed email subjects 230 dead storm batters europe giving well-known name botnet began decline late 2007 mid-2008 reduced infecting 85,000 computers far less infected year earlier december 2012 original creators storm still n't found storm botnet displayed defensive behaviors indicated controllers actively protecting botnet attempts tracking disabling specifically attacking online operations security vendors researchers attempted investigate security expert joe stewart revealed late 2007 operators botnet began decentralize operations possible plans sell portions storm botnet operators reportedly powerful enough force entire countries internet estimated capable executing instructions per second world top supercomputers united states federal bureau investigation considered botnet major risk increased bank fraud identity theft cybercrimes first detected internet january 2007 storm botnet worm so-called storm-related subject lines infectious e-mail employed initially 230 dead storm batters europe later provocative subjects included chinese missile shot usa aircraft u.s. secretary state condoleezza rice kicked german chancellor angela merkel suspected information security professionals well-known fugitive spammers including leo kuvayev may involved operation control storm botnet according technology journalist daniel tynan writing robert x. cringely pseudonym great portion fault existence storm botnet lay microsoft adobe systems sources state storm worm primary method victim acquisition enticing users via frequently changing social engineering confidence trickery schemes according patrick runald storm botnet strong american focus likely agents working support within united states experts however believe storm botnet controllers russian pointing specifically russian business network citing storm software mentions hatred moscow-based security firm kaspersky lab includes russian word buldozhka means bulldog botnet zombie network comprises computers running microsoft windows operating system infected computer becomes known bot bot performs automated tasks—anything gathering data user attacking web sites forwarding infected e-mail—without owner knowledge permission estimates indicate 5,000 6,000 computers dedicated propagating spread worm use e-mails infected attachments 1.2 billion virus messages sent botnet september 2007 including record 57 million august 22 2007 alone lawrence baldwin computer forensics specialist quoted saying cumulatively storm sending billions messages day could double digits billions easily one methods used entice victims infection-hosting web sites offers free music artists beyoncé knowles kelly clarkson rihanna eagles foo fighters r. kelly velvet revolver signature-based detection main defense computer systems virus malware infections hampered large number storm variants back-end servers control spread botnet storm worm automatically re-encode distributed infection software twice hour new transmissions making difficult anti-virus vendors stop virus infection spread additionally location remote servers control botnet hidden behind constantly changing dns technique called ‘ fast flux ’ making difficult find stop virus hosting sites mail servers short name location machines frequently changed rotated often minute minute basis storm botnet operators control system via peer-to-peer techniques making external monitoring disabling system difficult central command-and-control point storm botnet shut botnet also makes use encrypted traffic efforts infect computers usually revolve around convincing people download e-mail attachments contain virus subtle manipulation one instance botnet controllers took advantage national football league opening weekend sending mail offering football tracking programs nothing infect user computer according matt sergeant chief anti-spam technologist messagelabs terms power botnet utterly blows supercomputers away add 500 top supercomputers blows away 2 million machines frightening criminals access much computing power much estimated 10 -20 total capacity power storm botnet currently used computer security expert joe stewart detailed process compromised machines join botnet attempts join botnet made launching series exe files said machine stages usually named sequence game0.exe game5.exe similar continue launching executables turn typically perform following stage compromised system connect botnet fast flux dns makes tracking process exceptionally difficult code run windir \system32\wincom32.sys windows system via kernel rootkit connections back botnet sent modified version edonkey/overnet communications protocol storm botnet variants employ variety attack vectors variety defensive steps exist well storm botnet observed defending attacking computer systems scanned storm virus-infected computer systems online botnet defend ddos counter-attacks maintain internal integrity certain points time storm worm used spread botnet attempted release hundreds thousands versions onto internet concentrated attempt overwhelm defenses anti-virus malware security firms according joshua corman ibm security researcher first time remember ever seeing researchers actually afraid investigating exploit researchers still unsure botnet defenses counterattacks form automation manually executed system operators try attach debugger query sites reporting knows punishes instantaneously secureworks chunk ddos-ed distributed-denial-of-service attacked researcher network every time hear investigator trying investigate 're automatically punished knows investigated punishes fights back corman said spameater.com well sites 419eater.com artists 419 deal 419 spam e-mail fraud experienced ddos attacks temporarily rendering completely inoperable ddos attacks consist making massed parallel network calls target ip addresses overloading servers capacities preventing responding requests anti-spam anti-fraud groups spamhaus project also attacked webmaster artists 419 said website server succumbed attack increased 100mbit similar attacks perpetrated dozen anti-fraud site hosts jeff chan spam researcher stated terms mitigating storm challenging best impossible worst since bad guys control many hundreds megabits traffic evidence may control hundreds gigabits traffic enough force countries internet storm botnet systems also take steps defend locally victims computer systems botnet compromised systems creates computer process windows machine notifies storm systems whenever new program processes begin previously storm worms locally would tell programs—such anti-virus anti-malware software simply run however according ibm security research versions storm also simply fool local computer system run hostile program successfully fact anything programs including av exes dlls sys files also software p2p applications bearshare edonkey appear run successfully even though n't actually anything far less suspicious process gets terminated suddenly outside said richard cohen sophos compromised users related security systems assume security software running successfully fact september 17 2007 republican party website united states compromised used propagate storm worm botnet october 2007 botnet took advantage flaws youtube captcha application mail systems send targeted spam e-mails xbox owners scam involving winning special version video game halo 3 attack methods include using appealing animated images laughing cats get people click trojan software download tricking users yahoo geocities service download software claimed needed use geocities geocities attack particular called full-fledged attack vector paul ferguson trend micro implicated members russian business network well-known spam malware service christmas eve 2007 storm botnet began sending holiday-themed messages revolving around male interest women titles find christmas tail twelve girls christmas mrs. claus tonight photos attractive women described attempt draw unprotected systems botnet boost size holidays security updates protection vendors may take longer distributed day e-mails christmas strippers distributed storm botnet operators immediately began sending new infected e-mails claimed wish recipients happy new year 2008 january 2008 botnet detected first time involved phishing attacks major financial institutions targeting barclays halifax around october 15 2007 uncovered portions storm botnet variants could sale done using unique security keys encryption botnet internet traffic information unique keys allow segment sub-section storm botnet communicate section matching security key however may also allow people detect track block storm botnet traffic future security keys unique lengths signatures computer security vendor sophos agreed assessment partitioning storm botnet indicated likely resale services graham cluley sophos said storm use encrypted traffic interesting feature raised eyebrows lab likely use cybercriminals lease portions network misuse would n't surprise network used spamming distributed denial-of-service attacks malicious activities security experts reported storm broken malware market form ready-to-use botnet-making spam kit world could see sharp rise number storm related infections compromised computer systems encryption seems affect systems compromised storm second week october 2007 onwards meaning computer systems compromised time frame remain difficult track block within days discovery segmenting storm botnet spam e-mail new subsection uncovered major security vendors evening october 17 security vendors began seeing new spam embedded mp3 sound files attempted trick victims investing penny stock part illegal pump-and-dump stock scam believed first-ever spam e-mail scam made use audio fool victims unlike nearly storm-related e-mails however new audio stock scam messages include sort virus storm malware payload simply part stock scam january 2008 botnet detected first time involved phishing attacks customers major financial institutions targeting banking establishments europe including barclays halifax royal bank scotland unique security keys used indicated f-secure segments botnet leased september 25 2007 estimated microsoft update windows malicious software removal tool msrt may helped reduce size botnet 20 new patch claimed microsoft removed storm approximately 274,372 infected systems 2.6 million scanned windows systems however according senior security staff microsoft 180,000+ additional machines cleaned msrt since first day likely home user machines notably incorporated daily operation 'storm botnet indicating msrt cleaning may symbolic best late october 2007 reports indicated storm botnet losing size internet footprint significantly reduced size brandon enright university california san diego security analyst estimated botnet late october fallen size approximately 160,000 compromised systems enright previous estimated high july 2007 1,500,000 systems enright noted however botnet composition constantly changing still actively defending attacks observation 're researcher hit pages hosting malware much… automated process automatically launches denial service attack said added research caused storm botnet attack knocked part uc san diego network offline computer security company mcafee reported saying storm worm would basis future attacks craig schmugar noted security expert discovered mydoom worm called storm botnet trend-setter led usage similar tactics criminals one derivative botnet dubbed celebrity spam gang due use similar technical tools storm botnet controllers unlike sophisticated social engineering storm operators use entice victims however celebrity spammers make use offers nude images celebrities angelina jolie britney spears cisco systems security experts stated report believe storm botnet would remain critical threat 2008 said estimated size remained millions early 2008 storm botnet also found business competition black hat economy form nugache another similar botnet first identified 2006 reports indicated price war may underway operators botnets sale spam e-mail delivery following christmas new year holidays bridging 2007-2008 researchers german honeynet project reported storm botnet may increased size 20 holidays messagelabs intelligence report dated march 2008 estimates 20 spam internet originates storm storm botnet sending spam two years decline late 2008 one factor — account making less interesting creators maintain botnet — may stormfucker tool made possible take control parts botnet april 28 2010 mcafee made announcement so-called rumors stormbot 2 verified mark schloesser tillmann werner felix leder german researchers lot work analyzing original storm found around two-thirds new functions copy paste last storm code base thing missing p2p infrastructure perhaps tool used p2p bring original storm honeynet blog dubbed stormbot 2 | [
2173,
5452,
7795,
2632,
2724,
4759,
2376,
1632,
6328,
2733,
6092,
7441,
3281,
651,
2566,
5571,
4783,
7600,
924,
7186,
1383,
2577,
5401,
6823,
496,
6025,
6370,
6644,
6740,
5675,
1023,
7657,
1766,
51,
3480,
2142,
7294,
2693,
3575,
6305,
1... | Test |
6,716 | 7 | HighQ_(software):highq software highq privately owned software service saas company providing cloud-based secure file sharing team collaboration social networking software enterprise customers customers legal banking corporate sectors well government life sciences highq founded london 2001 university friends ajay patel veenay shah company offices uk london australia sydney netherlands amsterdam germany frankfurt usa new york r operation india ahmedabad january 2016 highq raised first ever investment round 50m morgan stanley goldman sachs one peak partners help accelerate company expansion us market one top 10 biggest funding rounds europe first quarter 2016 july 2019 thomson reuters announced acquisition highq press release highq included one watch 2013 sunday times tech track 100 league table ranked 74th 2014 tech track 100 league table ranked 32nd among uk ’ top 100 smes sunday times heathrow sme export track 100 2016 highq ranked deloitte technology fast 500 emea 2011 2013 ranked deloitte technology fast 50 uk 2013 highq major clients include barclays linklaters lex mundi clifford chance osborne clarke clyde co allen overy highq clients include 21 top 25 uk law firms including uk magic circle law firms 45 top 100 uk law firms highq offers file sharing extranet collaboration project management virtual data room enterprise social networking knowledge sharing publishing solutions three products cover different aspects use cases highq collaborate highq publisher highq dataroom primary product highq collaborate provides secure document exchange enterprise social collaboration client extranets knowledge portals organisations summer 2013 highq released new mobile-optimised version collaborate saw redesign existing modules added features including responsive design microblogging private messaging centralised notifications enhanced people profiles highq publisher integrated digital marketing publishing platform supports various publishing formats channels including publications videos events microsites email campaigns highq dataroom virtual data room product aimed primarily law firms banks corporations help users exchange transactional information clients partners outside company | [
330,
173
] | Test |
6,717 | 2 | Resource_Access_Control_Facility:resource access control facility racf usually pronounced rack-eff short resource access control facility ibm software product security system provides access control auditing functionality z/os z/vm operating systems racf introduced 1976 main features racf establishes security policies rather permission records set permissions file patterns — set permissions even files yet exist permissions used file object created later time racf continuously evolved support modern security features digital certificates/public key infrastructure services ldap interfaces case sensitive ids/passwords latter reluctant concession promote interoperability systems unix linux underlying zseries z systems hardware works closely racf example digital certificates protected within tamper-proof cryptographic processors major mainframe subsystems especially db2 version 8 use racf provide multi-level security mls primary competitors acf2 topsecret produced ca technologies | [
3,
2993,
1460,
1464,
5571,
5396,
3293,
578,
3794,
7090,
1805,
7567,
4261,
6045,
1593,
699,
2807
] | Test |
6,718 | 9 | Alexander_Repenning:alexander repenning dr. alexander repenning director scalable game design project computer science professor founder agentsheets inc. member center lifelong learning design university colorado boulder repenning inventor drag drop blocks programming research interests include computer science education end-user programmable agents human-computer interaction artificial intelligence repenning teaches educational game design usa asia europe worked research development asea brown boveri research xerox parc apple computer hewlett packard repenning creator agentsheets agentcubes cyberlearning tools used game design computational science applications director scalable game design project using agentsheets leads effort reinvent computer science education public schools game design starting middle school level 10,000 students funding national science foundation itest ce21 programs google scalable game design project conducting largest us study computer science education middle school level including inner city schools remote rural areas native american communities results indicate students across genders ethnicities highly motivated learn computer science game design also learn essential computational thinking skills acquire skills game design later leverage stem simulation creation repenning theoretical contributions include pedagogical framework called zones proximal flow combining vygotsky ’ zone proximal development csikszentmihalyi ’ state flow agentsheets work received numerous awards including gold medal mayor paris “ innovative application education world wide web ” www5 invitation association computing machinery showcase agentsheets one “ best best innovators ” acm1 conference repenning telluride tech festival honoree contributions computer science education previous honorees include vint cerf recognized one fathers internet alan kay recognized one pioneers object-oriented programming repenning served advisor national academy sciences european commission japanese ministry education organization economic co-operation development oecd white house office science technology policy ostp national science foundation reviewer research funding organizations usa canada europe asia chaired conferences end-user programming kids invited give talks guest lectures workshops keynote addresses nationally including stanford mit media lab university colorado numerous international conferences beyond academic recognition repenning work also featured tv news radio newspapers popular press including wired magazine switzerland repenning selected one 100 digital shapers | [] | Validation |
6,719 | 2 | Perf_(Linux):perf linux perf sometimes called perf_events perf tools originally performance counters linux pcl performance analyzing tool linux available linux kernel version 2.6.31 userspace controlling utility named codice_1 accessed command line provides number subcommands capable statistical profiling entire system kernel userland code supports hardware performance counters tracepoints software performance counters e.g hrtimer dynamic probes example kprobes uprobes 2012 two ibm engineers recognized perf along oprofile one two commonly used performance counter profiling tools linux interface perf utility kernel consists one syscall done via file descriptor mmapped memory region unlike lttng older versions oprofile service daemons needed functionality integrated kernel perf utility dumps raw data mmapped buffer disk buffer becomes filled according r. vitillo lbnl profiling performed perf involves low overhead architectures provide support hardware counters include x86 powerpc64 ultrasparc iii iv arm v5 v6 v7 cortex-a8 -a9 alpha ev56 superh usage last branch records branch tracing implementation available intel cpus since pentium 4 available patch since version 3.14 linux kernel mainline released march 31 2014 perf also supports running average power limit rapl power consumption measurements available feature certain intel cpus perf natively supported many popular linux distributions including red hat enterprise linux since version 6 released 2010 debian since squeeze version released 2011 perf used several subcommands documentation perf detailed 2014 example document events explain aliases often external tools used get names codes events perf tools also profile based true wall-clock time perf subsystem linux kernels 2.6.37 3.8.8 rhel6 kernel 2.6.32 contained security vulnerability cve-2013-2094 exploited gain root privileges local user problem due incorrect type used 32-bit int instead 64-bit event_id verification code path | [
3256,
2182,
3613,
6427,
7528,
7532,
2559,
5744,
6443,
2942,
7555,
6117,
4341,
2226,
5762,
412,
415,
3666,
2970,
7956,
5453,
5803,
5460,
7242,
1535,
1924,
6892,
4771,
1176,
7980,
1933,
5829,
1208,
6211,
4435,
5865,
7669,
3404,
1227,
1596,
... | Test |
6,720 | 3 | Atmel_ARM-based_processors:atmel arm-based processors atmel arm-based processors microcontrollers microprocessors integrated circuits microchip technology previously atmel based various 32-bit arm processor cores in-house designed peripherals tool support arm licenses core design series 32-bit processors arm manufacture complete silicon products intellectual property ip arm processors risc reduced instruction set computing similar microchip ’ avr 8-bit products later adoption risc architecture whereas avr architecture used harvard architecture exclusively arm cores harvard cortex-m3 others von neumann architecture arm7tdmi semiconductor companies microchip take arm cores use consistent set instructions register naming add peripheral circuits adcs analog digital converters clock management serial communications usart spi i2c lin usb ethernet lcd camera touch controllers microchip made efforts adapt advanced peripherals power management used little power operate independently without cpu core powered sleepwalking also provided dma external interfaces memories increasing data throughput minimal processor intervention microchip sells mcus microcontroller units internal flash memory mpus microprocessor units use external memory addition chips microchip offers demo boards website distribution channels digi-key farnell ineltek arrow avnet future electronics mouser microchip arm-based products meant specific applications sam4cp used smart-grid energy meters microcontrollers internal program memory well conventional internal registers ram microchip arm mcus range sam d10 series 14 pins 144-pin sam s70 sam e70 products sam4s sam4n sam3s sam3n sam7s 64-pin families pin-compatible ic footprints except usb device though voltage level compatible sam family microchip consists four different sub series sam d10 sam d11 sam d20 sam d21 devices based arm cortex-m0+ processor offer different pin memory feature combinations devices pin- code-compatible share peripherals like event system sercom module arduino zero board uses atsamd21g18 chip 2009 atmel announced atsam3u line flash-based microcontrollers based arm cortex-m3 processor higher end evolution sam7 microcontroller products top clock speed range 100 mhz come variety flash sizes summer 2009 parts still sampling development board recently made available december 2009 atsam3s line announced features several enhancements lower power operation bill materials cost reduction market watchers observe cortex-m3 products competition atmel avr32 uc3a products microcontrollers largely identical peripherals hardware technology flash-based similar clock speeds dense 16/32 bit risc instruction sets atsam4 based arm cortex-m4 core sam4e includes fpu floating-point unit sam4c includes dual-core arm cortex-m4 one core fpu based arm cortex-m7 core wide variety at91 flash-based microcontrollers based arm7tdmi cores chips top clock speed range 60 mhz come variety flash sizes peripheral sets at91sam9xe flash-based microcontrollers based arm926ej-s cores top clock speed range 200 400 mhz come variety flash sizes somewhat resemble flash-equipped at91sam9260 chips microchip introduced at91sam9 processors using arm926ej-s core armv5tej architecture first broad market follow highly successful at91rm9200 processor processors improved predecessor using less power incorporating newer powerful arm core providing variety chips different peripheral sets clocked 200 mhz run twice speed processors include series based arm cortex-a5 core integrated development environments amount documentation arm chips daunting especially newcomers documentation microcontrollers past decades would easily inclusive single document chips evolved documentation grown total documentation especially hard grasp arm chips since consists documents ic manufacturer example microchip documents cpu core vendor arm holdings typical top-down documentation tree manufacturer website manufacturer marketing slides manufacturer datasheet exact physical chip manufacturer detailed reference manual describes common peripherals aspects physical chip family arm core generic user guide arm core technical reference manual arm architecture reference manual describes instruction set microchip additional documents evaluation board user manuals application notes getting started guides software library documents errata see external links section links official microchip arm documents | [
7519,
6082,
6421,
7890,
722,
2926,
5740,
1473,
7905,
5750,
5752,
4336,
5405,
5055,
5406,
1864,
67,
5079,
446,
7960,
451,
6165,
463,
804,
5472,
469,
4041,
3008,
3365,
1556,
7990,
6910,
4061,
5845,
7654,
6919,
3397,
1977,
2339,
2711,
1995... | Test |
6,721 | 5 | Mutt_(email_client):mutt email client mutt text-based email client unix-like systems originally written michael elkins 1995 released gnu general public license version 2 later version mutt slogan mail clients suck one sucks less mutt supports mail storing formats notably mbox maildir protocols pop3 imap etc. also includes mime support notably full pgp/gpg s/mime integration mutt originally designed mail user agent mua relied locally accessible mailbox sendmail infrastructure according mutt homepage though written scratch mutt initial interface based largely elm mail client new mutt message scoring threading capabilities support fetching sending email via various protocols pop3 imap smtp added later however mutt still relies external tools composing filtering messages mutt hundreds configuration directives commands allows changing key bindings making keyboard macros complex actions well colors layout interface variants concept known hooks many settings changed based criteria current mailbox outgoing message recipients also many patches extensions available add functionality nntp support sidebar similar often found graphical mail clients mutt fully controlled keyboard support mail conversation threading meaning one easily move around long discussions mailing lists new messages composed external text editor default unlike pine embeds editor known pico mutt capable efficiently searching mail stores calling mail indexing tools notmuch many people recommend mutt used way alternatively users search mail stores mutt calling grep via bash script mutt often used security professionals security-conscious users smaller attack surface compared clients ship web browser rendering engine javascript interpreter relation transport layer security mutt configured trust certificates first use use older less secure versions transport layer security protocol | [
1152,
6965,
2451,
2453,
2281,
7975,
5571,
735,
1475,
6908,
2131,
4352,
5070,
6758,
5773,
6582,
3915,
6588,
5887,
4918,
1435
] | Validation |
6,722 | 2 | FLEX_(operating_system):flex operating system flex single-tasking operating system developed technical systems consultants tsc west lafayette indiana motorola 6800 1976 original version 8 floppy disks smaller version 5.25 floppies called mini-flex also later ported motorola 6809 version called flex9 versions text-based intended use display devices ranging printing terminals like teletype model 33 asr smart terminals graphic displays supported tsc software hardware manufacturers supported elementary graphics pointing devices disk-based operating system using 256-byte sectors soft-sectored floppies disk structure used linkage bytes sector indicate next sector file free list directory structure much simplified result tsc others provided several programming languages including basic two flavors standard extended tokenizing version extended basic called pre-compiled basic forth c fortran pascal tsc also wrote version flex smoke signal dos california hardware manufacturer smoke signal broadcasting version used forward back linkage bytes sector increased disk reliability expense compatibility speed later tsc introduced multitasking multi-user unix-like uniflex operating system required dma disk controllers 8 disk sold small numbers several tsc computer languages ported uniflex early 1980s flex offered compusense ltd operating system 6809-based dragon 64 home computer following list commands supported different versions flex operating system | [
4670,
5021,
13,
6088,
3271,
3626,
5041,
7550,
405,
65,
3664,
5783,
5088,
6500,
785,
2266,
788,
1522,
7605,
4759,
4397,
5116,
2300,
4786,
6922,
5161,
5865,
861,
3751,
1992,
7325,
190,
8066,
6984,
2390,
5571,
578,
5232,
5948,
8115,
7396,
... | Test |
6,723 | 9 | Thomas_E._Kurtz:thomas e. kurtz thomas eugene kurtz born february 22 1928 retired dartmouth professor mathematics computer scientist along colleague john g. kemeny set motion revolutionary concept making computers freely available college students library books implementing concept time-sharing dartmouth college mission allow non-expert users interact computer co-developed basic programming language beginners all-purpose symbolic instruction code dartmouth time sharing system 1963 1964 native oak park illinois united states kurtz graduated knox college 1950 awarded ph.d. degree princeton university 1956 advisor john tukey joined mathematics department dartmouth college year taught statistics numerical analysis 1983 kurtz kemeny co-founded company called true basic inc. market true basic updated version language kurtz also served council chairman trustee educom well trustee chairman nercomp pierce panel president scientific advisory committee kurtz also served steering committees conduit project ccuc conferences instructional computing 1974 american federation information processing societies gave award kurtz kemeny national computer conference work basic time-sharing 1991 computer society honored kurtz ieee computer pioneer award 1994 inducted fellow association computing machinery 1951 kurtz first experience computing came summer session institute numerical analysis university california los angeles interests included numerical analysis statistics computer science ever since graduated 1950 obtained bachelor degree majoring mathematics 1956 age 28 went acquire phd princeton university thesis problem multiple comparisons mathematical statistics kurtz composed first computer program 1951 working computers ucla institute numerical analysis performed feat finishing grad school one year tuition princeton university 1963 1964 kurtz kemeny developed first version dartmouth time-sharing system time-sharing system university use basic language 1966 1975 kurtz served director kiewit computation center dartmouth 1975 1978 director office academic computing 1980 1988 kurtz director computer information systems program dartmouth ground-breaking multidisciplinary graduate program develop leaders industry subsequently kurtz returned teaching full-time professor mathematics emphasis statistics computer science part dartmouth time-sharing system kemeny kurtz created basic programming language first basic program ran may 1 1964 4 a.m. neither kemeny kurtz thought start something grand merely hoped would help students learn something computers using pair made certain invention immediately dispersed public made real money dartmouth college copyrighted basic however made basic available free anyone wanting use name language originated kurtz ’ wish simple acronym meant something well kurtz states “ wanted word simple simple-minded basic one. ” basic along books published earned lot positive feedback example “ second edition basic programming gives thorough description basic useful beginner also experienced programmer. ” “ overall evaluation basic programming ideal individual wishes program minimum effort equal value group classroom instruction. ” theme basic average computer user stressed kurtz open letter reiterates upon past statements basic invented give students simple programming language easy learn current languages time dedicated professionals went say basic people want dedicate lives programming repetition idea kurtz accentuates even success language wrote would remain implemented masses specialists basic standards created 1980s ecma ansi versions released 1986 1987 respectively basic popularity skyrocketed 1975 pair youngsters harvard dormitory bill gates paul allen created version basic viable one earliest personal computers gates allen ’ version became prominent iterations basic road basic long one kemeny kurtz forged darsimco – dartmouth simplified code – dartmouth ’ inaugural attempt making computing language 1956 however darsimco soon became obsolete language fortran manifested 1962 kemeny dartmouth undergraduate sidney marshall created language dope dartmouth oversimplified programming experiment direct predecessor basic dope little used kurtz preferred trying implement successful languages fortran algol kurtz experience dartmouth algol 30 lgp-30 convinced devising subsets languages quite practical led adopt kemeny ’ notion creating new language entirely although basic widely regarded success many computing professionals thought poor choice larger complicated programs larger programs became confusing messy used “ go ” statement jump one line program another criticism original language unstructured made difficult split programs separate parts improve readability basic structured also hindered ability debug modify parts code limited use larger companies hence largely remained language used smaller programs 1983 response proliferation street basics group graduating dartmouth students persuaded kemeny kurtz offer dartmouth version language commercial product first offering company true basic inc. based dartmouth basic 7 featured modern programming constructs “ if..then..else do..loop exit ” company described product “ simple elegant powerful true basic. “ upon kemeny advice true basic limited single os computer system “ today versions true basic available dos mac os windows unix linux systems ” kurtz retired dartmouth college 1993 continued develop maintain true basic | [
7255,
578,
1243,
5621
] | Test |
6,724 | 0 | Reverso_(language_tools):reverso language tools reverso website specializing online translation aids language services include online dictionaries translation context spell checking conjugation tools softissimo inc. active since 1998 aim providing online translation linguistic tools corporate mass markets 2013 released reverso context bilingual dictionary tool based big data machine learning algorithms 2016 reverso acquired fleex service learning english via subtitled movies based content netflix fleex expanded also include video content youtube ted talks custom video files 2018 released new mobile app combines translations learning activities reverso suite online linguistic services 40 million users comprises various types language web apps tools translation language learning tools support many languages including english french hebrew spanish italian russian since founding reverso provided machine translation tools automated translation texts various languages including neural machine translation reverso context online mobile application combining big data large multilingual corpora allow users search translations context texts sourced mainly films books governmental documents allowing users see idiomatic usages translations well synonyms voice output reverso context app also provides language-learning features flashcards based words example sentences reverso context mobile app 4.7 ranking google play app store reverso also released browser extensions chrome firefox incorporate features reverso context web browsing reverso website also provides collaborative bilingual dictionaries various pairs languages use crowd sourcing allow users submit new entries provide feedback also tools conjugation verbs various language spell checking tools written multilingual grammar guides language learners reverso online localize service translates documents websites preserving layout february 2018 revealed translations reverso translation web site returned antisemitic results much nicer returning dachau much nicer auschwitz results prompted international league racism anti-semitism threaten reverso legal actions reverso answered twitter controversial content would removed one month time | [
5528,
518,
5008
] | Test |
6,725 | 2 | Security-focused_operating_system:security-focused operating system list operating systems specifically focused security general-purpose operating systems may secure practice without specifically security-focused similar concepts include security-evaluated operating systems achieved certification auditing organization trusted operating systems provide sufficient support multilevel security evidence correctness meet particular set requirements operating systems engineered around object-capabilities security paradigm instead system deciding access request granted bundling authority designation makes impossible request anything legitimate starting windows server 2008 windows server added installation option called server core traditional graphical user interface installed administration windows server 2008 rely windows command prompt roles components installed individually option reduces windows server footprint result reduced demand system resources reduced number components could potentially exploited via potential security vulnerabilities later windows server 2016 microsoft introduced nano server installation option even reduced footprint headless support locally connected keyboard monitor nano server windows server 1709 constantly updated sibling windows server 2016 installed container | [
1807,
362,
3932,
3938,
3613,
6422,
7528,
3271,
2559,
1461,
4318,
2566,
1100,
6443,
740,
5401,
7554,
6823,
7555,
6117,
58,
2240,
74,
1893,
2615,
3680,
3681,
7956,
5453,
5803,
6515,
7242,
462,
1535,
6892,
4400,
1176,
3696,
3697,
6180,
690... | Test |
6,726 | 8 | IBM_HTTP_Server:ibm http server ibm http server ihs web server based apache software foundation http server runs aix hp-ux linux solaris jade windows nt ibm z/os available download use free charge without ibm support http server also included ibm websphere application server distribution packages default web console administration port 8008 ibm administration port 2001 license agreement ibm http server ibm international license agreement non-warranted programs ilan | [
8189,
6256,
578,
900,
2807
] | Test |
6,727 | 7 | Snappii:snappii snappii sometimes stylized snappii cloud-based codeless platform rapid mobile app development largely businesses enterprises 2015 company helped produce 26,000 mobile apps 29 different industries 17 languages snappii-produced apps include starbucks location finder public safety app college campuses mobile pdf form uploader snappii used ios android devices snappii founded 2010 alex bakman also serves ceo snappii platform launched 2011 primarily tool iphone app creation company ipad android app creation systems still beta november 2011 2012 snappii added compatibility support android devices also 2012 customers created 6,000th app using snappii platform 2015 snappii released series new features ranging audio video support enhanced charting capabilities also announced new offer called 5 weeks- 5k-guaranteed app guarantees customers custom native app within five weeks 5,000 august 2015 company raised 250,000 investor funding 2015 snappii platform produced around 26,000 applications 17 languages companies 29 different industries snappii offers cloud-based codeless platform developing business enterprise mobile applications ios android devices users including non-programmers create apps using wysiwyg formatting rather source code snappii also create custom native apps clients whether client opts create app enlists help snappii programmers must pay monthly hosting fee snappii helped develop apps companies 29 different industries including health care construction public safety retail oil gas others features snappii platform include audio video support charting capabilities ability upload pdf forms via pdf form manager app | [
2961,
4575,
6788,
6015
] | Test |
6,728 | 3 | Monopoly_(1985_video_game):monopoly 1985 video game monopoly 1985 multi-platform video game based board game monopoly released amiga amstrad cpc bbc micro commodore 64 ms-dos msx tatung einstein thomson mo thomson zx spectrum published leisure genius title one many inspired property game contains similar gameplay board game based various physical tasks replaced automation digital representations computer shopper praised game graphics animation deemed excellent value spectrum thought game excellent conversion board game sinclair user wrote game boring one issue amiga power deemed sound conversion albeit expensive source material another publication said competent arguably quite pointless | [
6380
] | Test |
6,729 | 3 | Mundial_de_Fútbol:mundial de fútbol mundial de fútbol football sports game released amstrad cpc zx spectrum msx ms-dos platforms created 1990 opera soft due internal problems company released celebration 1990 fifa world cup simulation show upper view goals upper lower parts screen players reached tough scroll | [
6380
] | Validation |
6,730 | 0 | Quack.com:quack.com quack.com early voice portal company domain name later used quack ipad search application aol founded 1998 steven woods jeromy carriere alex quilici pittsburgh pennsylvania usa based voice portal infrastructure company named quackware quack first company try create voice portal consumer-based destination site consumers could access information voice alone also complete transactions quackware launched beta phone service 1999 allowed consumers purchase books sites amazon cds sites cdnow answering short set questions quack followed set information services movie listings inspired expanding upon moviefone news weather stock quotes concept introduced series lookalike startups including tellme networks raised money internet startup history similar concept quack received venture funding 1999 moved operations mountain view silicon valley california 1999 deal lycos announced may 2000 september 2000 quack acquired 200 million america online aol moved onto netscape campus left netscape team quack attacked canadian press representative canadian brain drain us internet bubble focusing recruiting efforts university waterloo hiring 50 engineers waterloo less 10 months quack competitor tellme networks raised enormous funds became highly competitive market 2000 emergence dozen additional competitors 12-month period following acquisition america online effort led ted leonsis bring quack aol interactive quack voice service became aolbyphone one aol web properties along mapquest moviefone others quack secured several patents underlie technical challenges delivering interactive voice services constructing voice portal required integrations innovations speech recognition speech generation also databases application specification constraint-based reasoning artificial intelligence computational linguistics quack name derived company goal providing voice-based services broadly quick ubiquitous access consumer knowledge patents assigned quack.com include system method voice access internet-based information system method advertising internet voice portal recognizing axiom interactive voice systems one must know set possible answers question asking system method determining one web site information another web site quack.com spoofed simpsons march 2002 episode blame lisa comquaak sign replaced another equally crazy telecom company name july 2010 quack.com became focus new aol ipad application web search experience product delivers web results blends picture video twitter results enables preview web results go site search within result flip results pages making full use ipad touch screen features ipad app free via itunes support discontinued 2012 | [] | Test |
6,731 | 2 | Hyper-V:hyper-v microsoft hyper-v codenamed viridian formerly known windows server virtualization native hypervisor create virtual machines x86-64 systems running windows starting windows 8 hyper-v superseded windows virtual pc hardware virtualization component client editions windows nt server computer running hyper-v configured expose individual virtual machines one networks hyper-v first released alongside windows server 2008 available without additional charge since windows server 2012 windows 8 standalone windows hyper-v server free command line interface beta version hyper-v shipped certain x86-64 editions windows server 2008 finalized version released june 26 2008 delivered windows update hyper-v since released every version windows server microsoft provides hyper-v two channels hyper-v server 2008 released october 1 2008 consists windows server 2008 server core hyper-v role windows server 2008 roles disabled limited windows services hyper-v server 2008 limited command-line interface used configure host os physical hardware software menu driven cli interface freely downloadable script files simplify configuration addition hyper-v server supports remote access via remote desktop connection however administration configuration host os guest virtual machines generally done network using either microsoft management consoles another windows computer system center virtual machine manager allows much easier point click configuration monitoring hyper-v server hyper-v server 2008 r2 edition windows server 2008 r2 made available september 2009 includes windows powershell v2 greater cli control remote access hyper-v server requires cli configuration network interfaces windows firewall also using windows vista pc administer hyper-v server 2008 r2 fully supported hyper-v implements isolation virtual machines terms partition partition logical unit isolation supported hypervisor guest operating system executes must least one parent partition hypervisor instance running supported version windows server 2008 later virtualization software runs parent partition direct access hardware devices parent partition creates child partitions host guest oss parent partition creates child partitions using hypercall api application programming interface exposed hyper-v. child partition access physical processor handle real interrupts instead virtual view processor runs guest virtual address depending configuration hypervisor might necessarily entire virtual address space depending vm configuration hyper-v may expose subset processors partition hypervisor handles interrupts processor redirects respective partition using logical synthetic interrupt controller synic hyper-v hardware accelerate address translation guest virtual address-spaces using second level address translation provided cpu referred ept intel rvi formerly npt amd child partitions direct access hardware resources instead virtual view resources terms virtual devices request virtual devices redirected via vmbus devices parent partition manage requests vmbus logical channel enables inter-partition communication response also redirected via vmbus devices parent partition also virtual devices redirected reaches parent partition gain access physical devices parent partitions run virtualization service provider vsp connects vmbus handles device access requests child partitions child partition virtual devices internally run virtualization service client vsc redirect request vsps parent partition via vmbus entire process transparent guest os virtual devices also take advantage windows server virtualization feature named enlightened i/o storage networking graphics subsystems among others enlightened i/o specialized virtualization-aware implementation high level communication protocols like scsi allows bypassing device emulation layer takes advantage vmbus directly makes communication efficient requires guest os support enlightened i/o currently following operating systems support enlightened i/o allowing therefore run faster guest operating systems hyper-v operating systems need use slower emulated hardware hyper-v role available x86-64 variants standard enterprise datacenter editions windows server 2008 later well pro enterprise education editions windows 8 later windows server installed regardless whether installation full core installation addition hyper-v made available part hyper-v server operating system freeware edition windows server either way host computer needs following amount memory assigned virtual machines depends operating system number cpus assigned virtual machine also depends os also maximum number concurrently active virtual machines following table lists supported guest operating systems windows 10 pro rs5 windows server 2019 fedora 8 9 unsupported however reported run third-party support freebsd 8.2 later guests provided partnership netapp citrix includes emulated paravirtualized modes operation well several hyperv integration services windows 10 home support hyper-v desktop virtualization vdi products third-party companies quest software vworkspace citrix xendesktop systancia applidis fusion ericom powerterm webconnect provide ability host centrally manage desktop virtual machines data center giving end users full pc desktop experience guest operating systems enlightened i/o hypervisor-aware kernel windows server 2008 later server versions windows vista sp1 later clients offerings citrix xenserver novell able use host resources better since vsc drivers guests communicate vsps directly vmbus non- enlightened operating systems run emulated i/o however integration components include vsc drivers available windows server 2003 sp2 windows vista sp1 linux achieve better performance july 20 2009 microsoft submitted hyper-v drivers inclusion linux kernel terms gpl microsoft required submit code discovered incorporated hyper-v network driver gpl-licensed components statically linked closed-source binaries kernels beginning 2.6.32 may include inbuilt hyper-v paravirtualization support improves performance virtual linux guest systems windows host environment hyper-v provides basic virtualization support linux guests box paravirtualization support requires installing linux integration components satori inputvsc drivers xen-enabled linux guest distributions may also paravirtualized hyper-v. microsoft officially supported suse linux enterprise server 10 sp1/sp2 x86 x64 manner though xen-enabled linux able run february 2008 red hat microsoft signed virtualization pact hypervisor interoperability respective server operating systems enable red hat enterprise linux 5 officially supported hyper-v. hyper-v windows server 2012 windows server 2012 r2 changes support list follows hyper-v like microsoft virtual server windows virtual pc saves guest os single virtual hard disk file supports older .vhd format well newer .vhdx older .vhd files virtual server 2005 virtual pc 2004 virtual pc 2007 copied used hyper-v old virtual machine integration software equivalents hyper-v integration services must removed virtual machine migrated guest os configured started using hyper-v guest os detect changes virtual hardware installing hyper-v integration services installs five services improve performance time adding new guest video network card drivers hyper-v virtualize audio hardware windows 8.1 windows server 2012 r2 possible work around issue connecting virtual machine remote desktop connection network connection use audio redirection feature windows 8.1 windows server 2012 r2 add enhanced session mode provides redirection without network connection optical drives virtualized guest vm read-only officially hyper-v support host/root operating system optical drives pass-through guest vms result burning discs audio cds video cd/dvd-video playback supported however workaround exists using iscsi protocol setting iscsi target host machine optical drive talked standard microsoft iscsi initiator microsoft produces iscsi target software alternative third party products used cpus without second level address translation slat installation wddm accelerated graphics drivers primary os cause dramatic drop graphic performance occurs graphics drivers access memory pattern causes translation lookaside buffer flushed frequently cache thrashing windows server 2008 microsoft officially supported hyper-v default vga drivers support windows aero higher resolutions rotation multi-monitor display however unofficial workarounds available certain cases older non-wddm graphics drivers sometimes cause performance issues though drivers always install smoothly windows server intel integrated graphics cards cause tlb flushing even wddm drivers nvidia graphics drivers experience problems long windows aero turned 3d applications running windows server 2008 r2 microsoft added support second level address translation hyper-v since slat required run hyper-v windows server problem continue occur non-slat cpu used accelerated graphics drivers however slat required run hyper-v client versions windows 8 hyper-v windows server 2008 support live migration guest vms live migration defined maintaining network connections uninterrupted services vm migration physical hosts instead hyper-v server 2008 enterprise datacenter editions supports quick migration guest vm suspended one host resumed another host operation happens time takes transfer active memory guest vm network first host second host however release windows server 2008 r2 live migration supported use cluster shared volumes csvs allows failover individual vm opposed entire host failover seems node hyper-v server vm fails vm running failed node may migrate live nodes independently vms lun running nodes share lun failed node hyper-v clustering hyper-v nodes vms. see also cluster shared volumes windows server 2012 implementation hyper-v version 3.0 introduced many new features increase vm mobility including ability execute simultaneous live migrations windows server 2008 r2 supported live migrating single vm time significantly increasing time required carry administrative tasks draining node scheduled maintenance real limiting factor hardware network bandwidth available windows server 2012 also supports new shared nothing live migration option traditional shared storage required order complete migration also referred “ live system migration ” shared nothing live migration move running vm storage one hyper-v host another without perceived downtime live migration different host os versions possible although soon addressed windows server 2012 r2 windows server 2012 also introduced ability use simple smb shares shared storage option conjunction new scale file services role server 2012 highly available environments alleviating need expensive sans particularly useful low budget environments without need sacrifice performance due many new improvements smb3 stack windows server 2012 fully support live migration vms running smb shares whether live live system migration hyper-v windows server 2012 also supports ability migrate running vm storage whereby active virtual machines storage moved one infrastructure another without vm workload affected reducing limitations associated vm mobility introduction windows server 2012 r2 smb 3.0 introduced transport option live migration either clustered non-clustered virtualization hosts enables hyper-v live migration leverage additional benefits smb 3.0 brings smb multichannel smb direct conjunction rdma nics increased live migration performance windows xp frequently accesses cpu apic task-priority register tpr interrupt request level changes causing performance degradation running guests hyper-v. microsoft fixed problem windows server 2003 later intel adds tpr virtualization flexpriority vt-x intel core 2 stepping e onwards alleviate problem amd similar feature amd-v uses new register purpose however means guest use different instructions access new register amd provides driver called amd-v optimization driver installed guest network card teaming link aggregation supported nic manufacturer supplied drivers support nic teaming however windows server 2012 thus version hyper-v included supports software nic teaming hyper-v management tools compatible windows vista home basic home premium windows 7 home premium home basic starter hyper-v 2012 managed windows 8 windows server 2012 successors hyper-v uses vt-x intel amd-v amd x86 virtualization since hyper-v native hypervisor long installed third-party software use vt-x amd-v. instance intel haxm android device emulator used android studio microsoft visual studio run hyper-v installed 64-bit skus windows 8 pro enterprise later come special version hyper-v called client hyper-v. windows server 2012 introduced many new features hyper-v. windows server 2012 r2 microsoft introduced another set new features hyper-v windows server 2016 windows 10 1607 adds hyper-v windows server 2019 windows 10 1809 adds | [
4293,
7879,
2182,
3937,
3263,
9,
1081,
378,
2198,
4684,
6096,
1475,
5396,
7553,
3978,
749,
7195,
5410,
5760,
7564,
5064,
2953,
422,
6844,
2245,
435,
5442,
4377,
5090,
3340,
7602,
6164,
458,
4759,
1534,
6885,
7619,
2999,
1925,
4398,
5475... | Test |
6,732 | 0 | Yseop:yseop yseop pronounced easy-op privately held multinational computer software company offices new york oxford uk lyon bogota dallas paris company commercialises artificial intelligence powered natural language generation software yseop compose flagship solution automates writing written reports financial services business intelligence marketing writes english spanish french german dutch japanese yseop commercializes natural language generation nlg software applies reasoning data turns written recommendations reports speed 3,000 pages per second software also used write newspaper stories data explain motivation context behind numbers date yseop software write english spanish french german premise self-service nlg software market yseop software used across variety industries financial industry including example société générale factset insurance 2014 tom austin vice president fellow gartner cited yseop narrative science automated insights part smart machine technological revolution promise one disruptive changes ever 2014 yseop also listed one top 10 innovative startups france electronic business group digital innovation summit paris 2015 yseop honored leading vendor—digital solutions financial advisors 2015 myprivatebanking research 2015 economist featured yseop one front cover articles 2016 ventana research named yseop software one innovative us year 2016 2019 future finance partnership deloitte granted societe generale innovative initiative year award digitization management control processes based yseop platform https //www.businesswire.com/news/home/20190410005068/fr/ research development yseop technology began 20 years ago team mathematical lab called ens cachan france yseop first commercialized product middleware end 2008 opened american subsidiary dallas texas 2012 yseop founded alain kaeser john rauscher sold start-up called sunopsis oracle 2006 competing companies yseop composein nlg industry include narrative science firm based chicago automated insights firm based durham north carolina retresco based berlin germany united robots sweden arria nlg yseop software suite also competes indirectly ibm watson | [
1718,
4600
] | Test |
6,733 | 3 | Java_processor:java processor java processor implementation java virtual machine jvm hardware words java bytecode makes instruction set abstract machine becomes instruction set concrete machine today popular form high-level language computer architecture many java processors available including | [
6181,
5012,
3915,
4418,
5190
] | Validation |
6,734 | 3 | Sorcerian:sorcerian first game developed nihon falcom fifth dragon slayer line games originally released nec pc-8801 1987 later ported personal computer platforms nec pc-9801 nec pc-88va sharp x1 turbo msx2 released title dragon slayer v sorcerian english version ms-dos pcs published sierra entertainment 1990 ports atari st commodore amiga apple iigs macintosh platforms announced released 1997 falcom released sorcerian forever microsoft windows-based pcs 2000 falcom released sorcerian original remake sorcerian microsoft windows-based pcs addition console versions sorcerian somewhat differing content pc counterparts developed version mega drive developed sega version pc engine cd developed victor musical industries version dreamcast developed victor interactive software mega drive version re-released wii virtual console september 16 2008 ios version released january 20 2012 sorcerian side-scrolling action-rpg player create ten characters four members present party time character highly customizable four different classes/races fighter wizard elf dwarf 60 possible jobs/occupations ranging clown exorcist available perform strengths weaknesses affecting seven primary attributes strength intelligence protection magic resistance vitality dexterity karma different ways well different equipment limitations player choose fifteen different scenarios quests play order choice party must battle enemies perform tasks within given levels clear scenario moving onto another scenario choice player controls entire party time four members running line jumping sequence attacking unison party members follow behind manner similar options arcade shooter gradius 1985 sorcerian also employs class-based puzzles using high-strength character force open doors characters default starting age 16 time player begins new scenario year passes additional time passes towns character goes training enchants items characters age different rates depending race humans reaching old age 60 dwarves 100 elves 200 upon reaching old age every year passes character die permanently random time also “ advance time ” speed flow time another new feature sorcerian episodic format extended across various expansion packs besides default fifteen scenarios come game number additional scenario packs released aging system created additional scenario packs mind number add-on expansion packs containing new scenarios developed pc-8801 version sorcerian falcom companies soundtrack original sorcerian composed yuzo koshiro mieko ishikawa reiko takebayashi hideya nagata takahito abe falcom-developed additional scenarios handled solely ishikawa music original sorcerian arranged kenji kawai pc engine cd release rob atesalp ken allen composed mt-32 midi-compatible arrangement soundtrack sierra entertainment english version game soundtrack releases sorcerian include 1990 famicom tsūshin famitsu reviewed sega mega drive genesis version game giving generally positive score 27 40 computer gaming world reviewed pc dos version october 1991 issue noted interesting feature two liked game division many miniquests stating instead usual long adventure one sports fifteen separate small quests allows certain amount variety however disliked magic system stated action arcade style typical japanese game find irksome noted hack-and-slash puzzles solved along way magazine concluded sorcerian good change pace comfortable arcade action 2008 game designer hideki kamiya listed sorcerian among favorite games time citing one games influenced work production platinumgames title scalebound kamiya said inspired sorcerian well hydlide 3 noted influence sorcerian nowiki /nowiki fantasy theme gigantic monsters different scenarios expansive possibilities tons adventures enemies hydra boss lots amazing dragons version sorcerian ios base game includes 5 free scenarios maximum party size 5 characters pay versions include 10 extra scenarios maximum party size 10 characters part sorcerian 25th anniversary 2012-12-06 2012-12-20 sorcerian ios released free 3 in-game items 10000gold revival lv3 x2 magic item x3 free registering aeriagames member gets revival lv3 x3 in-game items | [
543,
2207,
7128,
4759,
6380,
4277,
8098
] | Train |
6,735 | 3 | Deus_Ex_Machina_(video_game):deus ex machina video game deus ex machina video game designed created mel croucher published automata uk zx spectrum october 1984 later converted popular 8-bit formats game first accompanied fully synchronised soundtrack featured narration celebrity artists music cast included ian dury jon pertwee donna bailey frankie howerd e.p thompson croucher also composed music andrew stagg coded original spectrum version colin jones later known author/publisher colin bradshaw-jones programmer commodore 64 version game charts life defect formed machine conception growth evolution eventually death progression loosely based seven ages man shakespeare play like includes many quotations parodies despite critical acclaim time game conform conventions packaging pricing required distributors retailers game sold mail-order direct public subsequently gained cult status underground art game game name latin expression deus ex machina literally meaning god machine players game take control defected machine taken form human body players would experience different stages life way cell senile old considered visual-audio entertainment although game sound separated audio cassette tape needs played alongside game length audio cassette 46 minutes also length game although game could played without audio cassette would make easier understand help soundtrack soundtrack includes songs musical compositions also voices famous actors game comes full transcript speech could times played without audio deus ex machina zx spectrum 1984 mobygames retrieved 2018-12-11 croucher retrospectively viewed game disappointment saying sold game sensible price wanted put lovely poster nice packaging double vinyl gatefold result price £15 compared usual £8 meant sales low game broke even 2010 game included one titles book 1001 video games must play die re-imagining game went production 2010 title deus ex machina 2 design creation croucher new cast led sir christopher lee programmer chyna whyne machine chris madin defect joaquim de almeida defect police original ian dury session vocals 2014 croucher released book game history making new game book entitled deus ex machina best game never played life game sequel eventually released 2015 2018 rights automata uk games transferred company subvert ltd | [] | Test |
6,736 | 2 | Criticism_of_desktop_Linux:criticism desktop linux criticism desktop linux history comment perceived shortcomings linux operating system installed desktop computers criticisms questioned plethora choice usefulness desktop systems also multi-media playback audio development linux based android operating system dominates smartphone market many countries linux used new york stock exchange supercomputers used relatively desktop laptop computers linus torvalds expressed intended linux kernel used desktop operating systems argues android widely used comes pre-installed new phones linux distributions would need bundled new computers gain market share linux criticized number reasons including lack user-friendliness steep learning curve inadequate desktop use lacking support exotic hardware relatively small games library lacking native versions widely used applications missing gui api standardization critics believe linux ever gain large share desktop market may 2009 preston gralla contributing editor computerworld.com believed linux never important desktop/notebook users even though felt simple straightforward use low usage indicative low importance desktop market essay luxury ignorance open-source horror story eric s. raymond stated lack usability many open-source linux tools lack manuals lack thought users experience james donald princeton university analyzed shared library concepts several operation systems 2003 paper titled improved portability shared libraries worried lack windows application compatibility group equivalent desktop linux criticized late 2010 missed opportunity become significant force desktop computing pc world executive editor robert strohmeyer commented although linux exceptional security stability well great performance usability time desktop linux succeed missed nick farrell writing techeye felt release windows vista missed opportunity grab significant market share critics indicated linux fail desktop due geeky hard use obscure praise distributions strohmeyer saying best-known distribution ubuntu received high marks usability every major player technology press laid blame failure open-source community strohmeyer named fierce ideology open-source community large responsible farrell stated biggest killer putting penguin software desktop linux community think apple fanboys completely barking role models sanity loudmouthed open sauce religious loonies like many fundamentalists totally inflexible – waving gnu handed god richard stallman accusation over-zealous advocacy dealt previously 2006 dominic humphries stated aims linux community desktop market-share popularity linux best operating system made community choice applications free software development offers led people criticize linux confusing new users past well large number choices linux desktop operating systems although argued choice one key strengths linux tony mobily editor free software magazine identified problems server roots linux article 2009 software installation gnu/linux still broken – path fixing august 2014 debconf portland also linus torvalds voiced unhappiness binary application packaging linux distro ecosystem lack strong api standards multimedia criticised example adobe systems development blog penguin.swf discusses complicated linux audio infrastructure analysis welcome jungle nearly one dozen actively supported systems called audio jungle pulseaudio main developer lennart poettering stated difficult programmers know audio api use purpose linux past criticized lack driver support however largely due manufacturers supporting linux system n't 2004 ati started development linux drivers major adoption linux servers android encouraged driver development linux wireless driver support problem area linux one time many drivers missing users required use solutions ndiswrapper utilizes drivers made windows operating system broadcom particularly criticized releasing drivers issue also worked around extracting proprietary firmware use linux broadcom since released free open-source drivers linux kernel eliminating issues modern broadcom chipsets problem largely fixed recent years fairly large number drivers adding support wireless cards available today however many features still missing drivers mostly due manufacturers providing specifications documentation thus forcing developers reverse engineer cards | [
1807,
3938,
3613,
6422,
7528,
3271,
2559,
1100,
6443,
7555,
6117,
2240,
7956,
5453,
5803,
4759,
7242,
462,
1535,
6892,
4400,
1176,
3384,
4435,
2329,
2689,
1227,
5530,
5540,
1260,
3780,
573,
578,
4877,
2765,
3133,
2426,
2063,
7038,
4549,
... | Test |
6,737 | 1 | Schema_migration:schema migration software engineering schema migration also database migration database change management refers management incremental reversible changes relational database schemas schema migration performed database whenever necessary update revert database schema newer older version migrations performed programmatically using schema migration tool invoked specified desired schema version tool automates successive application reversal appropriate sequence schema changes brought desired state schema migration tools aim minimize impact schema changes existing data database despite preservation data general guaranteed schema changes deletion database column destroy data i.e values stored column rows table deleted instead tools help preserve meaning data reorganize existing data meet new requirements since meaning data often encoded configuration tools usually needs manual intervention schema migration allows fixing mistakes adapting data requirements change essential part software evolution especially agile environments see applying schema migration production database always risk development test databases tend smaller cleaner data better understood everything else fails amount data small enough human process production databases usually huge old full surprises surprises come many sources reasons migration process needs high level discipline thorough testing sound backup strategy developing software applications backed database developers typically develop application source code tandem evolving database schema code typically rigid expectations columns tables constraints present database schema whenever needs interact one version database schema code developed considered fully compatible version source code software testing developers may mock presence compatible database system unit testing level testing higher e.g integration testing system testing common developers test application local remote test database schematically compatible version source code test advanced applications migration subject migration testing schema migration technology data models longer need fully designed up-front capable adapted changing project requirements throughout software development lifecycle teams software developers usually use version control systems manage collaborate changes made versions source code different developers develop divergent relatively older newer branches source code make changes additions development supposing software development interacts database every version source code associated least one database schema compatible good software testing practice schema migrations performed test databases ensure schema compatible source code streamline process schema migration tool usually invoked part automated software build prerequisite automated testing phase schema migration tools said solve versioning problems database schemas version control systems solve versioning problems source code practice many schema migration tools actually rely textual representation schema changes files containing sql statements version history schema changes effectively stored alongside program source code within vcs approach ensures information necessary recover compatible database schema particular code branch recoverable source tree another benefit approach handling concurrent conflicting schema changes developers may simply use usual text-based conflict resolution tools reconcile differences schema migration tooling could seen facility track history evolving schema developers longer need remove entire test database order create new test database scratch e.g using schema creation scripts ddl generation tools generation test data costs lot time developers avoid regenerating test data small non-destructive changes schema | [
1905,
6604,
4296,
7330,
7341,
6345,
5561,
906,
5217,
6098,
4054,
2663,
2124,
6739,
3119,
3801,
7999,
5943,
6462,
2054,
6932,
6386,
684,
6390,
7937,
7303,
6144,
6320,
1902,
6594
] | Test |
6,738 | 3 | Oil's_Well:oil well oil well computer game published sierra on-line 1983 game written atari 8-bit family thomas j. mitchell oil well similar 1982 arcade game anteater re-themed drilling oil instead hungry insectivore ports released 1983 apple ii commodore 64 1984 colecovision ibm pc booter 1985 msx sharp x1 version improved visuals without mitchell involvement released ms-dos 1990 player attempts manage oil drilling operation collect oil done moving drill head maze using four directional control buttons head trailed pipeline connecting base subterranean creatures populate maze head destroy creatures pipeline vulnerable player traverses maze pipe grows longer pressing button quickly retracts head player advance eight different levels ahoy stated commodore version graphics sounds serviceable gameplay experience unique ... recommended infoworld called ibm pcjr version clever basic game early 1980s u.s. gaming magazine computer games awarded oil well 1984 golden floppy award excellence category maze game year despite already clone anteater several additional clones borrowed theme oil well pipeline run commodore 64 1990 oilmania atari st 1991 | [
6380
] | Test |
6,739 | 1 | Locks_with_ordered_sharing:locks ordered sharing databases transaction processing term locks ordered sharing comprises several variants two phase locking 2pl concurrency control protocol generated changing blocking semantics locks upon conflicts one variant identical strict commitment ordering sco | [
1905,
6604,
7330,
5209,
7341,
6345,
3951,
5289,
5561,
906,
5217,
6098,
4054,
6636,
2663,
2124,
6737,
3119,
3801,
7999,
2411,
5943,
2054,
6932,
6386,
684,
6390,
7937,
7303,
6144,
4457,
6320,
1902,
6594
] | Test |
6,740 | 4 | Kelihos_botnet:kelihos botnet kelihos botnet also known hlux botnet mainly involved spamming theft bitcoins kelihos botnet first discovered around researchers originally suspected found new version either storm waledac botnet due similarities modus operandi source code bot analysis botnet showed instead new 45,000-infected-computer-strong botnet capable sending estimated spam messages day microsoft took botnet operation codenamed operation b79 time microsoft filed civil charges dominique alexander piatti dotfree group sro 22 john doe defendants suspected involvement botnet issuing 3,700 subdomains used botnet charges later dropped microsoft determined named defendants intentionally aid botnet controllers january 2012 new version botnet discovered one sometimes referred kelihos.b version 2 consisting estimated 110,000 infected computers month microsoft pressed charges russian citizen andrey sabelnikov former security professional alleged creator kelihos botnet sourcecode second version botnet shut several privately owned firms sinkholing – technique gave companies control botnet cutting original controllers following shutdown second version botnet new version surfaced early 2 april though disagreement research groups whether botnet simply remnants disabled version 2 botnet new version altogether version botnet currently consists estimated 70,000 infected computers kelihos.c version mostly infects computers facebook sending users website malicious download links clicked trojan horse named fifesoc downloaded turns computer zombie part botnet 24 november 2015 kelihos botnet event occurred causing widespread false positives blacklisted ips ″november 24 2015 widespread false positives earlier today large scale kelihos botnet event occurred large scale many email installations seeing excess 20 kelihos spam see inbound email volume jump volume much 500 n't unusual thing normally cbl/xbl successfully dealing large scale kelihos spam spikes like often daily years email allegedly us federal reserve saying something restrictions u.s. federal wire ach online payments notice fraudulent attached excel spreadsheet .xls contained macro instructions downloader download windows executable virus likely dyreza dridex malware detection rules initially deployed cbl unfortunately insufficiently detailed listed number ip addresses error.″ affidavit unsealed february 5 2018 showed apple ’ unexpected role bringing russian spam king justice peter levashov allegedly ran kelihos botnet alias “ severa ” renting access spammers cybercriminals despite levashov ’ significant efforts anonymity court records show federal agents surveilling icloud account since may 20th 2016 funneling back crucial information may led arrest standing federal icloud warrant would given authorities running tab ip addresses used log account could easily tipped vacation barcelona spain arrested request us law enforcement extradited united states prosecution kelihos botnet so-called peer-to-peer botnet individual botnet nodes capable acting command-and-control servers entire botnet traditional non-peer-to-peer botnets nodes receive instructions work limited set servers – servers removed taken botnet longer receive instructions therefore effectively shut peer-to-peer botnets seek mitigate risk allowing every peer send instructions entire botnet thus making difficult shut first version botnet mainly involved denial-of-service attacks email spam version two botnet added ability steal bitcoin wallets well program used mine bitcoins spam capacity allows botnet spread sending malware links users order infect trojan horse though later versions mostly propagate social network sites particular facebook comprehensive list kelihos spam found following research paper february 2 2018 united states department justice announced russian national extradited spain arraigned connecticut charges stemming alleged operation kelihos botnet peter yuryevich levashov 37 also known pyotr levashov petr levashov peter severa petr severa sergey astakhov st. petersburg detained april 7 2017 barcelona arrested spanish authorities based upon criminal complaint arrest warrant issued united states district connecticut 3 february 2018 pleaded guilty charges wire email fraud hacking identity theft conspiracy appearing federal judge u.s. state connecticut remains detention september 2018 peter yuryevich levashov pleaded guilty | [
704,
2173,
376,
3277,
2923,
3281,
2209,
7186,
2577,
5401,
744,
2587,
51,
3323,
5779,
7600,
4025,
1528,
2632,
2991,
1173,
6526,
6904,
6541,
6194,
7657,
2678,
3038,
7294,
3047,
6569,
2693,
862,
7307,
6589,
4110,
1996,
7328,
2376,
1632,
59... | Test |
6,741 | 3 | Darwin_Core:darwin core darwin core often abbreviated dwc extension dublin core biodiversity informatics meant provide stable standard reference sharing information biological diversity terms described standard part larger set vocabularies technical specifications development maintained biodiversity information standards tdwg formerly known taxonomic databases working group tdwg darwin core body standards includes glossary terms contexts might called properties elements fields columns attributes concepts intended facilitate sharing information biological diversity providing reference definitions examples commentaries darwin core primarily based taxa occurrence nature documented observations specimens samples related information included standard documents describing terms managed set terms extended new purposes terms used simple darwin core specification one particular way use terms share data taxa occurrences simply-structured way likely meant someone suggest formatting data according darwin core term definition commentaries meant promote consistent use terms across applications disciplines evolving commentaries discuss refine expand translate definitions examples referred links comments attribute term approach documentation allows standard adapt new purposes without disrupting existing applications meant clear separation terms defined standard applications make use example though data types constraints provided term definitions recommendations made restrict values appropriate practice darwin core decouples definition semantics individual terms application terms different technologies xml rdf simple csv text files darwin core provides separate guidelines encode terms xml text files darwin core originally created z39.50 profile z39.50 biology implementers group zbig supported funding usa national science foundation award name darwin core first coined allen allison first meeting zbig held university kansas 1998 commenting profile conceptual similarity dublin core darwin core profile later expressed xml schema document use distributed generic information retrieval digir protocol tdwg task group created revise darwin core ratified metadata standard officially released 9 october 2009 though ratified tdwg/biodiversity information standards standard since darwin core numerous previous versions production usage published standard contains history details versions leading current standard | [
4868,
98,
1221
] | Test |
6,742 | 5 | XML_Configuration_Access_Protocol:xml configuration access protocol xml configuration access protocol xcap application layer protocol allows client read write modify application configuration data stored xml format server xcap maps xml document sub-trees element attributes http uris components directly accessed clients using http protocol xcap server used xcap clients store data like buddy lists presence policy combination sip presence server supports publish subscribe notify methods provide complete sip simple server solution following operations supported via xcap protocol client-server interaction operations executed following items xcap addressing mechanism based xpath provides ability navigate around xml tree following applications provided xcap using specific auid application unique id xcap protocol based following ietf standards rfc4825 rfc4826 rfc4827 rfc5025 application org.openmobilealliance.pres-rules standard added | [
7148,
456,
6879,
2281,
6521,
6976,
3775,
3855,
2644,
7170,
6531,
1462,
2650,
7637,
2119,
6908,
7091,
3383,
3640,
2219,
3797,
2043,
3312,
2057,
3819,
3820,
3821,
7214,
7217,
7765,
259,
5880
] | Test |
6,743 | 2 | Pkgsrc:pkgsrc pkgsrc package source package management system unix-like operating systems forked freebsd ports collection 1997 primary package management system netbsd since evolved independently 1999 support solaris added followed support operating systems pkgsrc currently contains 22,000 packages includes popular open-source software native package manager netbsd smartos minix 3 portable across 23 different operating systems including aix various bsd derivatives hp-ux irix linux macos solaris qnx multiple ways install programs using pkgsrc pkgsrc bootstrap contains traditional ports collection utilizes series makefiles compile software source another method install pre-built binary packages via pkg_add pkg_delete tools high-level utility named pkgin also exists designed automate installation removal update binary packages manner similar debian advanced packaging tool several vendors including joyent subsidiary samsung provide binary packages popular operating systems including macos linux october 3 1997 netbsd developers alistair crooks hubert feyrer created pkgsrc based freebsd ports system intended support netbsd packages collection officially released part netbsd 1.3 january 4 1998 dragonfly bsd used pkgsrc official package system version 1.4 2006 3.4 2013 2017-09-12 commit message policy accommodates dvcs established project netbsd foundation provides official pre-built binary packages multiple combinations netbsd pkgsrc releases occasionally certain operating systems well 2018 several vendors provide pre-built binary packages several platforms | [
5017,
5726,
4675,
6428,
5386,
732,
738,
2581,
7555,
2594,
6149,
781,
5092,
6505,
1155,
4759,
7619,
7251,
5817,
3366,
4778,
4059,
6211,
3036,
1582,
3732,
4441,
5518,
523,
163,
1598,
5530,
8037,
8055,
885,
1621,
1254,
5200,
5545,
6609,
62... | Test |
6,744 | 1 | Catalog_server:catalog server catalog server provides single point access allows users centrally search information across distributed network words indexes databases files information across large network allows keywords boolean searches need provide comprehensive searching service intranet extranet even internet catalog server standard solution | [
173
] | Test |
6,745 | 3 | Last_Armageddon:last armageddon described antithesis dragon quest fantasy series introductory story deals life organisms humans animals wiped mysterious force music game considered representative hiroharu hayama early works composer japanese video games late 1980s early 1990s hayama often used music make games feel spooky dark game sequel armageddon gaiden released sega cd 1994 working designs planned release game north america side story armageddon 1995 localization cancelled due demise sega cd system humans breathed toxin-filled air earth surface became one earth kept dissolving history humanity ended dominion planet returned demons mutant creatures depend oxygen survive therefore able breathe air use land meanwhile army robots wage world war iv demons order conquer known makai demon world robots came planet wave energy created explosion turned world wasteland much later game concurrent themes including adolf hitler war creating perfect race people destruction humanity year 1999 revealed player inside one robot main bases demons gain dominion humans old planet robots impose millennium logic dictatorial force throughout makai playing robots option open player therefore player must take advantage mutant army crush robot invaders game builds theme impending world domination machines popularized famously terminator series gameplay similar final fantasy featuring turn-based fights viewed third-person perspective demon soldiers enemies may cast magic spells physical attacks magic attacks ability inflict poison damage player creatures creature poisoned player must spare creature magic points order cure affected monster spell letting creature remain poisoned certain amount time eventually lead death game plays like role-playing video game graves fallen demons home base remind player situation game player first starts game go right experienced monsters lie stadium-shaped power station southeastern corner map take foursome level 5-10 characters order defeat robots inside dome characters advance level monster images change slightly time characters advance levels 17 34 maximum possible levels monsters look completely slimy fusion cells get ugly two groups four monsters player controls daytime group nighttime group becomes night game daytime group becomes inactive nighttime group takes however hp/mp replenishment group becomes inactive next morning night phase although monsters use healing spells cure conditions like poisoning known way cure hp game via items spread throughout dungeons game using magic spell nintendo family computer version lacks monster encyclopedia exists versions game none background music game resemble pc engine fm towns version likely famicom version developed different company also four different people worked soundtrack two versions existed fm towns version large memory version normal levels animation small memory version slightly reduced levels animation fm towns version also comes series three cd-roms requires 1 megabyte ram low memory version 2 megabytes ram high memory version one character equipped powerful sword azotto person pre-determined game 3.5 floppy disk needed save game purchased separately game pc engine version 3d maps shown flat two-dimensional dungeons goblins orcs equipped swords unlike versions transition time daytime night time characters eliminated pc engine version leading immediate swap characters | [
3796,
6380
] | Test |
6,746 | 3 | Knight_Orc:knight orc knight orc standard text adventure game limited graphics platforms level 9 released 1987 comes short novella peter mcbride sign orc explaining background story night heavy drinking friends grindleguts orc awakes find strapped horse joust human knight friends nowhere seen must somehow escape predicament get even grindleguts must survive world hostile humans seeking revenge tormentors first chapter game switches science fiction setting grindleguts revealed malfunctioning non-player character futuristic massively multiplayer online role-playing game using power transitioning fantasy reality convinces several bots join escapes simulated reality facility sinclair user say knight orc ordinary adventure oh multi-user adventure ... players simulated one nice touch little bits added end descriptions tell players 'somewhere male voice cries anyone got spare treasure ... location descriptions exquisite make absence graphics ... humour worked text like something douglas adams novel quick-fire enjoyable never droll ... high spot game interactive characters ... characters goal complete one thing common hate orcs ... technically pawn may superior plot enjoyment atmosphere knight orc wins hands computer gaming world stated graphics waste disk space puzzles uneven however excellent parser virtues resulted average game computer magazine said disappointing atari magazine page 6 said excellent value money atari 8-bit version | [
6380
] | Test |
6,747 | 4 | Theta_Networks:theta networks theta networks new jersey based telecommunication solutions company founded 2005 company develops deep packet inspection-based software used monitoring optimization subscriber management security mobile networks theta networks major supplier nokia siemens networks ericsson motorola orange china mobile assisted china mobile olympic games recently theta networks also working china mobile monitoring support new td-scdma networks theta solutions reassembles finds relationships subscriber application sessions open systems interconnection layer 7 using deep packet inspection cross packet inspection cross session inspection technology applied mobile use wap mms sms http dns streaming technology theta networks also offers virusguardmax dpi-based network security product company offices new jersey south america china theta networks company works france partner also recently established partnerships australia russia | [
4101,
651,
2043
] | Train |
6,748 | 4 | Fault_tolerance:fault tolerance fault tolerance property enables system continue operating properly event failure one faults within components operating quality decreases decrease proportional severity failure compared naively designed system even small failure cause total breakdown fault tolerance particularly sought high-availability life-critical systems ability maintaining functionality portions system break referred graceful degradation fault-tolerant design enables system continue intended operation possibly reduced level rather failing completely part system fails term commonly used describe computer systems designed continue less fully operational perhaps reduction throughput increase response time event partial failure system whole stopped due problems either hardware software example another field motor vehicle designed continue drivable one tires punctured structure able retain integrity presence damage due causes fatigue corrosion manufacturing flaws impact within scope individual system fault tolerance achieved anticipating exceptional conditions building system cope general aiming self-stabilization system converges towards error-free state however consequences system failure catastrophic cost making sufficiently reliable high better solution may use form duplication case consequence system failure catastrophic system must able use reversion fall back safe mode similar roll-back recovery human action humans present loop highly fault-tolerant system might continue level performance even though one components failed example building backup electrical generator provide voltage wall outlets even grid power fails system designed fail safe fail-secure fail gracefully whether functions reduced level fails completely way protects people property data injury damage intrusion disclosure computers program might fail-safe executing graceful exit opposed uncontrolled crash order prevent data corruption experiencing error similar distinction made failing well failing badly fail-deadly opposite strategy used weapon systems designed kill injure targets even part system damaged destroyed system designed experience graceful degradation fail soft used computing similar fail safe operates reduced level performance component failures example building may operate lighting reduced levels elevators reduced speeds grid power fails rather either trapping people dark completely continuing operate full power computing example graceful degradation insufficient network bandwidth available stream online video lower-resolution version might streamed place high-resolution version progressive enhancement example computing web pages available basic functional format older small-screen limited-capability web browsers enhanced version browsers capable handling additional technologies larger display available fault-tolerant computer systems programs considered robust designed continue operation despite error exception invalid input instead crashing completely software brittleness opposite robustness resilient networks continue transmit data despite failure links nodes resilient buildings infrastructure likewise expected prevent complete failure situations like earthquakes floods collisions system high failure transparency alert users component failure occurred even continues operate full performance failure repaired imminent complete failure anticipated likewise fail-fast component designed report first point failure rather allow downstream components fail generate reports allows easier diagnosis underlying problem may prevent improper operation broken state single fault condition situation one means protection hazard defective single fault condition results unavoidably another single fault condition two failures considered one single fault condition source offers following example redundancy provision functional capabilities would unnecessary fault-free environment consist backup components automatically kick one component fails example large cargo trucks lose tire without major consequences many tires one tire critical exception front tires used steer generally carry less load total four 16 less likely fail idea incorporating redundancy order improve reliability system pioneered john von neumann 1950s two kinds redundancy possible space redundancy time redundancy space redundancy provides additional components functions data items unnecessary fault-free operation space redundancy classified hardware software information redundancy depending type redundant resources added system time redundancy computation data transmission repeated result compared stored copy previous result current terminology kind testing referred 'in service fault tolerance testing isftt short providing fault-tolerant design every component normally option associated redundancy brings number penalties increase weight size power consumption cost well time design verify test therefore number choices examined determine components fault tolerant example component passes tests car occupant restraint system normally think primary occupant restraint system gravity vehicle rolls undergoes severe g-forces primary method occupant restraint may fail restraining occupants accident absolutely critical safety pass first test accidents causing occupant ejection quite common seat belts pass second test cost redundant restraint method like seat belts quite low economically terms weight space pass third test therefore adding seat belts vehicles excellent idea supplemental restraint systems airbags expensive pass test smaller margin another excellent long-term example principle put practice braking system whilst actual brake mechanisms critical particularly prone sudden rather progressive failure case necessarily duplicated allow even balanced application brake force wheels would also prohibitively costly double-up main components would add considerable weight however similarly critical systems actuating brakes driver control inherently less robust generally using cable rust stretch jam snap hydraulic fluid leak boil develop bubbles absorb water thus lose effectiveness thus modern cars footbrake hydraulic brake circuit diagonally divided give two smaller points failure loss either reducing brake power 50 causing much dangerous brakeforce imbalance straight front-back left-right split hydraulic circuit fail completely relatively rare occurrence failsafe form cable-actuated parking brake operates otherwise relatively weak rear brakes still bring vehicle safe halt conjunction transmission/engine braking long demands line normal traffic flow cumulatively unlikely combination total foot brake failure need harsh braking emergency likely result collision still one lower speed would otherwise case comparison foot pedal activated service brake parking brake less critical item unless used one-time backup footbrake cause immediate danger found nonfunctional moment application therefore redundancy built per se typically uses cheaper lighter less hardwearing cable actuation system suffice happens hill use footbrake momentarily hold vehicle still driving find flat piece road stop alternatively shallow gradients transmission shifted park reverse first gear transmission lock engine compression used hold stationary need include sophistication first bring halt motorcycles similar level fail-safety provided simpler methods firstly front rear brake systems entirely separate regardless method activation cable rod hydraulic allowing one fail entirely whilst leaving unaffected secondly rear brake relatively strong compared automotive cousin even powerful disc sports models even though usual intent front system provide vast majority braking force overall vehicle weight central rear tyre generally larger grippier rider lean back put weight therefore allowing brake force applied wheel locks cheaper slower utility-class machines even front wheel use hydraulic disc extra brake force easier packaging rear usually primitive somewhat inefficient exceptionally robust rod-actuated drum thanks ease connecting footpedal wheel way importantly near impossibility catastrophic failure even rest machine like lot low-priced bikes first years use point collapse neglected maintenance basic characteristics fault tolerance require addition fault-tolerant systems characterized terms planned service outages unplanned service outages usually measured application level hardware level figure merit called availability expressed percentage example five nines system would statistically provide 99.999 availability fault-tolerant systems typically based concept redundancy spare components address first fundamental characteristic fault tolerance three ways implementations raid redundant array independent disks except raid 0 examples fault-tolerant storage device uses data redundancy lockstep fault-tolerant machine uses replicated elements operating parallel time replications element state inputs provided replication outputs expected outputs replications compared using voting circuit machine two replications element termed dual modular redundant dmr voting circuit detect mismatch recovery relies methods machine three replications element termed triple modular redundant tmr voting circuit determine replication error two-to-one vote observed case voting circuit output correct result discard erroneous version internal state erroneous replication assumed different two voting circuit switch dmr mode model applied larger number replications lockstep fault-tolerant machines easily made fully synchronous gate replication making state transition edge clock clocks replications exactly phase however possible build lockstep systems without requirement bringing replications synchrony requires making internal stored states started fixed initial state reset state alternatively internal state one replica copied another replica one variant dmr pair-and-spare two replicated elements operate lockstep pair voting circuit detects mismatch operations outputs signal indicating error another pair operates exactly way final circuit selects output pair proclaim error pair-and-spare requires four replicas rather three tmr used commercially fault-tolerant design advantages obvious many disadvantages hardware fault tolerance sometimes requires broken parts taken replaced new parts system still operational computing known hot swapping system implemented single backup known single point tolerant represents vast majority fault-tolerant systems systems mean time failures long enough operators time fix broken devices mean time repair backup also fails helps time failures long possible specifically required fault-tolerant system fault tolerance notably successful computer applications tandem computers built entire business machines used single-point tolerance create nonstop systems uptimes measured years fail-safe architectures may encompass also computer software example process replication data formats may also designed degrade gracefully html example designed forward compatible allowing new html entities ignored web browsers understand without causing document unusable difference fault tolerance systems rarely problems instance western electric crossbar systems failure rates two hours per forty years therefore highly fault resistant fault occur still stopped operating completely therefore fault tolerant | [
4472,
4387,
1624,
1831,
5734,
5735,
7051,
1197,
6461,
1112,
1391,
2043,
1394,
1805,
5409,
7748,
2773,
7570,
2054,
5447,
8117,
5863,
5602,
1408,
4898,
1315,
6144,
4195,
3751,
4199,
700,
4742,
4462,
2442,
2536,
5890
] | Test |
6,749 | 0 | Sture_Allén:sture allén sture allén born 31 december 1928 swedish retired professor computational linguistics university gothenburg permanent secretary swedish academy 1986 1999 born gothenburg elected chair 3 swedish academy 1980 also member norwegian academy science letters | [
1314
] | Test |
6,750 | 9 | Defunctionalization:defunctionalization programming languages defunctionalization refers compile-time transformation eliminates higher-order functions replacing single first-order apply function technique first described john c. reynolds 1972 paper definitional interpreters higher-order programming languages reynolds observation given program contains finitely many function abstractions assigned replaced unique identifier every function application within program replaced call apply function function identifier first argument apply function job dispatch first argument perform instructions denoted function identifier remaining arguments one complication basic idea function abstractions may reference free variables situations defunctionalization must preceded closure conversion lambda lifting free variables function abstraction passed extra arguments apply addition closures supported first-class values becomes necessary represent captured bindings creating data structures instead single apply function dispatch function abstractions program various kinds control flow analysis including simple distinctions based arity type signature employed determine function may called function application site specialized apply function may referenced instead alternately target language may support indirect calls function pointers may efficient extensible dispatch-based approach besides use compilation technique higher-order functional languages defunctionalization studied particularly olivier danvy collaborators way mechanically transforming interpreters abstract machines defunctionalization also related technique object-oriented programming representing functions function objects alternative closures example given olivier danvy translated haskell given tree datatype defunctionalize following program defunctionalize replacing higher-order functions codice_1 codice_2 codice_3 value codice_4 datatype instead calling directly introduce codice_5 function interprets datatype | [
7152,
6778,
7391,
4039,
7416,
6982
] | Test |
6,751 | 5 | TDM-to-packet_conversion:tdm-to-packet conversion tdm-to-packet conversion process converting digital signal tdm format typically 64 kbit/second signal encoded mu-law a-law compression packets typically rtp packets carrying packet network internet conversion process may include recoding different codec silence suppression comfort noise generation tricks decrease bandwidth requirement improve perceived voice quality result note conversion signal tunnelling unlike tdm ip aims transporting tdm signal unchanged across ip network see also voice ip | [] | Validation |
6,752 | 1 | Variable_data_publishing:variable data publishing variable-data publishing vdp also known database publishing term referring output variable composition system systems produce electronically viewable hard-copy print output variable-data publishing term today often distinguishes output destined electronic viewing rather destined hard-copy print e.g variable data printing essentially techniques employed perform variable-data publishing utilized variable data printing difference interpretation output variable-data printing may interpreted produce various print streams page-description files e.g afp/ipds postscript pcl variable-data publishing produces electronically viewable files commonly seen forms pdf html xml variable-data composition involves use data conditionally variable-data may simple address block salutation however document textual content—including words sentences paragraphs pages entire document words make little much document composer desires variable data may also used exhibit various images logos products membership photos variable-data used build rule-based design schemes including fonts colors page formats possibilities vast variable-data tools available today make possible perform variable-data composition nearly every stage document production however level control achieved varies based upon far document production process variable-data tool deployed example variable-data insertion occurs prior output ... likely text flow layout altered nearly much control would available time initial document composition many organizations produce multiple forms output aka multi-channel output document ensures published content available recipients via form access method might require multi-channel output utilized integrity output channels often becomes important variable-data publishing may performed everything personal computer mainframe system however speed practical output volumes achieved directly affected computer power utilized term variable-data publishing likely offshoot term variable-data printing first introduced printing industry frank romano professor emeritus school print media college imaging arts sciences rochester institute technology however concept merging static document elements variable document elements predates term seen various implementations ranging simple desktop 'mail merge complex mainframe applications financial banking industry past term vdp closely associated digital printing machines however past 3 years application technology spread web pages emails mobile messaging | [
1226,
4780,
6015,
6016,
6390
] | Validation |
6,753 | 3 | ARM_Cortex-R:arm cortex-r arm cortex-r family 32-bit risc arm processor cores licensed arm holdings cores optimized hard real-time safety-critical applications cores family implement arm real-time r profile one three architecture profiles two application profile implemented cortex-a family microcontroller profile implemented cortex-m family arm cortex-r family microprocessors currently consists arm cortex-r4 f arm cortex-r5 f arm cortex-r7 f arm cortex-r8 f arm cortex-r52 f arm cortex-r family arm cores implementing r profile arm architecture profile designed high performance hard real-time safety critical applications similar profile applications processing adds features make fault tolerant suitable use hard real-time safety critical applications real time safety critical features added include arm holdings neither manufactures sells cpu devices based designs rather licenses core designs interested parties arm offers variety licensing terms varying cost deliverables licensees arm provides integratable hardware description arm core well complete software development toolset right sell manufactured silicon containing arm cpu integrated device manufacturers idm receive arm processor ip synthesizable rtl written verilog form ability perform architectural level optimizations extensions allows manufacturer achieve custom design goals higher clock speed low power consumption instruction set extensions optimizations size debug support etc determine components included particular arm cpu chip consult manufacturer datasheet related documentation cortex-r suitable use computer-controlled systems low latency and/or high level safety required example hard real-time safety critical application would modern electronic braking system automobile system needs fast responsive plethora sensor data input also responsible human safety failure system could lead severe injury loss life examples hard real-time and/or safety critical applications include | [
7519,
6082,
6421,
7890,
722,
2926,
1473,
7905,
5752,
4336,
5405,
5055,
5406,
1864,
5762,
67,
5079,
1150,
446,
7960,
451,
6165,
463,
804,
5472,
469,
4041,
3008,
3365,
1556,
7990,
6910,
1197,
4061,
5845,
7654,
6919,
3397,
1977,
2711,
1995... | Test |
6,754 | 2 | NuBus:nubus nubus pron 'new bus 32-bit parallel computer bus originally developed mit standardized 1987 part numachine workstation project first complete implementation nubus done western digital numachine lisp machines inc. lmi lambda nubus later incorporated lisp products texas instruments explorer used main expansion bus apple computer next longer widely used outside embedded market early microcomputer buses like s-100 often connections pins microprocessor power rails meant change computer architecture generally led new bus well looking avoid problems future nubus designed independent processor general architecture details i/o handling among many advanced features era nubus used 32-bit backplane 8- 16-bit busses common seen making bus future-proof generally believed 32-bit systems would arrive near future 64-bit buses beyond would remain impractical excessive addition nubus agnostic processor buses point conformed signalling data standards machine plugged big little endian instance nubus made assumptions meant nubus card could plugged nubus machine long appropriate device driver order select proper device driver nubus included id scheme allowed cards identify host computer startup meant user n't configure system bane bus systems point instance isa driver configured card memory required interrupts used nubus required configuration making one first examples plug-and-play architecture downside flexibility made nubus much simpler user device driver authors made things difficult designers cards whereas simple bus systems easily supported handful input/output chips designed used cpu mind nubus every card computer convert everything platform-agnostic nubus world typically meant adding nubus controller chip bus i/o chips card increasing costs trivial exercise today one newer buses require 1980s nubus considered complex expensive nubus became standard 1987 ieee 1196 version used standard 96-pin three-row connector running system 10 mhz clock maximum burst throughput 40 mb/s average speeds 10 20 mb/s later addition nubus 90 increased clock rate 20 mhz better throughput burst increasing 70 mb/s average 30 mb/s nubus first developed commercially western digital numachine first used production product licensee lisp machines inc. lmi-lambda lisp machine project development group sold western digital texas instruments 1984 technology incorporated ti explorer also lisp machine 1986 texas instruments used nubus s1500 multiprocessor unix system later texas instruments symbolics developed lisp machine nubus boards ti microexplorer symbolics macivory based lisp supporting microprocessors nubus boards co-processor lisp machines apple macintosh line mac ii mac quadras nubus also selected apple computer use macintosh ii project plug-n-play nature fit well mac philosophy ease-of-use used macintosh ii series made professional-level mac lineup late 1980s upgraded nubus 90 starting macintosh quadras used mid-1990s early quadras supported 20 mhz rate two cards talking since motherboard controller upgraded later addressed nubus implementation 660av 840av models improved nubus controller used first generation power macintosh 6100 7100 8100 models later power mac models adopted intel pci bus apple nubus implementation used pin socket connectors back card rather edge connectors phillips screws inside case cards use making much easier install cards apple computers also supplied always-on +5 v trickle power supply tasks watching phone line computer turned apparently part unapproved nubus standard nubus also selected next computer line machines used different physical pcb layout nubus appears seen little use outside roles apple switched pci mid 1990s nubus quickly disappeared | [
3346,
4389,
5463,
5469,
4768,
5916,
5477,
1933,
1094,
4321,
5037,
6014,
6200,
4066,
2765,
3387,
3390,
7569,
5952,
685,
8139,
4551,
3920,
4373,
3755,
267,
5450
] | Test |
6,755 | 1 | Percona_Server_for_MySQL:percona server mysql percona server mysql distribution mysql relational database management system created percona percona server mysql open source relational database management system rdbms free fully compatible drop replacement oracle mysql software includes number scalability availability security backup features available mysql commercial enterprise edition software includes xtradb enhanced distribution innodb storage engine developers aim retain close compatibility official mysql releases focusing performance increased visibility server operations | [
7957,
5717,
5983,
7248,
1359,
5126,
5571,
6279,
578,
4708,
4167,
3652,
1491,
4363,
5780,
6056,
3915,
1695,
2259,
7598,
1435
] | Test |
6,756 | 4 | Cyberwarfare:cyberwarfare cyberwarfare broad term describing use technological force within cyberspace ‘ cyberwarfare ’ imply scale protraction violence typically associated term ‘ war ’ significant debate among experts regarding definition cyberwarfare even thing exists term ‘ cyberwarfare ’ misnomer date offensive cyber actions could described ‘ war ’ offensive cyber actions estonia 2007 georgia 2008 iran 2010 north korea occurred context international relations resulting condemnation denial sides cyberwarfare may meet typical definition term war however many states including united states united kingdom russia india china israel iran north korea vietnam active cyber operations offensive defensive operations states explore use cyber operations combine capabilities likelihood physical confrontation violence playing result part cyber operation increased however meeting scale protracted nature war unlikely thus ambiguity remains first instance kinetic force used response cyber-attack resulting loss human life observed may 5 2019 israel defense forces targeted destroyed building associated on-going cyber-attack 'cyberwarfare used board context denote interstate use technological force within computer networks information stored shared communicated online term warfare significant differences term 'war invokes ideas scale protraction cyberwarfare also distinct closely related 'cyber espionage 'cyber terrorism 'cyber crime term definition remain subject debate absolute definition widely agreed paulo shakarian colleagues put forward following definition drawing various works including clausewitz definition war war continuation politics means cyberwarfare extension policy actions taken cyberspace state actors non-state actors significant state direction support constitute serious threat another state security action nature taken response serious threat state security actual perceived definitions focus act penetrating states computer network infrastructure businesses organisations within target nation former us national coordinator security infrastructure protection counter-terrorism richard a. clarke defines cyberwarfare actions nation-state penetrate another nation computers networks purposes causing damage disruption majority scholars military governments use definition refer state state-sponsored actors actors provided significant direction support state definitions may include non-state actors terrorist groups companies political ideological extremist groups terrorist hacktivists transnational criminal organizations depending context work debate whether term 'cyberwarfare accurate eugene kaspersky founder kaspersky lab concludes cyberterrorism accurate term cyberwar states today attacks clueless strike cyber-war cyberterrorism howard schmidt former cyber security coordinator obama administration said cyberwar ... think terrible metaphor think terrible concept winners environment experts take issue possible consequences linked warfare analogy ron deibert canada citizen lab warned militarization cyberspace militaristic responses may appropriate although date even serious cyber attacks disrupted large parts nations electrical grids 230,000 customers ukraine 2015 affected access medical care thus endangering life nhs wannacry 2017 lead military action oxford academic lucas kello proposed new term – unpeace – denote highly damaging cyber actions whose non-violent effects rise level traditional war actions neither warlike peacelike although non-violent thus acts war damaging effects economy society may greater even armed attacks term closely related concept grey zone come prominence recent years describing actions fall traditional threshold war term 'cyberwarfare distinct term 'cyber war cyber warfare includes techniques tactics procedures may involved cyber war discussed term war inherently refers large scale action typically protracted period time may include objectives seeking utilize violence aim kill cyber war could accurately describe protracted period back-and-forth cyber attacks including combination traditional military action nations date action known occurred although tit-for-tat military-cyber actions occurred june 2019 united states launched cyber attack iranian weapons systems retaliation shooting us drone strait hormuz cyber warfare present multitude threats towards nation basic level cyber attacks used support traditional warfare example tampering operation air defences via cyber means order facilitate air attack aside hard threats cyber warfare also contribute towards soft threats espionage propaganda eugene kaspersky founder kaspersky lab equates large-scale cyber weapons flame nettraveler company discovered biological weapons claiming interconnected world potential equally destructive traditional espionage act war cyber-espionage generally assumed ongoing major powers despite assumption incidents cause serious tensions nations often described attacks example cyber attacks 25 espionage based computers satellites coordinate activities vulnerable components system could lead disruption equipment compromise military systems c4istar components responsible orders communications could lead interception malicious replacement power water fuel communications transportation infrastructure may vulnerable disruption according clarke civilian realm also risk noting security breaches already gone beyond stolen credit card numbers potential targets also include electric power grid trains stock market mid-july 2010 security experts discovered malicious software program called stuxnet infiltrated factory computers spread plants around world considered first attack critical industrial infrastructure sits foundation modern economies notes new york times stuxnet extremely effective delaying iran nuclear program development nuclear weaponry came high cost first time became clear could cyber weapons defensive could offensive large decentralization scale cyberspace makes extremely difficult direct policy perspective non-state actors play large part cyberwar space state actors leads dangerous sometimes disastrous consequences small groups highly skilled malware developers able effectively impact global politics cyber warfare large governmental agencies major aspect ability lies willingness groups share exploits developments web form arms proliferation allows lesser hackers become proficient creating large scale attacks small handful skillful enough manage addition thriving black markets kinds cyber weapons buying selling cyber capabilities highest bidder without regard consequences computing denial-of-service attack dos attack distributed denial-of-service attack ddos attack attempt make machine network resource unavailable intended users perpetrators dos attacks typically target sites services hosted high-profile web servers banks credit card payment gateways even root nameservers dos attacks may limited computer-based methods strategic physical attacks infrastructure devastating example cutting undersea communication cables may severely cripple regions countries regards information warfare ability federal government united states admits electric power grid susceptible cyberwarfare united states department homeland security works industries identify vulnerabilities help industries enhance security control system networks federal government also working ensure security built next generation smart grid networks developed april 2009 reports surfaced china russia infiltrated u.s. electrical grid left behind software programs could used disrupt system according current former national security officials north american electric reliability corporation nerc issued public notice warns electrical grid adequately protected cyber attack china denies intruding u.s. electrical grid one countermeasure would disconnect power grid internet run net droop speed control massive power outages caused cyber attack could disrupt economy distract simultaneous military attack create national trauma iranian hackers possibly iranian cyber army pushed massive power outage 12 hours 44 81 provinces turkey holding 40 million people istanbul ankara among places suffering blackout howard schmidt former cyber-security coordinator us commented possibilities possible hackers gotten administrative computer systems utility companies says n't linked equipment controlling grid least developed countries schmidt never heard grid hacked june 2019 russia said electrical grid cyber-attack united states new york times reported american hackers united states cyber command planted malware potentially capable disrupting russian electrical grid cyber propaganda effort control information whatever form takes influence public opinion form psychological warfare except uses social media fake news websites digital means 2018 sir nicholas carter chief general staff british army stated kind attack actors russia form system warfare seeks de-legitimise political social system military strength based jowell o'donnell 2006 state propaganda deliberate systematic attempt shape perceptions manipulate cognitions direct behavior achieve response furthers desired intent propagandist p. 7 internet phenomenal means communication people get message across huge audience opens window evil terrorist organizations use medium brainwash people suggested restricted media coverage terrorist attacks would turn decrease number terrorist attacks occur afterwards cowen 2006 2017 wannacry petya notpetya cyber attacks masquerading ransomware caused large-scale disruptions ukraine well u.k. ’ national health service pharmaceutical giant merck maersk shipping company organizations around world attacks also categorized cybercrimes specifically financial crime negatively affects company group idea cyber pearl harbor debated scholars drawing analogy historical act war others used cyber 9/11 draw attention nontraditional asymmetric irregular aspect cyber action state number reasons nations undertake offensive cyber operations cyber security expert adviser nato advocates states take cyber warfare seriously viewed attractive activity many nations times war peace offensive cyber operations offer large variety cheap risk-free options weaken countries strengthen positions considered long-term geostrategic perspective cyber offensive operations cripple whole economies change political views agitate conflicts within among states reduce military efficiency equalize capacities high-tech nations low-tech nations use access critical infrastructures blackmail u.s. general keith b. alexander first head uscybercom told senate armed services committee computer network warfare evolving rapidly mismatch technical capabilities conduct operations governing laws policies cyber command newest global combatant sole mission cyberspace outside traditional battlefields land sea air space attempt find necessary neutralize cyberattacks defend military computer networks alexander sketched broad battlefield envisioned computer warfare command listing kind targets new headquarters could ordered attack including traditional battlefield prizes – command-and-control systems military headquarters air defense networks weapons systems require computers operate one cyber warfare scenario cyber shockwave wargamed cabinet level former administration officials raised issues ranging national guard power grid limits statutory authority distributed nature internet based attacks means difficult determine motivation attacking party meaning unclear specific act considered act war examples cyberwarfare driven political motivations found worldwide 2008 russia began cyber attack georgian government website carried along georgian military operations south ossetia 2008 chinese 'nationalist hackers attacked cnn reported chinese repression tibet jobs cyberwarfare become increasingly popular military four branches united states military actively recruit cyber warfare positions potential targets internet sabotage include aspects internet backbones web internet service providers varying types data communication mediums network equipment would include web servers enterprise information systems client server systems communication links network equipment desktops laptops businesses homes electrical grids financial networks telecommunication systems also deemed vulnerable especially due current trends computerization automation politically motivated hacktivism involves subversive use computers computer networks promote agenda potentially extend attacks theft virtual sabotage could seen cyberwarfare – mistaken hacktivists use knowledge software tools gain unauthorized access computer systems seek manipulate damage material gain cause widespread destruction draw attention cause well-publicized disruptions select targets anonymous hacktivist groups often portrayed media cyber-terrorists wreaking havoc hacking websites posting sensitive information victims threatening attacks demands met however hacktivism politically motivated change world use fundamentalism groups like anonymous divided opinion methods cyber attacks including ransomeware used generate income states use techniques generate significant sources income evade sanctions perhaps simultaneously harming adversaries depending targets tactic observed august 2019 revealed north korea generated 2 billion fund weapons program avoiding blanket sanctions levied united states united nations european union computer hacking represents modern threat ongoing global conflicts industrial espionage presumed widely occur typical type crime underreported extent known according mcafee george kurtz corporations around world face millions cyberattacks day attacks n't gain media attention lead strong political statements victims type crime usually financially motivated examinations issue cyberwarfare achieving profit personal gain still institutes companies like university cincinnati kaspersky security lab trying increase sensibility topic researching publishing new security threats number countries conduct exercise increase preparedness explore strategy tactics operations involved conducting defending cyber attacks nations typically done form war games cooperative cyber defence centre excellence ccdce part north atlantic treaty organisation nato conducted yearly war game called locked shields since 2010 designed test readiness improve skills strategy tactics operational decision making participating national organisations locked shields 2019 saw 1200 participants 30 nations compete red team vs. blue team exercise war game involved fictional country berylia experiencing deteriorating security situation number hostile events coincide coordinated cyber attacks major civilian internet service provider maritime surveillance system attacks caused severe disruptions power generation distribution 4g communication systems maritime surveillance water purification plant critical infrastructure components ccdce describe aim exercise maintain operation various systems intense pressure strategic part addresses capability understand impact decisions made strategic policy level ultimately france winner locked shields 2019 european union conduct cyber war game scenarios member states partner nations improve readiness skills observe strategic tactical decisions may affect scenario well war games serve broader purpose explore options improve skills cyber war games targeted preparing specific threats 2018 sunday times reported uk government conducting cyber war games could blackout moscow types war games move beyond defensive preparedness previously described onto preparing offensive capabilities used deterrence 'war approximately 120 countries developing ways use internet weapon target financial markets government computer systems utilities foreign policy magazine puts size china hacker army anywhere 50,000 100,000 individuals diplomatic cables highlight us concerns china using access microsoft source code 'harvesting talents private sector boost offensive defensive capabilities 2018 cyberattack marriott hotel chain collected personal details roughly 500 million guests known part chinese intelligence-gathering effort also hacked health insurers security clearance files millions americans hackers suspected working behalf ministry state security country communist-controlled civilian spy agency information exactly chinese use root spies recruit intelligence agents build rich repository americans ’ personal data future targeting 2008 article culture mandala bulletin centre east-west cultural economic studies jason fritz alleges chinese government 1995 2008 involved number high-profile cases espionage primarily use decentralized network students business people scientists diplomats engineers within chinese diaspora defector belgium purportedly agent claimed hundreds spies industries throughout europe defection australia chinese diplomat chen yonglin said 1,000 country 2007 russian executive sentenced 11 years passing information rocket space technology organization china targets united states included 'aerospace engineering programs space shuttle design c4isr data high-performance computers nuclear weapon design cruise missile data semiconductors integrated circuit design details us arms sales taiwan china continues held responsible string cyber-attacks number public private institutions united states india russia canada france chinese government denies involvement cyber-spying campaigns administration maintains position china threat rather victim increasing number cyber-attacks reports china cyber warfare capabilities yet confirmed chinese government according fritz china expanded cyber capabilities military technology acquiring foreign military technology fritz states chinese government uses new space-based surveillance intelligence gathering systems anti-satellite weapon anti-radar infrared decoys false target generators assist quest support informationization military increased education soldiers cyber warfare improving information network military training built virtual laboratories digital libraries digital campuses informationization hope prepare forces engage different kind warfare technically capable adversaries many recent news reports link china technological capabilities beginning new 'cyber cold war response reports cyberattacks china united states amitai etzioni institute communitarian policy studies suggested china united states agree policy mutually assured restraint respect cyberspace would involve allowing states take measures deem necessary self-defense simultaneously agreeing refrain taking offensive steps would also entail vetting commitments operation shady rat ongoing series cyber attacks starting mid-2006 reported internet security company mcafee august 2011 china widely believed state actor behind attacks hit least 72 organizations including governments defense contractors department information technology created indian computer emergency response team cert-in 2004 thwart cyber attacks india year 23 reported cyber security breaches 2011 13,301 year government created new subdivision national critical information infrastructure protection centre nciipc thwart attacks energy transport banking telecom defence space sensitive areas executive director nuclear power corporation india npcil stated february 2013 company alone forced block ten targeted attacks day cert-in left protect less critical sectors high-profile cyber attack 12 july 2012 breached email accounts 12,000 people including officials ministry external affairs ministry home affairs defence research development organisation drdo indo-tibetan border police itbp government-private sector plan overseen national security advisor nsa shivshankar menon began october 2012 intends beef india cyber security capabilities light group experts findings india faces 470,000 shortfall experts despite country reputation software powerhouse february 2013 information technology secretary j. satyanarayana stated nciipc finalizing policies related national cyber security would focus domestic security solutions reducing exposure foreign technology steps include isolation various security agencies ensure synchronised attack could succeed fronts planned appointment national cyber security coordinator month significant economic physical damage india related cyber attacks 26 november 2010 group calling indian cyber army hacked websites belonging pakistan army others belong different ministries including ministry foreign affairs ministry education ministry finance pakistan computer bureau council islamic ideology etc attack done revenge mumbai terrorist attacks 4 december 2010 group calling pakistan cyber army hacked website india top investigating agency central bureau investigation cbi national informatics center nic begun inquiry july 2016 cymmetria researchers discovered revealed cyber attack dubbed 'patchwork compromised estimated 2500 corporate government agencies using code stolen github dark web examples weapons used exploit sandworm vulnerability cve-2014-4114 compiled autoit script uac bypass code dubbed uacme targets believed mainly military political assignments around southeast asia south china sea attackers believed indian origin gathering intelligence influential parties defence cyber agency indian military agency responsible cyberwarfare expected become operational november 2019 chinese blamed cybersecurity company f-secure labs found malware nanhaishu targeted philippines department justice sent information infected machine server chinese ip address malware considered particularly sophisticated nature introduced phishing emails designed look like coming authentic sources information sent believed relating south china sea legal case russia still part soviet union 1982 portion trans-siberia pipeline within territory exploded allegedly due computer malware implanted pirated canadian software central intelligence agency malware caused scada system running pipeline malfunction farewell dossier provided information attack wrote compromised computer chips would become part soviet military equipment flawed turbines would placed gas pipeline defective plans would disrupt output chemical plants tractor factor caused monumental nonnuclear explosion fire ever seen space however soviet union blame united states attack russian south ossetian georgian azerbaijani sites attacked hackers 2008 south ossetia war russian-led cyberattacks br claimed russian security services organized number denial service attacks part cyber-warfare countries notably 2007 cyberattacks estonia 2008 cyberattacks russia south ossetia georgia azerbaijan one identified young russian hacker said paid russian state security services lead hacking attacks nato computers studying computer sciences department defense information tuition paid fsb july 2009 series coordinated denial service attacks major government news media financial websites south korea united states many thought attack directed north korea one researcher traced attacks united kingdom security researcher chris kubecka presented evidence multiple european union united kingdom companies unwittingly helped attack south korea due w32.dozer infections malware used part attack companies used attack partially owned several governments complicating attribution july 2011 south korean company sk communications hacked resulting theft personal details including names phone numbers home email addresses resident registration numbers 35 million people trojaned software update used gain access sk communications network links exist hack malicious activity believed part broader concerted hacking effort ongoing tensions korean peninsula south korea defense ministry stated south korea going improve cyber-defense strategies hopes preparing possible cyber attacks march 2013 south korea major banks – shinhan bank woori bank nonghyup bank – well many broadcasting stations – kbs ytn mbc – hacked 30,000 computers affected one biggest attacks south korea faced years although remains uncertain involved incident immediate assertions north korea connected threatened attack south korea government institutions major national banks traditional newspapers numerous times – reaction sanctions received nuclear testing continuation foal eagle south korea annual joint military exercise united states north korea cyber warfare capabilities raise alarm south korea north korea increasing manpower military academies specializing hacking current figures state south korea 400 units specialized personnel north korea 3,000 highly trained hackers portrays huge gap cyber warfare capabilities sends message south korea step strengthen cyber warfare command forces therefore order prepared future attacks south korea united states discuss deterrence plans security consultative meeting scm scm plan developing strategies focuses accelerating deployment ballistic missiles well fostering defense shield program known korean air missile defense april 2007 estonia came cyber attack wake relocation bronze soldier tallinn largest part attacks coming russia official servers authorities russia attack ministries banks media targeted attack estonia seemingly small baltic nation effective nation run online estonia implemented e-government bank services political elections taxes done online attack really hurt estonia economy people estonia least 150 people injured first day due riots streets 2013 french minister defense mr jean-yves le drian ordered creation cyberarmy representing 4th national army corp along ground naval air forces french ministry defense protect french european interests soil abroad contract made french firm eads airbus identify secure main elements susceptible cyber threats 2016 france thus built largest cyberarmy europe planned 2600 cyber-soldiers 440 million euros investment cybersecurity products new army corp. additional 4400 reservists constitute heart army 2019 2013 germany revealed existence 60-person computer network operation unit german intelligence agency bnd announced seeking hire 130 hackers new cyber defence station unit march 2013 bnd president gerhard schindler announced agency observed five attacks day government authorities thought mainly originate china confirmed attackers far accessed data expressed concern stolen information could used basis future sabotage attacks arms manufacturers telecommunications companies government military agencies shortly edward snowden leaked details u.s. national security agency cyber surveillance system german interior minister hans-peter friedrich announced bnd would given additional budget 100 million euros increase cyber surveillance capability 5 total internet traffic germany 20 total traffic maximum amount allowed german law netherlands cyber defense nationally coordinated ncsc dutch ministry defense laid cyber strategy 2011 first focus improve cyber defense handled joint branch jivc improve intel operations intel community netherlands including military intel organization mivd set joint sigint cyber unit jscu ministry defense furthermore setting offensive cyber force called defensie cyber command dcc operational end 2014 january 2017 sweden armed forces subjected cyber-attack caused shutdown so-called caxcis system used military exercises according crowdstrike 2014 2016 russian apt fancy bear used android malware target ukrainian army rocket forces artillery distributed infected version android app whose original purpose control targeting data d-30 howitzer artillery app used ukrainian officers loaded x-agent spyware posted online military forums attack claimed crowdstrike successful 80 ukrainian d-30 howitzers destroyed highest percentage loss artillery pieces army percentage never previously reported would mean loss nearly entire arsenal biggest artillery piece ukrainian armed forces according ukrainian army number incorrect losses artillery weapons way reported losses nothing stated cause 2014 russians suspected use cyber weapon called snake ouroboros conduct cyber attack ukraine period political turmoil snake tool kit began spreading ukrainian computer systems 2010 performed computer network exploitation cne well highly sophisticated computer network attacks cna december 23 2015 blackenergy malware used cyberattack ukraine powergrid left 200,000 people temporarily without power mining company large railway operator also victims attack mi6 reportedly infiltrated al qaeda website replaced instructions making pipe bomb recipe making cupcakes october 2010 iain lobban director government communications headquarters gchq said uk faces real credible threat cyber attacks hostile states criminals government systems targeted 1,000 times month attacks threatened uk economic future countries already using cyber assaults put pressure nations 12 november 2013 financial organisations london conducted cyber war games dubbed 'waking shark 2 simulate massive internet-based attacks bank financial organisations waking shark 2 cyber war games followed similar exercise wall street iran victim predator several cyberwarfare operations iran considered emerging military power field september 2010 iran attacked stuxnet worm thought specifically target natanz nuclear enrichment facility 500-kilobyte computer worm infected least 14 industrial sites iran including natanz uranium-enrichment plant although official authors stuxnet ’ officially identified stuxnet believed developed deployed united states israel worm said advanced piece malware ever discovered significantly increases profile cyberwarfare 2006 war hezbollah israel alleges cyber-warfare part conflict israel defense forces idf intelligence estimates several countries middle east used russian hackers scientists operate behalf result israel attached growing importance cyber-tactics became along u.s. france couple nations involved cyber-war planning many international high-tech companies locating research development operations israel local hires often veterans idf elite computer units richard a. clarke adds israeli friends learned thing two programs working two decades september 2007 israel carried airstrike syria dubbed operation orchard u.s. industry military sources speculated israelis may used cyberwarfare allow planes pass undetected radar syria following us president donald trump decision pull iran nuclear deal may 2018 cyber warfare units united states israel monitoring internet traffic iran noted surge retaliatory cyber attacks iran security firms warned iranian hackers sending emails containing malware diplomats work foreign affairs offices us allies employees telecommunications companies trying infiltrate computer systems august 15 2012 11:08 local time shamoon virus began destroying 35,000 computer systems rendering inoperable virus used target saudi government causing destruction state owned national oil company saudi aramco attackers posted pastie pastebin.com hours prior wiper logic bomb occurring citing oppression al-saud regime reason behind attack attack well staged according christina kubecka former security advisor saudi aramco attack group leader security aramco overseas unnamed saudi aramco employee information technology team opened malicious phishing email allowing initial entry computer network around mid-2012 kubecka also detailed black hat usa talk saudi aramco placed majority security budget ics control network leaving business network risk major incident realize security budget spent ics gets pwnd virus noted behavior differing malware attacks due destructive nature cost attack recovery us defense secretary leon panetta called attack cyber pearl harbor known years later biggest hack history intended cyber warfare shamoon spread infected machine computers network system infected virus continues compile list files specific locations system upload attacker erase finally virus overwrites master boot record infected computer making unusable saudi aramco announced attack facebook page went offline company statement issued 25 august 2012 statement falsely reported normal business resumed 25 august 2012 however middle eastern journalist leaked photographs taken 1 september 2012 showing kilometers petrol trucks unable loaded due backed business systems still inoperable august 29 2012 attackers behind shamoon posted another pastie pastebin.com taunting saudi aramco proof still retained access company network post contained username password security network equipment new password ceo khalid al- falih attackers also referenced portion shamoon malware proof pastie according kubecka order restore operations saudi aramco used large private fleet aircraft available funds purchase much world hard drives driving price new hard drives required quickly possible oil prices affected speculation september 1 2012 gasoline resources dwindling public saudi arabia 17 days august 15th attack rasgas also affected different variant crippling similar manner march 2018 american republican fundraiser elliott broidy filed lawsuit qatar alleging qatar government stole leaked emails order discredit viewed impediment plan improve country standing washington may 2018 lawsuit named mohammed bin hamad bin khalifa al thani brother emir qatar associate ahmed al-rumaihi allegedly orchestrating qatar cyber warfare campaign broidy litigation revealed cybercriminals targeted broidy targeted many 1,200 individuals also well-known enemies qatar senior officials u.a.e. egypt saudi arabia bahrain hackers almost always obscured location activity traced telecommunication network qatar united arab emirates launched several cyber-attacks past targeting dissidents ahmed mansoor emirati citizen jailed sharing thoughts facebook twitter given code name egret state-led covert project called raven spied top political opponents dissidents journalists project raven deployed secret hacking tool called karma spy without requiring target engage web links cyberwarfare united states part american military strategy proactive cyber defence use cyberwarfare platform attack new united states military strategy makes explicit cyberattack casus belli traditional act war 2013 cyberwarfare first time considered larger threat al qaeda terrorism many u.s. intelligence officials 2017 representative mike rogers chairman u.s. house permanent select committee intelligence instance said cyber war country americans n't know necessarily winning got huge challenges comes cybersecurity u.s. government security expert richard a. clarke book cyber war may 2010 defines cyberwarfare actions nation-state penetrate another nation computers networks purposes causing damage disruption economist describes cyberspace fifth domain warfare william j. lynn u.s. deputy secretary defense states doctrinal matter pentagon formally recognized cyberspace new domain warfare become critical military operations land sea air space 2009 president barack obama declared america digital infrastructure strategic national asset may 2010 pentagon set new u.s. cyber command uscybercom headed general keith b. alexander director national security agency nsa defend american military networks attack countries systems eu set enisa european union agency network information security headed prof. udo helmbrecht plans significantly expand enisa capabilities united kingdom also set cyber-security operations centre based government communications headquarters gchq british equivalent nsa u.s. however cyber command set protect military whereas government corporate infrastructures primarily responsibility respectively department homeland security private companies february 2010 top american lawmakers warned threat crippling attack telecommunications computer networks sharply rise according lipman report numerous key sectors u.s. economy along nations currently risk including cyber threats public private facilities banking finance transportation manufacturing medical education government dependent computers daily operations 2009 president obama stated cyber intruders probed electrical grids economist writes china plans winning informationised wars mid-21st century note countries likewise organizing cyberwar among russia israel north korea iran boasts world second-largest cyber-army james gosler government cybersecurity specialist worries u.s. severe shortage computer security specialists estimating 1,000 qualified people country today needs force 20,000 30,000 skilled experts july 2010 black hat computer security conference michael hayden former deputy director national intelligence challenged thousands attendees help devise ways reshape internet security architecture explaining guys made cyberworld look like north german plain january 2012 mike mcconnell former director national intelligence national security agency president george w. bush told reuters news agency u.s. already launched attacks computer networks countries mcconnell name country u.s. attacked according sources may iran june 2012 new york times reported president obama ordered cyber attack iranian nuclear enrichment facilities august 2010 u.s. first time warned publicly chinese military use civilian computer experts clandestine cyber attacks aimed american companies government agencies pentagon also pointed alleged china-based computer spying network dubbed ghostnet revealed research report last year pentagon stated people liberation army using information warfare units develop viruses attack enemy computer systems networks units include civilian computer professionals commander bob mehal monitor pla buildup cyberwarfare capabilities continue develop capabilities counter potential threat united states department defense sees use computers internet conduct warfare cyberspace threat national security united states joint forces command describes attributes cyberspace technology emerging instrument power societies becoming available country opponents may use attack degrade disrupt communications flow information low barriers entry coupled anonymous nature activities cyberspace list potential adversaries broad furthermore globe-spanning range cyberspace disregard national borders challenge legal systems complicate nation ability deter threats respond contingencies february 2010 united states joint forces command released study included summary threats posed internet little investment cloaked veil anonymity adversaries inevitably attempt harm national interests cyberspace become main front irregular traditional conflicts enemies cyberspace include states non-states range unsophisticated amateur highly trained professional hackers cyberspace enemies target industry academia government well military air land maritime space domains much way airpower transformed battlefield world war ii cyberspace fractured physical barriers shield nation attacks commerce communication indeed adversaries already taken advantage computer networks power information technology plan execute savage acts terrorism also influence directly perceptions u.s. government american population 6 october 2011 announced creech afb drone predator fleet command control data stream keylogged resisting attempts reverse exploit past two weeks air force issued statement virus posed threat operational mission 21 november 2011 widely reported u.s. media hacker destroyed water pump curran-gardner township public water district illinois however later turned information false inappropriately leaked illinois statewide terrorism intelligence center according foreign policy magazine nsa tailored access operations tao unit successfully penetrated chinese computer telecommunications systems almost 15 years generating best reliable intelligence information going inside people republic china 24 november 2014 sony pictures entertainment hack release confidential data belonging sony pictures entertainment spe june 2015 united states office personnel management opm announced target data breach targeting records many four million people later fbi director james comey put number 18 million washington post reported attack originated china citing unnamed government officials 2016 jeh johnson united states secretary homeland security james clapper u.s. director national intelligence issued joint statement accusing russia interfering 2016 united states presidential election new york times reported obama administration formally accused russia stealing disclosing democratic national committee emails u.s. law 50 u.s.c.title 50 – war national defense chapter 15 – national security subchapter iii accountability intelligence activities must formal presidential finding prior authorizing covert attack u.s. vice president joe biden said american news interview program meet press united states respond new york times noted biden comment seems suggest mr. obama prepared order — already ordered — kind covert action december 29 united states imposed extensive sanctions russia since cold war expelling 35 russian diplomats united states united states used cyberattacks tactical advantage afghanistan 2014 barack obama ordered intensification cyberwarfare north korea missile program sabotaging test launches opening seconds 2016 president barack obama authorized planting cyber weapons russian infrastructure final weeks presidency response moscow alleged interference 2016 presidential election march 2017 wikileaks published 8,000 documents cia confidential documents codenamed vault 7 dated 2013–2016 include details cia software capabilities ability compromise cars smart tvs web browsers including google chrome microsoft edge mozilla firefox opera software asa operating systems smartphones including apple ios google android well operating systems microsoft windows macos linux global perspective countries actors engaged cyber warfare see george washington university-based national security archive cyberwar map kill switch bill br 19 june 2010 united states senator joe lieberman i-ct introduced bill called protecting cyberspace national asset act 2010 co-wrote senator susan collins r-me senator thomas carper d-de signed law controversial bill american media dubbed kill switch bill would grant president emergency powers parts internet however three co-authors bill issued statement instead bill narrowed existing broad presidential authority take telecommunications networks rise cyber warfighting domain led efforts determine cyberspace used foster peace example german civil rights panel runs campaign cyberpeace − control cyberweapons surveillance technology militarization cyberspace development stockpiling offensive exploits malware measures cyberpeace include policymakers developing new rules norms warfare individuals organizations building new tools secure infrastructures promoting open source establishment cyber security centers auditing critical infrastructure cybersecurity obligations disclose vulnerabilities disarmament defensive security strategies decentralization education widely applying relevant tools infrastructures encryption cyberdefenses topics cyber peacekeeping cyber peacemaking also studied researchers way restore strengthen peace aftermath cyber traditional warfare cyber counter-intelligence measures identify penetrate neutralize foreign operations use cyber means primary tradecraft methodology well foreign intelligence service collection efforts use traditional methods gauge cyber capabilities intentions one hardest issues cyber counterintelligence problem attribution unlike conventional warfare figuring behind attack difficult however defense secretary leon panetta claimed united states capability trace attacks back sources hold attackers accountable october 2011 journal strategic studies leading journal field published article thomas rid cyber war take place argued politically motivated cyber attacks merely sophisticated versions sabotage espionage subversion – unlikely cyber war occur future various parties attempted come international legal frameworks clarify acceptable none yet widely accepted tallinn manual published 2013 academic non-binding study international law particular jus ad bellum international humanitarian law apply cyber conflicts cyber warfare written invitation tallinn-based nato cooperative cyber defence centre excellence international group approximately twenty experts 2009 2012 shanghai cooperation organisation members include china russia defines cyberwar include dissemination information harmful spiritual moral cultural spheres states september 2011 countries proposed un secretary general document called international code conduct information security contrast united states approach focuses physical economic damage injury putting political concerns freedom speech difference opinion led reluctance west pursue global cyber arms control agreements however american general keith b. alexander endorse talks russia proposal limit military attacks cyberspace june 2013 barack obama vladimir putin agreed install secure cyberwar-hotline providing direct secure voice communications line us cybersecurity coordinator russian deputy secretary security council need directly manage crisis situation arising ict security incident white house quote ukrainian professor international law alexander merezhko developed project called international convention prohibition cyberwar internet according project cyberwar defined use internet related technological means one state political economic technological information sovereignty independence another state professor merezhko project suggests internet ought remain free warfare tactics treated international landmark states internet cyberspace common heritage mankind february 2017 rsa conference microsoft president brad smith suggested global rules – digital geneva convention – cyber attacks ban nation-state hacking civilian aspects economic political infrastructures also stated independent organization could investigate publicly disclose evidence attributes nation-state attacks specific countries furthermore said technology sector collectively neutrally work together protect internet users pledge remain neutral conflict aid governments offensive activity adopt coordinated disclosure process software hardware vulnerabilities documentaries br videos articles | [
3932,
2190,
7525,
1461,
2566,
740,
5051,
5401,
6823,
7194,
5412,
760,
429,
74,
2614,
5444,
6155,
3680,
3681,
5452,
6507,
4025,
2273,
6515,
4759,
4036,
104,
7627,
6526,
820,
4409,
5485,
124,
2310,
496,
1954,
5149,
6922,
3393,
3726,
5509,... | Test |
6,757 | 2 | Nanolinux:nanolinux nanolinux open source free lightweight linux distribution requires 14 mb disk space including tiny versions common desktop applications several games based core version tiny core linux distribution uses busybox nano-x instead x.org fltk 1.3.x default gui toolkit slwm super-lightweight window manager included applications mainly based fltk nanolinux includes several lightweight applications including distribution also includes several games tuxchess checkers nxeyes mastermind sudoku blocks support truetype fonts utf-8 also provided nanolinux distributed live cd iso images installation flash disk hard disk documented wiki pages minimal configuration live cd version without swapfile requires 64 mb ram 14 mb disk space | [
362,
5200,
1629,
3444,
7251,
474,
7075,
8092,
1941,
314,
5232,
2758,
1663,
2864,
3559,
6209,
6761,
2063,
343,
4824,
5523,
7587,
5259,
1893,
5530,
5704,
352,
3751,
6317,
7954,
6244,
788
] | Validation |
6,758 | 4 | Trust_on_first_use:trust first use trust first use tofu trust upon first use tufu security model used client software needs establish trust relationship unknown not-yet-trusted endpoint tofu model client try look endpoint identifier usually kind public key local trust database identifier exists yet endpoint client software either prompt user determine client trust identifier simply trust identifier given record trust relationship trust database different identifier received subsequent connections endpoint client software consider untrusted tofu approach used connecting arbitrary unknown endpoints trusted third party certificate authority example ssh protocol designed issue prompt first time client connects unknown not-yet-trusted endpoint implementations tofu found http public key pinning browsers always accept first public key returned server http strict transport security browsers obey redirection rule duration 'age directive single largest strength tofu-style model human must initially validate every interaction common application model use ssh-rpc 'bot users computers whereby public keys distributed set computers automated access centralized hosts tofu aspect application forces sysadmin trusted user validate remote server identity upon first connection largest weakness tofu-style model human must initially validate every interaction scale infinitely quickly scale beyond capabilities group people using managing computers need trusted secure protocols people tend approve without verification mention increased surface area human error compromise security scalability use proposed daniel gultsch developer xmpp client conversations call blind trust verification consists checking key first contact check user made manual check key changed first known formal use term tofu tufu cmu researchers dan wendlandt david andersen adrian perrig research paper perspectives improving ssh-style host authentication multi-path probing published 2008 usenix annual technical conference moxie marlinspike mentioned perspectives term tofu def con 18 proceedings reference comments made dan kaminsky panel discussion open letter call action audience suggestion raised implying superiority ssh public key infrastructure pki model ssl/tls pki model whereby moxie replied topics trust validation non-repudiation fundamental work field cryptography digital security | [
2557,
6049,
4945,
363,
7214,
3350,
6721,
7567,
7925,
3426,
1513,
6894,
2876
] | Test |
6,759 | 7 | Autodesk_Gameware:autodesk gameware autodesk gameware discontinued middleware software suite developed autodesk suite contained tools enable designers create game lighting character animation low level path finding high-level ai advanced user interfaces july 12 2017 autodesk removed scaleform beast humanik navigation online store announced ending support products gameware suite consisted following modules beast content pipeline tool used advanced global illumination dynamic character relighting beast developed sold swedish games lighting technology company illuminate labs acquired autodesk 2010 beast used make light maps shadow maps point clouds advanced global illumination beast precalculate lighting light maps shadow maps point clouds bake occlusion normal maps generate light fields dynamic relighting characters objects beast built-in integration gamebryo lightspeed epic unreal engine evolution several in-house game engines march 2010 unity technologies announced next version unity would feature built-in beast lightmapping global illumination shelf api available projects working beast ready integration beast api programming interface designed make easy possible create beast integration game engine beast used games mirror edge crimecraft mortal kombat vs. dc universe alpha protocol new beast presented gdc 2010 san francisco new version beast features two entirely new modules called distribeast ernst distribeast extremely fast easy use distribution engine managing render farms ernst real-time visualizer allows artists explore control lighting set-up without run complete bake | [
5666,
2225,
5897,
5632,
2002,
2275,
7898,
1606,
4130,
3571
] | Validation |
6,760 | 5 | Tsunami_UDP_Protocol:tsunami udp protocol tsunami udp protocol udp-based protocol developed high-speed file transfer network paths high bandwidth-delay product protocols needed standard tcp perform well paths high bandwidth-delay products tsunami effects file transfer chunking file numbered blocks 32 kb communication client server applications flows low bandwidth tcp connection bulk data transferred udp | [
426,
7637
] | Test |
6,761 | 2 | Knoppix:knoppix knoppix operating system based debian designed run directly cd dvd live cd usb flash drive live usb one first kind operating system knoppix developed named linux consultant klaus knopper starting program loaded removable medium decompressed ram drive decompression transparent on-the-fly although knoppix primarily designed used live cd also installed hard disk like typical operating system computers support booting usb devices load knoppix live usb flash drive memory card two main editions traditional compact-disc 700 megabytes edition dvd 4.7 gigabytes maxi edition main edition two language-specific editions english german knoppix mostly consists free open source software also includes proprietary software long fulfils certain conditions knoppix used copy files easily hard drives inaccessible operating systems quickly safely use linux software live cd used instead installing another os 1000 software packages included cd edition 2600 packages included dvd edition nine gigabytes stored dvd compressed form packages include minimum hardware requirements knoppix prior knoppix 3.8.2 documents settings user created would disappear upon reboot lack persistence made necessary save documents directly hard drive partition network removable media usb flash drive also possible set persistent home directory documents settings written user home directory would automatically redirected hard drive removable media could automatically mounted bootup single file knoppix.img cached rewritable media used simulate file system files written later use allowed user transparently write home directory union mount support added version 3.8.1 unionfs later replaced aufs 5.1.0 improve stability union mount allowed virtual updates data read-only cd/dvd media storing changes separate writable media representing combination two single storage device writable media could memory ramdisk hard disk usb flash drive etc means user could modify software installed knoppix system using apt install update software storage device containing changes needed present whenever knoppix started else original data disc would used knoppix would scan available storage devices persistent home directory default user could dictate specific location boot option see codice_1 carrying knoppix cd usb flash drive user could environment programs settings data available computer could run knoppix functionality available knoppix 5.1.1 cd release 5.3.1 dvd release subsequently live cd paradigm transformed portable operating systems run external storage using knoppix live cd one use boot options also known 'cheatcodes override default setting automatic hardware detection fails example user may wish boot plain console proceed without scsi support knoppix allows user enter one cheat codes prompt booting user enter cheat code press key timeout knoppix boot default options example set language french rather default one would type codice_2 knoppix 32-bit debian linux based distro recent releases including latest version 7.6 also equipped 64-bit kernel dvd edition automatically boot 64-bit computers using boot option codice_3 manually command-line prompt codice_4 boot 32-bit kernel neither pae 64-bit applications supported knoppix system memory 4 gb used 64-bit kernel dvd edition knoppix also loaded onto usb flash drive flash-knoppix knoppix system knoppix live system starts runs factor 5 faster usb flash disk cd dvd besides experimental uefi support provided usb flash drive rather dvd media 32-bit uefi firmware boot 32-bit kernel 64-bit uefi firmware boot 64-bit kernel text interface uefi similar bios one also press key f2 f3 access information boot options knoppix one first live cd linux distributions gain popularity several factors contribute popularity knoppix knoppix works fairly large number pcs laptops automatic hardware detection cope hardware sometimes drivers used optimal knoppix difficulty recognizing cards made 1998 motherboards bios made 2002 cases manual configuration codes entered boot time overcome problems automatic detection pc enough ram run kde included programs legacy knoppix earlier 6.0 boots limited twm session instead window running twm session default xterm table right shows version history major releases april 2008 version 4 5.1.1 knoppix split dvd maxi edition 9 gb software cd light edition developed parallel knoppix 5.1.1 cd editions contained selection graphical environments including twm window manager kde 3 — feature-complete desktop environment default knoppix 5.3.1 earlier development done traditional 5.x versions knoppix 6.0.1 adriane 1.1 cd-edition complete rebuild scratch lxde made default desktop environment edition contains substantially reduced software collection order easily fit cd knoppix 6.2.1 release cd dvd editions adriane 1.2 cd-edition knoppix 6.7.1 last cd version stable touchpad drivers june 2013 march 2019 knoppix 7.2 recent release cd edition 2018 software become outdated libc6 2.17 library longer suffices installation several modern packages 7.x version range known instabilities touchpads version 7.2 still remains recent cd version knoppix wide distribution knoppix 8.0.0 edition released cebit 2017 knoppix 8.1.0 released september 2017 first public release 8.x series version 8.0.0 dual boot choice three different desktops lxde default option kde gnome versions 8.2.0 newer 8.2.x 8.5.x available knoppix mirrors knoppix 8.5 dvd version available download exclusive bundled physical edition linux-magazin linux-user version 8.5 longer includes systemd replaced elogind spectre meltdown kernel vulnerabilities mitigated adriane knoppix variation intended blind visually impaired people used entirely without vision oriented output devices released third quarter 2007 live cd adriane knoppix named adriane knopper wife klaus knopper developer knoppix adriane visual impairment assisting klaus development software name adriane also backronym audio desktop reference implementation networking environment adriane knoppix intended blind also beginners ’ know much computers uses suse blinux screen reader phoneme generator speech engine normal output | [
2174,
4293,
2179,
2187,
2909,
5724,
7161,
6086,
2916,
3271,
7894,
2935,
5051,
5753,
6453,
4341,
2585,
2228,
1487,
58,
3996,
7587,
4008,
1893,
7954,
788,
1909,
459,
6884,
7969,
6175,
7251,
7975,
4400,
7253,
3696,
474,
1179,
7635,
6902,
2... | Test |
6,762 | 4 | Malicious_Software_Removal_Tool:malicious software removal tool microsoft windows malicious software removal tool freely distributed virus removal tool developed microsoft microsoft windows operating system first released january 13 2005 on-demand anti-virus tool on-demand means lacks real-time protection scans computer specific widespread malware tries eliminate infection automatically distributed microsoft windows computers via windows update service also separately downloaded program usually updated second tuesday every month commonly called patch tuesday distributed via windows update point runs automatically background reports malicious software found alternatively users manually download tool microsoft download center records results log file located windir \debug\mrt.log run manually times users start mrt.exe using windows command prompt run command start menu released tool configured report anonymized data infections microsoft detected reporting behavior disclosed tool eula disabled desired june 2006 microsoft report company claimed tool removed 16 million instances malicious software 5.7 million 270 million total unique windows computers since release january 2005 report also stated average tool removes malicious software 1 every 311 computers runs microsoft claims software removed password stealer threats 859,842 machines august 2013 malicious software removal tool deleted old vulnerable versions tor client order end spread sefnit botnet mined bitcoins without host owner approval later engaged click fraud approximately two million hosts cleaned october although slightly less half estimated infections rest suspected machines presumably automatic windows updates enabled manually run since support windows 2000 ended july 13 2010 microsoft stopped distributing tool windows 2000 users via windows update last version tool could run windows 2000 4.20 released may 14 2013 starting version 5.1 released june 11 2013 support windows 2000 dropped altogether although windows xp support ended april 8 2014 microsoft announced updates windows xp version malicious software removal tool would provided july 14 2015 | [
1620,
1721,
4759,
3962,
5571,
5227,
744,
3551,
7564,
2784,
7867
] | Validation |
6,763 | 4 | Piling-up_lemma:piling-up lemma cryptanalysis piling-up lemma principle used linear cryptanalysis construct linear approximation action block ciphers introduced mitsuru matsui 1993 analytical tool linear cryptanalysis piling-up lemma allows cryptanalyst determine probability equality holds x binary variables bits either 0 1 let p denote probability true equals one certain happen equals zero happen first consider piling-up lemma two binary variables formula_2 formula_3 consider due properties xor operation equivalent x x 0 x x 1 mutually exclusive events say must make central assumption piling-up lemma binary variables dealing independent state one effect state others thus expand probability function follows express probabilities p p ½ ε ½ ε ε probability biases — amount probability deviates ½ thus probability bias ε xor sum 2εε formula extended x follows note ε zero one binary variables unbiased entire probability function unbiased — equal ½ related slightly different definition bias formula_8 fact minus two times previous value advantage formula_9 adding random variables amounts multiplying 2nd definition biases practice x approximations s-boxes substitution components block ciphers typically x values inputs s-box values corresponding outputs simply looking s-boxes cryptanalyst tell probability biases trick find combinations input output values probabilities zero one closer approximation zero one helpful approximation linear cryptanalysis however practice binary variables independent assumed derivation piling-up lemma consideration kept mind applying lemma automatic cryptanalysis formula | [
1811,
4930,
464,
807,
1353,
2918,
3100,
119,
7548,
1283,
6637,
1480,
6647,
7200,
4805,
5765,
5327,
6657,
7928,
1587,
5333,
6049,
161,
433,
1320,
613,
1146,
4917
] | Test |
6,764 | 2 | Utmp:utmp utmp wtmp btmp variants utmpx wtmpx btmpx files unix-like systems keep track logins logouts system files regular text files rather binary format needs edited specially crafted programs implementation fields present file differ depending system libc version defined utmp.h header file wtmp btmp format exactly like utmp except null value username indicates logout associated terminal actual user name located finding preceding login terminal furthermore value terminal name username shutdown reboot indicates system shutdown reboot respectively files set given pam module pam_unix.so pam_sss.so set application performing operation e.g mingetty /bin/login sshd obligation program record utmp information utmpx wtmpx extensions original utmp wtmp originating sun microsystems utmpx specified posix utmp wtmp btmp files never part official unix standard single unix specification utmpx corresponding apis part systems create different newer files utmpx variants deprecated/obsoleted former formats always case linux example uses utmpx structure place older file structure depending system files may commonly found different places non-exhaustive list linux solaris hp-ux freebsd 9.0 introduced new files adding support utmpx different commands allow users consult information stored files including show current system users last show last logged users lastb show last failed login attempts linux-specific | [
578,
3795
] | Test |
6,765 | 2 | QuickDraw:quickdraw quickdraw 2d graphics library associated application programming interface api core part classic mac os operating system initially written bill atkinson andy hertzfeld quickdraw still existed part libraries mac os x largely superseded modern quartz graphics system mac os x v10.4 quickdraw officially deprecated mac os x v10.5 applications using quickdraw make use added 64-bit support mac os x v10.8 quickdraw header support removed operating system applications using quickdraw still run os x 10.8 macos 10.12 however current versions xcode macos sdk contain header files compile programs quickdraw grounded apple lisa lisagraf early 1980s designed fit well pascal-based interfaces development environments early apple systems addition quickdraw raster graphics system defines pixel basic unit graphical information contrast vector graphics systems graphics primitives defined mathematical terms rasterized required display resolution raster system requires much less processing power however prevailing paradigm time quickdraw developed quickdraw defined key data structure graphics port grafport logical drawing area graphics could drawn obvious on-screen object corresponding grafport window entire desktop view could grafport off-screen ports could also exist grafport defined coordinate system quickdraw resolution 16 bits giving 65,536 unique vertical horizontal locations numbered -32,767 extreme left top +32,767 extreme right bottom window usually set top left corner content area located 0,0 associated grafport window content area include window frame drop shadow title bar quickdraw coordinates referred infinitely thin lines pixel locations actual pixel drawn space immediate right coordinate made easier programmers avoid graphical glitches caused off-by-one errors macintosh pixels square grafport default resolution 72 pixels per inch chosen match conventions established printing industry 72 points per inch quickdraw also contained number scaling mapping functions quickdraw maintained number global variables per process chief among current port originally simplified api since operations pertained current port os developed use global state also made quickdraw much harder integrate modern design approaches multi-threading pre-emptive multitasking address problems carbon api bridge mac os 9 mac os x added additional parameters routines allowing opaque storage thread information new non-polled event structure everything seen classic mac os screen drawn quickdraw library quite low level primitive objects draw objects except text may drawn using pen rectangular dimensions pattern color note pen rectangular axis-aligned diagonal lines end thicker horizontal vertical ones shapes may drawn filled framed using pattern color filled arc forms wedge text may drawn installed font variety stylistic variations size color depending selected font stored text scaled variety ways truetype fonts scale smoothly size whereas bitmap fonts usually scale well important feature quickdraw support transfer modes governed destination pixel value related previous value color object drawn set attributes pen text drawing associated grafport regions key data structure quickdraw define arbitrary set pixels rather like bitmap compressed form rapidly manipulated complex ways regions combined union subtracted difference xored form regions used within grafport clipping drawn filled framed like shape series framed shapes connected lines may combined region region need consist contiguous set pixels disconnected regions possible common although regions could allow powerful graphic manipulations limited current implementation restricts maximum region data storage size sixteen bit value practical general-purpose drawing composition tool practical use high resolution also restricted regions underpin rest quickdraw permitting clipping arbitrary shapes essential implementation multiple overlapping windows invented bill atkinson regions patented separate invention apple region specified initial creation opening region drawing various quickdraw shapes closing region hidden routines construct region quickdraw commands executed bitmaps may also converted regions bitmaps may made regions painting filling region graphics port internal structure region storage length bounding rectangle opaque apple-published documents available though mechanism outlined patent regions implemented using vertical horizontal compression region stored series horizontal scan lines rasters contains vertical coordinate followed list horizontal inversion coordinates inversion point thought toggling inclusion region points first point turns region second turns compression achieved storing line differentially line contains differences previous line rather full set inversion points finally identical adjacent scan lines efficiently encoded simply skipping way commonly used region rounded corner rectangle efficiently encoded complex operations region composition image clipping may done without requiring either extensive processor cycles large amounts memory original systems executing quickdraw code used processors operating 8 megahertz clock rates systems 128 kilobytes writable memory regions bound specific orientation ninety degree rotation region would require detailed reverse engineering structure extensive coding general rotation impractical compared rotating original source boundary description simply creating new region however api includes conversion routines bitmaps bitmaps may also rotated using well known methods various degrees image degradation depending upon angle chosen storage processor cycles available operation complexity algorithm apple recently carbon api defined regions opaque structure program compilation options series graphics calls quickdraw recorded structure called picture saved memory played back time reproducing graphics sequence playback time picture may placed new coordinates scaled picture saved disk form defines apple pict format entire bitmap pixmap referring color images may copied one grafport another scaling clipping known blitting copybits name function operation basis animation sprite-like effects mac quickdraw provides similar blitting function designed implement scrolling within grafport image port shifted new location without scaling clipping desired graphics primitive operation vectored stdprocs series function pointers stored grafport limited polymorphism permits individual operations overridden replaced custom functions allowing printer drivers intercept graphics commands translate suitable printer operations way quickdraw rendered using postscript fact enabled macintosh practically invent desktop publishing similar subclass window data structure began associated grafport thus basically making windows exchangeable grafport convenient could source programming errors quickdraw started life lisagraf part apple lisa development macintosh initially simplified later extended originally quickdraw grafports supported bit depth 1 one bit per pixel black white suited built-in screen early macintosh fixed size 512×342 pixels limited color supported using crude planar model allowing quickdraw drive types dot-matrix printer used multi-colored ribbons applications supported feature 1987 macintosh ii developed launched designed conventional three-box design computer monitor keyboard separate monitor separate larger original mac video architecture necessarily change addition mac ii took macintosh black-and-white full color apple also decided time support seamless desktop spanning multiple monitors industry first thus color quickdraw significant extension original quickdraw created original architecture lacked much provision expandability using series hacks apple developers managed make addition color new video architecture virtually seamless developers end users color quickdraw introduced new data structures including gdevices represent attached video card/monitor new color grafport cgrafport structure handle color well pixmaps instead bitmaps multiple bits-per-pixel images one hacks compatibility used new structure exactly size old one data members place additional handles pointers color structures place bitmap fields upper two bits rowbytes field pressed use flags distinguish grafport cgrafport always zero old-style grafports bitmap could never feasibly wide ever set bits use two high bits would come back haunt quickdraw later forced maximum row width 4,095 32-bit pixmaps became problematic high-resolution graphics work later development carbon eliminated limitation fully backward compatible palette manager also added color quickdraw managed arbitration colors indexed video devices graphics primitives operations remained either unchanged would operate color else new color versions black white apis added initially color quickdraw capable operating 1 2 4 8-bit video cards available time soon however 24-bit video cards appeared so-called true color quickdraw updated support 32 bits per pixel reality 24 bits 8 unused color data 32-bit quickdraw architecture always allowed however new apis necessary color data structures allowed color depth 1 2 4 8 15 24 bits yielding 2 4 16 256 32,768 16,777,216 colors respectively 4 16 256 scales grey quickdraw took care managing resampling colors available color depths actual video hardware transfer offscreen image buffers including optionally dithering images lower depth improve image quality set color sampling utilities also added programmers could generate optimal color palettes use indexed video devices architecture quickdraw always allowed creation grafports associated bitmaps pixmaps offscreen graphics could composed memory without visible immediately screen pixels could transferred offscreen ports screen using quickdraw blitting function copybits offscreen compositing workhorse games graphics-intensive applications however advent 32-bit quickdraw offscreen worlds created set hand programmer within application involving three separate fairly complex data structures cgrafport pixmap gdevice indexed devices color look-up table inverse could error prone 32-bit quickdraw os support handling added offscreen graphics world gworld video buffer pixmap gworld could stored main memory available unused parts video ram copying screen could optimized speed avoiding need transfer large amount pixel data across main memory bus advent quicktime quickdraw gained ability deal compressed raster data jpeg quicktime image compression manager integrated closely quickdraw particular image decompression calls full-fledged quickdraw drawing calls picture recorded compressed data would saved part picture display picture later drawn image compression manager also added integration colorsync color matching apart back-end changes optimize new processor architectures powerpc quickdraw remained largely unchanged throughout rest life classic mac os quickdraw gx quickdraw 3d shared quickdraw name able interoperate quickdraw pixmap picture data structures otherwise completely separate functionality mac os x quickdraw became part carbon api 2005 release mac os x 10.4 quickdraw officially deprecated 2010 macpaint 1.3 source code release computer history museum historical version quickdraw source code became available | [
790,
3346,
1069,
2547,
100,
1627,
7335,
7814,
2294,
5571,
5660,
6814,
6016,
8097,
1103,
7093,
405,
502,
6557,
6295,
149,
6565,
4453,
3412,
961,
5786,
3920,
1897,
2357,
2266
] | Test |
6,766 | 9 | Trait_(computer_programming):trait computer programming computer programming trait concept used object-oriented programming represents set methods used extend functionality class traits provide set methods implement behaviour class require class implement set methods parameterize provided behaviour inter-object communication traits somewhat object-oriented protocol interface mixin interface may define one behaviors via method signatures trait defines behaviors via full method definitions i.e. includes body methods contrast mixins include full method definitions may also carry state member variable traits usually n't hence object defined trait created composition methods used classes without requiring multiple inheritance case naming collision one trait used class method name programmer must explicitly disambiguate one methods used class thus manually solving diamond problem multiple inheritance different composition methods object-oriented programming conflicting names automatically resolved scoping rules whereas mixins composed using inheritance operation traits offer much wider selection operations including traits composed following ways traits come originally programming language self supported following programming languages example uses trait enhance classes allows simulating aspects multiple inheritance trait rust declares set methods type must implement rust compilers require traits explicated ensures safety generics rust also helps avoid major problems templates c++ // type must ord trait // operations done fn get_max ord option simplify tedious repeated implementation traits like codice_3 codice_4 codice_5 used request compilers generate certain implementations automatically derivable traits include codice_6 codice_7 codice_3 codice_9 codice_10 codice_11 codice_12 codice_4 codice_14 | [
2451,
5983,
4296,
7333,
6428,
7370,
4705,
6029,
5091,
5506,
8122,
1889,
5965,
4999,
2619,
1803
] | Test |
6,767 | 0 | Automatic_acquisition_of_sense-tagged_corpora:automatic acquisition sense-tagged corpora knowledge acquisition bottleneck perhaps major impediment solving word sense disambiguation wsd problem unsupervised learning methods rely knowledge word senses barely formulated dictionaries lexical databases supervised learning methods depend heavily existence manually annotated examples every word sense requisite met handful words testing purposes done senseval exercises therefore one promising trends wsd research using largest corpus ever accessible world wide web acquire lexical information automatically wsd traditionally understood intermediate language engineering technology could improve applications information retrieval ir case however reverse also true web search engines implement simple robust ir techniques successfully used mining web information employed wsd direct way using web corpora enhance wsd performance automatic acquisition sense-tagged corpora fundamental resource feed supervised wsd algorithms although far commonplace wsd literature number different effective strategies achieve goal already proposed strategies automatic extraction examples train supervised learning algorithms reviewed far best explored approach mine web word sense disambiguation results certainly encouraging however several open research issues related use web examples wsd besides automatic acquisition examples web wsd experiments profited web clear however research opportunities remain largely unexplored instance little known use lexical information extracted web knowledge-based wsd systems also hard find systems use web-mined parallel corpora wsd even though already efficient algorithms use parallel corpora wsd | [
5304,
4037,
84
] | Test |
6,768 | 3 | Thexder:thexder thexder player controls fighter robot able transform jet originally released 1985 nec pc-8801 platform japan game arts licensed thexder square order develop conversion nintendo entertainment system nes game console 1987 game arts also developed thexder conversion msx platform game licensed sierra entertainment release united states 1987 sierra ported game multiple platforms including ibm pc tandy color computer 3 apple ii apple iigs apple macintosh tandy 1000 computer became company best-selling title 1987 1988 activision released game europe commodore amiga 1990 game sold one million copies worldwide thexder quickly became best-selling hit selling 500,000 copies pc8801 platform popular japan despite home market success thexder garnered little attention abroad initially conversion msx best selling platform brazil many east european countries became international hit compute praised apple iigs version thexder computer first true arcade game excellent play value dollar 1988 games machine gave amiga version 74 score 1991 dragon gave macintosh pc/ms-dos versions game 4 5 stars game went sell one million copies worldwide becoming game arts biggest selling title 1987 thexder considered important breakthrough title run-and-gun shooter game genre paving way titles contra metal slug | [
405,
6811,
1508,
6380,
2085
] | Test |
6,769 | 4 | WeProtect:weprotect weprotect styled weprotect global alliance led uk government founded baroness joanna shields supported 84 countries 24 technology companies 20 civil society organisations weprotect mission stop global crime online child sexual abuse exploitation 22 july 2013 then-prime minister david cameron made speech regarding proliferation accessibility child abuse images internet cracking online pornography prime minister announced new uk-us taskforce would created lead global alliance biggest internet companies tackle indecent images children online joanna shields prime minister advisor digital industries would head initiative working uk us governments law enforcement agencies technology industry maximise international efforts october 2013 announced damian green hmg minister policing criminal justice victims would travelling us joanna shields formalise arrangements task force meet us attorney general leading internet companies 18 november 2013 prime minister hosted internet safety summit 10 downing street joanna shields discuss done block child abuse content protect children harmful material online participants including leading search engines internet service providers national crime agency internet watch foundation nspcc discussed rid internet child sexual abuse exploitation summit internet safety communiqué issued setting agreed-upon action 13 december 2013 policing minister damian green us acting assistant attorney general mythili raman joanna shields launched first meeting us-uk taskforce counter online child exploitation ’ next year chair taskforce joanna shields responsible bringing together experts government industry law enforcement academia sides atlantic combat child sexual exploitation crimes internet reduce volume indecent images children online april 2014 home office minister damian green addressed nspcc child safety conference government work stamp online sexual exploitation revealed government working major industry players google microsoft pilot make even tougher pedophiles share child abuse images also told conference google launched programme embed engineers internet watch foundation speech encouraged internet companies innovate order fight online child sexual exploitation announced joanna shields would leading industry solutions event part us-uk taskforce event would bring together experts across technology sector come innovative solutions end sharing indecent images interacting adults children sexual purposes online may 2014 industry solutions event weprotect 2014 took place grey inn london attendance 67 technology specialists innovators 48 world leading technology companies event led national crime agency ceop home office delivered brandfuel facilitated pa consulting solutions event started hackathon leading internet technology cyber intelligence companies working develop breakthrough technology concepts could assist prevention investigation online child abuse protection victims event successfully laid foundation new model collaboration across industry harnessing diverse range technical skills knowledge experience tackle sharing indecent images grooming children sexual purposes uk prime minister hosted weprotect global summit london december 2014 summit gathered government leaders leading technology companies civil society organisations galvanise action end online child sexual exploitation home secretary opened summit speaking scale abuse uk combat prime minister keynote speaker second day alongside raft measures technical innovations tackle use internet view share indecent images prime minister announced uk would work unicef develop new global child protection fund uk would making £50 million contribution fund five-year period keith bristow director general national crime agency also spoke summit addressed need law enforcement civil society technology industry work together minimise risk children maximise risk offenders joanna shields prime minister digital adviser spoke importance technology industry using talents skills capacity innovation tackle online child exploitation also delivered report milestones industry partners course 2014 attendees also heard executives microsoft google ey visa presented contributions weprotect pledged continue developing concepts emerged may workshop including blocking viewing illegal material browser level internet interaction risk scoring victim identification tool system children report self-generated indecent images also announced united arab emirates would hosting another conference 2015 ensure global response comes fruition end summit four ambitious statements action published date signed 50 countries 20 companies 10 civil society organisations follow-up weprotect industry event took place september 2015 speaking event uk minister internet safety security baroness joanna shields delivered message continued support initiative vital importance broad global coalition willing coming together share information collaborate best protect children online industry delegates also heard representatives weprotect initiative including google facebook microsoft milestones achieved companies preventing sexual abuse images appearing search results identifying online grooming detecting removing videos children abused 16–17 november 2015 united arab emirates hosted second weprotect global summit abu dhabi may 2016 weprotect founder baroness joanna shields announced weprotect merged global alliance child sexual abuse online “ create first time single organisation influence expertise resources transform online child sexual exploitation dealt worldwide ” july 2016 weprotect global alliance launched new fund end violence children united nations deliver global program capacity capability initial donation £40 million uk government fund hosted unicef weprotect global alliance board responsible advising prioritize activities maximum impact may 2017 press conference rome pontifical gregorian university collaboration centre child protection institute psychology partnership weprotect global alliance telefono azzurro announced 3–6 october 2017 would host world congress entitled 'child dignity digital world announced invitation-only congress brings together distinguished academic experts business leaders leaders civil society high-level politicians religious representatives across globe provides historic opportunity set global agenda fight online sexual child abuse child protection digital world leadership advisory board | [
7286
] | Test |
6,770 | 4 | Xceedium:xceedium xceedium inc. network security software company providing privileged identity access management solutions subsequently acquired ca technologies software used control manage risks privileged users privileged accounts admin root etc privileged credentials passwords certificates digital keys etc pose systems data xceedium inc. founded 2000 david van david cheung company split lucid technologies group company created 1995 company developed software internal use provided consultants secure remote access sensitive customer systems software became core technology xceedium gatekeeper product xceedium products aimed mid-large sized enterprises vertical market segments including banking financial services retail telecom healthcare energy government agencies marketed product global partner network xceedium headquarters originally located jersey city new jersey relocated northern virginia march 2011 initial funding venture-backed company came arrowpath venture partners nationwide mutual capital xceedium private venture capital backed company funding arrowpath venture partners nationwide mutual capital june 2012 xceedium closed 12 million financing led arrowpath venture partners bringing total capital raised 25m xceedium acquired ca technologies august 2015 xceedium gatekeeper first product designed company initially built out-of-band in-band kvm remote control gatekeeper software updated provide network-based access control session recording/playback later gatekeeper cloakware password authority product acquired irdeto integrated form xceedium xsuite main capabilities xceedium xsuite role-based access control command filtering white/black list user containment prevents ssh based leapfrogging rdp hopping unauthorized nodes session monitoring/policy violation alerting session recording playback privileged password vaulting management xceedium xsuite platform enabled organizations apply principle least privilege holds systems individuals granted access resources commands absolutely necessary required task according company xsuite limited access privileged users systems commands explicitly authorized role-based access control also monitored activities privileged users sent alerts individuals attempted violate policy system recorded privileged user sessions telnet rdp ssh vnc provided mechanism replay recorded session investigations forensics xsuite cloud amazon web services aws introduced extension xsuite platform provided privileged identity access management standalone aws implementations hybrid architectures include infrastructure nodes e.g. servers network devices storage devices security systems running aws amazon elastic compute cloud ec2 private clouds virtual machines traditional single os/hardware scenarios following acquisition xceedium ca xceedium xsuite integrated ca product range ca privileged access manager | [
7214,
7765,
651,
5064,
7570,
7508
] | Validation |
6,771 | 3 | HP_Serviceguard:hp serviceguard hp serviceguard formerly known mc/serviceguard high-availability cluster software produced hp runs hp-ux linux serviceguard existed since 1990 hp claims first high availability solution unix linux port called sg/lx existed since 1999 briefly suspended reintroduced june 2012 | [
3764,
578,
6586,
2776,
900
] | Test |
6,772 | 3 | Micro-operation:micro-operation computer central processing units micro-operations also known micro-ops μops detailed low-level instructions used designs implement complex machine instructions sometimes termed macro-instructions context usually micro-operations perform basic operations data stored one registers including transferring data registers registers external buses central processing unit cpu performing arithmetic logical operations registers typical fetch-decode-execute cycle step macro-instruction decomposed execution cpu determines steps series micro-operations execution micro-operations performed control cpu control unit decides execution performing various optimizations reordering fusion caching various forms μops long basis traditional microcode routines used simplify implementation particular cpu design perhaps sequencing certain multi-step operations addressing modes recently μops also employed different way order let modern cisc processors easily handle asynchronous parallel speculative execution traditional microcode one table lookups equivalent done locate appropriate μop-sequence based encoding semantics machine instruction decoding translation step however instead rigid μop-sequences controlling cpu directly microcode-rom μops dynamically buffered rescheduling executed buffering means fetch decode stages detached execution units feasible traditional microcoded hard-wired design allows degree freedom regarding execution order makes extraction instruction level parallelism normal single-threaded program possible provided dependencies checked etc. opens analysis therefore also reordering code sequences order dynamically optimize mapping scheduling μops onto machine resources alus load/store units etc. happens μop-level sub-operations different machine macro instructions may often intermix particular μop-sequence forming partially reordered machine instructions direct consequence out-of-order dispatching microinstructions several macro instructions however micro-op fusion aims fact complex microinstruction may replace simpler microinstructions certain cases typically order minimize state changes usage queue reorder buffer space therefore reducing power consumption micro-op fusion used modern cpu designs execution optimization gone even processors translate many machine instructions series μops also opposite appropriate combine certain machine instruction sequences compare followed conditional jump complex μop fits execution model better thus executed faster less machine resources involved also known macro-op fusion another way try improve performance cache decoded micro-operations macroinstruction executed processor directly access decoded micro-operations special cache instead decoding execution trace cache found intel netburst microarchitecture pentium 4 widespread example technique size cache may stated terms many thousands micro-operations store kμops | [
5012,
1447,
5371,
3948,
7527,
7529,
5737,
2567,
4694,
5042,
1481,
5055,
1867,
2248,
6148,
6497,
2266,
1162,
4765,
4047,
5483,
1556,
5487,
6198,
1568,
6922,
7666,
515,
8024,
5521,
3747,
4098,
1237,
2351,
5190,
1252,
1254,
4847,
4479,
8066,... | Validation |
6,773 | 2 | Recovery_Console:recovery console recovery console feature windows 2000 windows xp windows server 2003 operating systems provides means administrators perform limited range tasks using command line interface primary function enable administrators recover situations windows boot far presenting graphical user interface recovery console used provide way access hard drive emergency command prompt recovery console accessed either original installation media used install windows also installed hard drive added ntldr menu however relying latter risky requires computer boot point ntldr loads recovery console simple command-line interpreter cli many available commands closely resemble commands normally available codice_1 namely codice_2 codice_3 codice_4 forth recovery console administrator filesystem access recovery console default severely limited administrator using recovery console read-only access volumes except boot volume even boot volume access root directory windows system directory e.g \winnt changed changing security policies enable read/write access complete file system including copying files removable media i.e floppy drives although appears list commands available using codice_9 command many articles recovery console including authored microsoft codice_10 command available protocol stacks loaded way connect shared folder remote computer implied | [
7879,
1812,
3937,
3263,
6088,
378,
2198,
6096,
1475,
7553,
6823,
7195,
5410,
7564,
2953,
422,
6844,
2245,
435,
1140,
5442,
4377,
5090,
3340,
7602,
1524,
4387,
6164,
4759,
1534,
6885,
7619,
2999,
5475,
6528,
2290,
4774,
1181,
5480,
3711,
... | Test |
6,774 | 0 | Requirements_Modeling_Framework:requirements modeling framework requirements modeling framework rmf open-source software framework working requirements based reqif standard rmf consists core allowing reading writing manipulating reqif data user interface allowing inspect edit request data rmf first currently open-source reference implementation reqif standards noteworthy fact rmf already deployed prostep reqif implementor forum order ensure interoperability commercial implementation since 2011 reports german international press rmf rmf development name pror since 2009 scope deploy research project collaborative efforts quickly developed research project verde resulting significant acceleration development point data model based rif predecessor reqif june 2011 proposal created transform code eclipse foundation project proposal adopted november 2011 part migration eclipse foundation conversion rif current version reqif 1.0.1 spring 2012 deploy verde opted research projects nevertheless rmf keeps evolving within framework research project advance formal mind free extensions pror name pror essentials developed currently neither version 0.14 0.13 integrated latest version eclipse neither pror rmf version 0.10.0 remains reasons unknown version 0.13 release folder version 0.14 latest folder integrated eclipse version mars.2 release 4.5.2 rmf core allows storing writing validating manipulating reqif files manipulation data implemented programmatically using emf pror additionally enables interactive creation inspecting editing reqif models requirements presented configurable tables links requirements created via drag drop context menus pror designed integration eclipse-based tools extension point available makes possible integrate available renderers editors react drag drop events outside part deploy advance integration event-b models developed topcased -project suggested integrated rmf integrations proposed implemented prototype | [
6507,
3166,
1254,
3680,
7627,
7442,
651,
5571,
5666,
7999,
6922,
7017,
3895,
8013,
2054,
6756,
515,
5424,
8024,
5429,
1600,
3915,
6778,
1989,
1607,
84,
1805,
360
] | Test |
6,775 | 5 | Network-based_Call_Signaling:network-based call signaling network-based call signaling ncs profile media gateway control protocol mgcp use packetcable applications voice-over-ip network implementing ncs designed according media gateway control protocol architecture interconnecting packet network traditional public switched telephone network pstn architecture physically decomposes functionality providing complete end-to-end multimedia telecommunication sessions several discrete components notably media gateway mg located customer premises performs physical translation analog voice video streams packetized digital data media gateway controller mgc centralized server controls typically many media gateways manages complexity call setup resource negotiation call routing tear-down addition architecture also uses signaling gateways traditional telecommunication channels ss7-based networks like mgcp ncp device control protocol defining interaction mgc also called call agent media gateways one layer packetcable suite specifications relies upon companion protocol specifications provide complete end-to-end telecommunication functionality network-based call signaling modification media gateway control protocol mgcp ncs provides packetcable profile application programming interface mgci corresponding protocol mgcp controlling voice-over-ip voip embedded clients external call control elements embedded client network element provides mgci functions provide connection control endpoint control auditing status reporting use system model naming conventions modification mgcp ncs profile include following ncs aims supporting packetcable-embedded clients functionality present mgcp 1.0 protocol superfluous ncs removed contains extensions modifications mgcp however mgcp architecture mgcp constructs relevant embedded clients preserved ncs ncs protocol contains minor simplifications mgcp 1.0 | [
5361
] | Test |
6,776 | 4 | Google_Safe_Browsing:google safe browsing google safe browsing blacklist service provided google provides lists urls web resources contain malware phishing content google chrome safari firefox vivaldi gnome web browsers use lists google safe browsing service checking pages potential threats google also provides public api service google also provides information internet service providers sending e-mail alerts autonomous system operators regarding threats hosted networks according google september 2017 3 billion internet devices protected service google maintains safe browsing lookup api privacy drawback urls looked hashed server knows urls api users looked safe browsing update api hand compares 32-bit hash prefixes url preserve privacy chrome firefox safari browsers use latter safe browsing also stores mandatory preferences cookie computer google safe browsing conducts client-side checks website looks suspicious sends subset likely phishing social engineering terms found page google obtain additional information available google servers whether website considered malicious logs including ip address one cookies kept two weeks tied safe browsing requests made device websites carrying ads infected might blacklisted google safe browsing even website malware request removal blacklist requires webmaster create google webmaster tool account take several days removed | [
2902,
5372,
6427,
2569,
3309,
7924,
2591,
5775,
6153,
5455,
4762,
7967,
6176,
5476,
831,
5141,
136,
2317,
2673,
5151,
7285,
2683,
855,
6937,
168,
6950,
5534,
2712,
4116,
6978,
561,
201,
7346,
5571,
2037,
7007,
8107,
6297,
2417,
2086,
28... | Test |
6,777 | 4 | Webroot:webroot webroot inc. private american company provides internet security consumers businesses company founded boulder colorado us headquartered broomfield colorado us operations san mateo san diego globally australia austria ireland japan united kingdom international headquarter located dublin ireland webroot founded 1997 steven thomas launched webroot first commercial product trace removal agent called webroot window washer investors include venture capital firms technology crossover ventures accel partners mayfield 2002 webroot launched spyware blocking removal product called webroot spy sweeper company introduced antivirus protection launch spy sweeper antivirus 2006 october 2007 webroot antivirus antispyware desktop firewall released added firewall protection feature webroot entered enterprise market 2004 launch webroot spy sweeper enterprise combined spy sweeper technology enables administrators deploy antispyware protection across entire network october 2008 webroot launched first consumer security suite webroot internet security essentials united states international release security suite followed early 2009 august 2009 webroot appointed new president ceo former ceo wily technology may 2010 webroot announced plans open international headquarters dublin ireland july 2010 webroot internet security complete 2011 released including antivirus antispyware protection firewall capabilities online back-up password management licensed lastpass protection identity theft credit card monitoring us customers september 2010 webroot opened regional office leidschendam netherlands primarily aimed distributing webroot enterprise security-as-a-service saas products businesses webroot mobile security android launched april 5 2011 smartphones tablets free basic version paid premium version app designed protect viruses apps threats delivered via web browsing threats created mobile devices lost secureanywhere products launched october 4 2011 mobile security offerings expanded include ios mobile operating system october 2011 webroot launched new generation products using prevx cloud technology included three basic products windows secureanywhere antivirus essentials complete 2012 security android ios mobile devices february 2012 products businesses added july 2014 webroot announced brightcloud security services new portfolio services enterprise-class businesses including integration next-generation firewalls siems september 2017 webroot appointed new president ceo former ceo lancope mike potts february 7 2019 carbonite inc. announced entered definitive agreement acquire webroot march 26 2019 carbonite closed acquisition webroot purchase price 618.5 million cash november 2007 webroot acquired uk-based email systems ems announced provider security software-as-a-service saas market december 2009 webroot announced partnership virtual private network software provider anchorfree version without advertisements anchorfree vpn software protection via webroot antivirus antispyware software produced march 2010 webroot announced acquisition swedish corporate internet security company email systems scandinavia ess july 2010 webroot acquired san diego california-based web content classification security services provider brightcloud adding web reputation content classification technology existing products november 2010 webroot acquired uk cloud-based anti-malware company prevx july 2011 partnership struck global distribution firm tech data making webroot products available tech data network 125,000 channel partners 100 countries around world july 2013 webroot rsa security formed partnership enhance firms real-time phishing detection september 2016 webroot acquired assets cyberflow analytics company applying data science network anomaly detection february 2019 webroot announced acquired carbonite march 2019 carbonite confirmed purchase av-comparatives gave nine vendors including webroot highest award july 2012 anti-phishing test webroot took 9th place among 18 products tested efficacy blocking phishing websites av-comparatives performance test october 2012 webroot best pcmark score lightest impact 20 products tested windows 7 64-bit machine webroot worst results 20 products tested av-comparatives september 2012 file detection test malicious software terms malware detection rates false alarms webroot detected less 80 percent viral samples much worse 94.4 percent rate second-lowest detecting product webroot inappropriately flagged 210 clean files raising many false positives 19 products tested combined according av-comparatives results misses confirmed several tests also vendor pc magazine awarded webroot secureanywhere 19 times editor choice security product year highest award given security software programs pc magazine test 2013 webroot found pc magazine staff best score malware blocking tests malware removal tests speed scans installation speed 2014 test pcmag found webroot detection rate 89 percent overall malware cleanup score 6.6 points tops among products tested using malware collection gartner listed webroot visionary quadrant 2014 assessment endpoint protection platforms 2014 passmark software software hardware performance benchmarking company benchmarked webroot secureanywhere business endpoint protection webroot secureanywhere antivirus using 13 performance metrics tests webroot products found outperform competitors variety metrics including scan times cpu usage others earning highest overall score tests november 2016 evaluation mobile security products android av-test given webroot secureanywhere mobile product protection score 3.5 6 placing near bottom 26 products evaluated test terms protection malware detection latest android malware real-time detection latest android malware discovered last 4 weeks scores industry average score october 2017 av-comparatives performed head-to-head comparison products vipre webroot webroot secureanywhere product able achieve 86.4 protection rate compared vipre cloud 100 rate test performed using test set 316 live malicious urls found field january 2018 test 84 various android antimalware apps av-comparatives webroot security premier detected 99.7 antimalware samples placing 30 tested apps showed better detection rates | [
7323,
3506,
91,
4115,
5452,
7425,
6084,
3089,
2998,
4492,
3857,
1931,
4138,
385,
301,
910,
1838,
2296,
4689,
5925,
6005,
6006,
4783,
3111,
7087,
496,
6644,
5144,
6823,
7193,
3123,
142,
935,
1395,
3561,
330,
7478,
5601,
6043,
2693,
6305,... | Test |
6,778 | 9 | Interpreter_(computing):interpreter computing computer science interpreter computer program directly executes instructions written programming scripting language without requiring previously compiled machine language program interpreter generally uses one following strategies program execution early versions lisp programming language dartmouth basic would examples first type perl python matlab ruby examples second ucsd pascal example third type source programs compiled ahead time stored machine independent code linked run-time executed interpreter and/or compiler jit systems systems smalltalk contemporary versions basic java may also combine two three interpreters various types also constructed many languages traditionally associated compilation algol fortran cobol c/c++ interpretation compilation two main means programming languages implemented mutually exclusive interpreting systems also perform translation work like compilers terms interpreted language compiled language signify canonical implementation language interpreter compiler respectively high level language ideally abstraction independent particular implementations interpreters used early 1952 ease programming within limitations computers time e.g shortage program storage space native support floating point numbers interpreters also used translate low-level machine languages allowing code written machines still construction tested computers already existed first interpreted high-level language lisp lisp first implemented 1958 steve russell ibm 704 computer russell read john mccarthy paper realized mccarthy surprise lisp eval function could implemented machine code result working lisp interpreter could used run lisp programs properly evaluate lisp expressions programs written high level language either directly executed kind interpreter converted machine code compiler assembler linker cpu execute compilers assemblers generally produce machine code directly executable computer hardware often optionally produce intermediate form called object code basically machine specific code augmented symbol table names tags make executable blocks modules identifiable relocatable compiled programs typically use building blocks functions kept library object code modules linker used combine pre-made library files object file application form single executable file object files used generate executable file thus often produced different times sometimes even different languages capable generating object format simple interpreter written low level language e.g assembly may similar machine code blocks implementing functions high level language stored executed function entry look table points code however interpreter written high level language typically uses another approach generating walking parse tree generating executing intermediate software-defined instructions thus compilers interpreters generally turn source code text files tokens may may generate parse tree may generate immediate instructions stack machine quadruple code means basic difference compiler system including built separate linker generates stand-alone machine code program interpreter system instead performs actions described high level program compiler thus make almost conversions source code semantics machine level i.e program changed interpreter conversion work every time statement function executed however efficient interpreter much translation work including analysis types similar factored done first time program module function even statement run thus quite akin compiler works however compiled program still runs much faster circumstances part compilers designed optimize code may given ample time especially true simpler high level languages without many dynamic data structures checks type-checks traditional compilation executable output linkers .exe files .dll files library see picture typically relocatable run general operating system much like object code modules difference relocation done dynamically run time i.e program loaded execution hand compiled linked programs small embedded systems typically statically allocated often hard coded flash memory often secondary storage operating system sense historically interpreter-systems self-contained editor built becoming common also compilers often called ide although programmers prefer use editor choice run compiler linker tools manually historically compilers predate interpreters hardware time could support interpreter interpreted code typical batch environment time limited advantages interpretation software development cycle programmers make frequent changes source code using compiler time change made source code must wait compiler translate altered source files link binary code files together program executed larger program longer wait contrast programmer using interpreter lot less waiting interpreter usually needs translate code worked intermediate representation translate thus requiring much less time changes tested effects evident upon saving source code reloading program compiled code generally less readily debugged editing compiling linking sequential processes conducted proper sequence proper set commands reason many compilers also executive aid known make file program make file lists compiler linker command lines program source code files might take simple command line menu input e.g make 3 selects third group set instructions issues commands compiler linker feeding specified source code files compiler converts source code binary instruction specific processor architecture thus making less portable conversion made developer environment binary distributed user machines executed without translation cross compiler generate binary code user machine even different processor machine code compiled interpreted program distributed source code needs translated final machine takes time makes program distribution independent machine architecture however portability interpreted source code dependent target machine actually suitable interpreter interpreter needs supplied along source overall installation process complex delivery monolithic executable since interpreter part need installed fact interpreted code easily read copied humans concern point view copyright however various systems encryption obfuscation exist delivery intermediate code bytecode similar effect obfuscation bytecode could decoded decompiler disassembler main disadvantage interpreters interpreted program typically runs slower compiled difference speeds could tiny great often order magnitude sometimes generally takes longer run program interpreter run compiled code take less time interpret total time required compile run especially important prototyping testing code edit-interpret-debug cycle often much shorter edit-compile-run-debug cycle interpreting code slower running compiled code interpreter must analyze statement program time executed perform desired action whereas compiled code performs action within fixed context determined compilation run-time analysis known interpretive overhead access variables also slower interpreter mapping identifiers storage locations must done repeatedly run-time rather compile time various compromises development speed using interpreter execution speed using compiler systems lisps allow interpreted compiled code call share variables means routine tested debugged interpreter compiled thus benefit faster execution routines developed many interpreters execute source code stands convert compact internal form many basic interpreters replace keywords single byte tokens used find instruction jump table interpreters pbasic interpreter achieve even higher levels program compaction using bit-oriented rather byte-oriented program memory structure commands tokens occupy perhaps 5 bits nominally 16-bit constants stored variable-length code requiring 3 6 10 18 bits address operands include bit offset many basic interpreters store read back tokenized internal representation interpreter might well use lexical analyzer parser compiler interpret resulting abstract syntax tree example data type definitions latter toy interpreter syntax trees obtained c expressions shown box interpretation used sole method execution even though interpreter interpreted directly executed program needed somewhere bottom stack code interpreted definition machine code cpu execute spectrum possibilities interpreting compiling depending amount analysis performed program executed example emacs lisp compiled bytecode highly compressed optimized representation lisp source machine code therefore tied particular hardware compiled code interpreted bytecode interpreter written c compiled code case machine code virtual machine implemented hardware bytecode interpreter compiling interpreters sometimes also called compreters bytecode interpreter instruction starts byte therefore bytecode interpreters 256 instructions although may used bytecodes may take multiple bytes may arbitrarily complicated control tables necessarily ever need pass compiling phase dictate appropriate algorithmic control flow via customized interpreters similar fashion bytecode interpreters threaded code interpreters similar bytecode interpreters instead bytes use pointers instruction word points function instruction sequence possibly followed parameter threaded code interpreter either loops fetching instructions calling functions point fetches first instruction jumps every instruction sequence ends fetch jump next instruction unlike bytecode effective limit number different instructions available memory address space classic example threaded code forth code used open firmware systems source language compiled f code bytecode interpreted virtual machine spectrum interpreting compiling another approach transform source code optimized abstract syntax tree ast execute program following tree structure use generate native code just-in-time approach sentence needs parsed advantage bytecode ast keeps global program structure relations statements lost bytecode representation compressed provides compact representation thus using ast proposed better intermediate format just-in-time compilers bytecode also allows system perform better analysis runtime however interpreters ast causes overhead bytecode interpreter nodes related syntax performing useful work less sequential representation requiring traversal pointers overhead visiting tree blurring distinction interpreters bytecode interpreters compilation just-in-time compilation jit technique intermediate representation compiled native machine code runtime confers efficiency running native code cost startup time increased memory use bytecode ast first compiled adaptive optimization complementary technique interpreter profiles running program compiles frequently executed parts native code techniques decades old appearing languages smalltalk 1980s just-in-time compilation gained mainstream attention amongst language implementers recent years java .net framework modern javascript implementations matlab including jits self-interpreter programming language interpreter written programming language interpret example basic interpreter written basic self-interpreters related self-hosting compilers compiler exists language interpreted creating self-interpreter requires implementation language host language may another programming language assembler first interpreter system bootstrapped new versions interpreter developed language way donald knuth developed tangle interpreter language web industrial standard tex typesetting system defining computer language usually done relation abstract machine so-called operational semantics mathematical function denotational semantics language may also defined interpreter semantics host language given definition language self-interpreter well-founded define language self-interpreter tells reader expressiveness elegance language also enables interpreter interpret source code first step towards reflective interpreting important design dimension implementation self-interpreter whether feature interpreted language implemented feature interpreter host language example whether closure lisp-like language implemented using closures interpreter language implemented manually data structure explicitly storing environment features implemented feature host language less control programmer interpreter different behavior dealing number overflows realized arithmetic operations delegated corresponding operations host language languages elegant self-interpreter lisp prolog much research self-interpreters particularly reflective interpreters conducted scheme programming language dialect lisp general however turing-complete language allows writing interpreter lisp language lisp programs lists symbols lists xslt language xslt programs written xml sub-domain meta-programming writing domain-specific languages dsls clive gifford introduced measure quality self-interpreter eigenratio limit ratio computer time spent running stack n self-interpreters time spent run stack self-interpreters n goes infinity value depend program run book structure interpretation computer programs presents examples meta-circular interpretation scheme dialects examples languages self-interpreter forth pascal microcode commonly used technique imposes interpreter hardware architectural level computer microcode layer hardware-level instructions implement higher-level machine code instructions internal state machine sequencing many digital processing elements microcode used general-purpose central processing units well specialized processors microcontrollers digital signal processors channel controllers disk controllers network interface controllers network processors graphics processing units hardware microcode typically resides special high-speed memory translates machine instructions state machine data input sequences detailed circuit-level operations separates machine instructions underlying electronics instructions designed altered freely also facilitates building complex multi-step instructions reducing complexity computer circuits writing microcode often called microprogramming microcode particular processor implementation sometimes called microprogram extensive microcoding allows small simple microarchitectures emulate powerful architectures wider word length execution units relatively simple way achieve software compatibility different products processor family | [
3930,
3931,
5012,
4662,
5367,
7889,
6428,
3623,
2566,
2211,
1478,
1854,
4704,
7914,
2941,
1856,
5757,
3981,
5771,
2600,
5429,
4003,
5784,
2255,
7223,
2614,
6497,
84,
783,
7951,
3680,
6507,
95,
6876,
7970,
7627,
5117,
6898,
6181,
3368,
2... | Validation |
6,779 | 4 | Messaging_security:messaging security messaging security program provides protection companies messaging infrastructure programs includes ip reputation-based anti-spam pattern-based anti-spam administrator defined block/allow lists mail antivirus zero-hour malware detection email intrusion prevention | [
6507,
3495,
4374,
5813
] | Test |
6,780 | 3 | H.E.R.O.:h.e.r.o h.e.r.o standing helicopter emergency rescue operation video game written john van ryzin published activision atari 2600 march 1984 ported apple ii atari 5200 atari 8-bit family colecovision commodore 64 msx zx spectrum sega released version game sg-1000 console japan 1985 gameplay identical sega changed backpack helicopter jetpack player uses helicopter backpack tools rescue victims trapped deep mine mine made multiple screens using flip screen style player assumes control roderick hero sometimes styled r. hero one-man rescue team miners working mount leone trapped roderick reach player equipped backpack-mounted helicopter unit allows hover fly along helmet-mounted laser limited supply dynamite level consists maze mine shafts roderick must safely navigate order reach miner trapped bottom backpack limited amount power player must reach miner power supply exhausted mine shafts may blocked cave-ins magma require dynamite clear helmet laser also destroy cave-ins slowly dynamite unlike cave-in magma lethal touched later levels include walls magma openings alternate open closed requiring skillful navigation mine shafts populated spiders bats unknown creatures deadly touch creatures destroyed using laser dynamite deep mines flooded forcing players hover safely water later levels monsters strike water mine sections illuminated lanterns lantern somehow destroyed layout section becomes invisible exploding dynamite lights mine brief time points scored cave-in cleared creature destroyed player reaches miner points awarded rescue along amount power remaining backpack remaining stick dynamite extra lives awarded every 20,000 points scored review colecovision port electronic games wrote activision wisely used superior graphics cv units provide breathtaking underground panorama concluded congrats activision h.e.r.o real champion june 1987 issue zzap 64 julian rignall wrote—of c64 version— hero looks awful sounds terrible plays absolutely beautifully h.e.r.o included retrogaming compilation activision anthology 1985 analog computing published clone called r.o.t.o atari 8-bit family | [
7903
] | Train |
6,781 | 5 | X.21:x.21 x.21 sometimes referred x21 interface specification differential communications introduced mid-1970s itu-t. x.21 first introduced means provide digital signaling interface telecommunications carriers customers equipment includes specifications dte/dce physical interface elements alignment call control characters error checking elements call control phase circuit switching services test loops x.21 used v.11 provides synchronous data transmission rates 600 bit/s 10 mbit/s also variant x.21 used select legacy applications “ circuit switched x.21 ” x.21 normally found 15-pin d-sub connector capable running full-duplex data transmissions signal element timing clock provided carrier telephone company responsible correct clocking data x.21 primarily used europe japan example scandinavian datex german datex-l circuit switched networks 1980s article based x.21 foldoc x.21 pinouts used | [
1988
] | Test |
6,782 | 0 | Dan_Roth:dan roth dan roth eduardo d. glandt distinguished professor computer information science university pennsylvania roth got b.a summa cum laude mathematics technion israel ph.d computer science harvard university 1995 taught university illinois urbana-champaign 1998 2017 moving university pennsylvania roth fellow american association advancement science aaas association computing machinery acm association advancement artificial intelligence aaai association computational linguistics acl roth ’ research focuses computational foundations intelligent behavior develops theories systems pertaining intelligent behavior using unified methodology heart idea learning central role intelligence work centers around study machine learning inference methods facilitate natural language understanding pursued several interrelated lines work span multiple aspects problem fundamental questions learning inference interact study range natural language processing nlp problems developing advanced machine learning based tools natural language applications roth made seminal contribution fusion learning reasoning machine learning weak incidental supervision machine learning inference approaches natural language understanding roth worked probabilistic reasoning including complexity probabilistic lifted inference constrained conditional models ilp formulations nlp problems constraints-driven learning part-based constellation methods object recognition response based learning developed nlp information extraction tools used broadly researchers commercially including ner coreference resolution wikification srl esl text correction roth editor-in-chief journal artificial intelligence research jair | [
1243,
479
] | Validation |
6,783 | 5 | TCPware:tcpware tcpware third party layered product published process software llc add tcp/ip capabilities openvms need product may seem obvious today back early 1990s digital equipment corporation published vms known time internal policy favoring product called decnet meanwhile many vms users governments large corporations universities discovering tcp/ip based internet required third party software enable connectivity today hp tcpip services openvms putting pressure products like tcpware one reason tcpware faded use two tcpware apis called telnet library ftp library modules allow relatively inexperienced programmer use high level language write software connect across internet useful work also quite bit legacy software relies modules good reason rewite lower packet library level | [
3764,
6908
] | Test |
6,784 | 3 | AlphaStation:alphastation alphastation name given series computer workstations produced 1994 onwards digital equipment corporation later compaq hp name suggests alphastations based dec alpha 64-bit microprocessor supported operating systems alphastations comprise tru64 unix formerly digital unix openvms windows nt alphabios arc firmware workstations also run various versions linux bsd operating systems alpha workstations produced dec include dec 2000 axp decpc axp 150 dec 3000 axp digital personal workstation -series au -series codename miata multia vx40/41/42 alpha xl/alpha xlt line member alcor family swappable daughterboard pentium processor transform dec celebris xl line xp900 onwards alphastation models simply workstation configurations corresponding alphaserver model | [
3764,
6256,
1727,
5911,
4859,
5571,
578,
5055,
2226,
5849,
4435,
8117,
2792,
7131,
4099,
352,
3755
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.