node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4 values |
|---|---|---|---|---|
6,785 | 2 | IBM_Software_Configuration_and_Library_Manager:ibm software configuration library manager ibm software configuration library manager sclm ibm software product component ispf first introduced version 3 ispf upgrade previous component called lmf library management facility introduced version 2 ispf component mvs os/390 z/os operating systems/platforms sclm consists two products library manager configuration manager provides following functions | [
1155,
630,
5571,
5348,
3463,
1516
] | Test |
6,786 | 5 | SIMPLE_(military_communications_protocol):simple military communications protocol standard interface multiple platform link evaluation simple military communications protocol defined nato standardization agreement stanag 5602 simple defines communications protocol provide means geographically national international separated tactical data link tdl equipment c4isr c2 non-c2 test facilities exchange environment data tdl messages order conduct detailed tdl interoperability io testing intended provide specifications common standard interconnect ground rigs types simulation integration facilities simple allows transmission m-series j-series messages ip-based protocols previously j-series messages could sent using link 16 protocol however link 16 radio protocol frequency range limits exchange information within line-of-sight use flexible bearer protocols ip makes easier exchange j-series data particularly simulations integration however simple limited use simulation integration finding applications beyond original purpose wherever transmission j-series data amenable radio protocols link 16 simple standard specifies distributed transfer simulated scenario/synthetic environment using ieee distributed interactive simulation dis protocols dis government/industry initiative define infrastructure linking simulations various types multiple locations create realistic complex virtual worlds simulation highly interactive activities new protocol data unit pdu definition dis pdu added baseline protocol support exchange dis pdus simulated entities content simple dis pdu packet related dis pdus defined ieee 1278.1 standard transmitter signal pdu fields require translation simple standard consists several elements simple application layer protocol designed independent transport layer run using following transport layer protocols simple method exchanging tdl messages take host generated message traffic mids/jtids terminal interface repackage transmission across simple network receiving simple node extracts tdl message traffic received packet presents host interface received mids/jtids terminal development simple resulted requirement february 1996 ad hoc working group ahwg nato common interoperability standards ncis testing single interface standard support interconnection nato resources | [
2087,
7637,
4804,
2566,
7569,
5166
] | Validation |
6,787 | 2 | XAML_Browser_Applications:xaml browser applications xaml browser applications xbap pronounced ex-bap windows presentation foundation .xbap applications hosted run inside web browser firefox internet explorer hosted applications run partial trust sandbox environment given full access computer resources like opening new network connection saving file computer disk wpf functionality available hosted environment intended protect computer malicious applications however also run full trust mode client changing permission starting xbap html page seamless security installation prompt although one perceives application running browser actually runs out-of-process executable presentationhost.exe managed virtual machine initial release .net framework 3.0 xbaps ran internet explorer release .net framework 3.5 sp1 includes xbap extension also run mozilla firefox xbap applications certain restrictions .net features use since run partial trust restricted set permission granted internetzone application nearly standard wpf functionality however around 99 available xbap application therefore wpf ui features available starting february 2009 xbap applications longer function run internet attempting run xbap cause browser present generic error message option exists internet explorer 9 used allow applications run must done care increases potential attack surface security vulnerabilities xbap | [
2986,
5545,
2283,
2831,
6986,
8085,
6991,
1840,
3290,
3383,
930,
6029,
8006,
3559,
5321,
3900,
4082,
4445,
5432,
3495,
2702,
6059,
6858,
2530,
84,
87
] | Test |
6,788 | 2 | IPhone:iphone iphone line smartphones designed marketed apple inc. generations iphone use apple ios mobile operating system software first-generation iphone released june 29 2007 multiple new hardware iterations new ios releases released since user interface built around device multi-touch screen including virtual keyboard iphone wi-fi connect cellular networks iphone take photos play music send receive email browse web send receive text messages record notes perform mathematical calculations receive visual voicemail shooting video also became standard feature iphone 3gs functionality video games reference works social networking enabled downloading mobile apps apple app store contained 2.2 million applications available iphone apple released twelve generations iphone models accompanied one twelve major releases ios operating system first-generation iphone gsm phone established design precedents button placement persisted throughout releases screen size maintained next four iterations iphone 3g added 3g network support followed iphone 3gs improved hardware iphone 4 metal chassis higher display resolution front-facing camera iphone 4s improved hardware voice assistant siri iphone 5 featured taller 4-inch display apple newly introduced lightning connector 2013 apple released iphone 5s improved hardware fingerprint reader lower-cost iphone 5c version 5 colored plastic casings instead metal followed larger iphone 6 iphone 6 plus models featuring displays iphone 6s introduced following year featured hardware upgrades support pressure-sensitive touch inputs well iphone se—which featured hardware 6s smaller form factor 5s 2016 apple unveiled iphone 7 iphone 7 plus add water resistance improved system graphics performance new rear dual-camera setup plus model new color options removing 3.5 mm headphone jack found previous models iphone 8 iphone 8 plus released 2017 adding glass back improved screen camera iphone x released alongside iphone 8 iphone 8 plus highlights near bezel-less design improved camera new facial recognition system named face id home button therefore touch id september 2018 apple released 3 new iphones iphone xs upgraded version since discontinued iphone x iphone xs max larger variant series biggest display iphone xr lower end version iphone x first-generation iphone described revolutionary game-changer mobile phone industry subsequent iterations iphone also garnered praise iphone one widely used smartphones world success credited helping apple become one world valuable publicly traded companies november 1 2018 total 2.2 billion iphones sold development become iphone began 2004 apple started gather team 1,000 employees including jonathan ive designer behind imac ipod work highly confidential project purple apple ceo steve jobs steered original focus away tablet apple eventually revisited form ipad towards phone apple created device secretive collaboration cingular wireless became mobility time—at estimated development cost us 150 million thirty months according steve jobs word imac therefore ipod iphone ipad stands internet individual instruct inform inspire apple rejected design committee approach yielded motorola rokr e1 largely unsuccessful collaboration motorola among deficiencies rokr e1 firmware limited storage 100 itunes songs avoid competing apple ipod nano cingular gave apple liberty develop iphone hardware software in-house even paid apple fraction monthly service revenue iphone 3g exchange four years exclusive us sales 2011 jobs unveiled iphone public january 9 2007 macworld 2007 convention moscone center san francisco two initial models 4 gb model priced us 499 8 gb model us 599 requiring two-year contract went sale united states june 29 2007 6:00 pm local time hundreds customers lined outside stores nationwide passionate reaction launch iphone resulted sections media dubbing 'jesus phone following successful release us first generation iphone made available uk france germany november 2007 ireland austria spring 2008 july 11 2008 apple released iphone 3g twenty-two countries including original six apple released iphone 3g upwards eighty countries territories apple announced iphone 3gs june 8 2009 along plans release later june july august starting us canada major european countries june 19 many would-be users objected iphone cost 40 users household incomes us 100,000 back original first generation iphone made aluminum black plastic accent iphone 3g 3gs feature full plastic back increase strength gsm signal iphone 3g available 8 gb black model black white option 16 gb model iphone 3gs available colors regardless storage capacity iphone 4 aluminosilicate glass front back stainless steel edge serves antennas first available black white version announced released april 2011 10 months later users iphone 4 reported dropped/disconnected telephone calls holding phones certain way became known antennagate january 11 2011 verizon announced media event reached agreement apple would begin selling cdma iphone 4 verizon said would available pre-order february 3 release set february 10 february 2011 verizon iphone accounted 4.5 iphone ad impressions us millennial media mobile ad network 2007 2011 apple spent 647 million advertising iphone us tuesday september 27 apple sent invitations press event held october 4 2011 10:00 cupertino headquarters announce details next generation iphone turned iphone 4s 1 million 4s models sold first 24 hours release october 2011 due large volumes iphone manufactured high selling price apple became largest mobile handset vendor world revenue 2011 surpassing long-time leader nokia american carrier c spire wireless announced would carrying iphone 4s october 19 2011 january 2012 apple reported best quarterly earnings ever 53 revenue coming sale 37 million iphones average selling price nearly 660 average selling price remained fairly constant phone lifespan hovering 622 660 production price iphone 4s estimated ihs isuppli october 2011 188 207 245 16 gb 32 gb 64 gb models respectively labor costs estimated 12.50 30 per unit workers iphone assembly line making 1.78 hour february 2012 comscore reported 12.4 us mobile subscribers used iphone approximately 6.4 million iphones active us alone september 12 2012 apple announced iphone 5 4-inch display predecessors 3.5-inch screen device comes 326 pixels per inch found iphone 4 4s iphone 5 soc a6 processor chip 22 smaller iphone 4s a5 twice fast doubling graphics performance predecessor device 18 thinner iphone 4s measuring 20 lighter july 6 2013 reported apple talks korean mobile carrier sk telecom release next generation iphone lte advanced technology july 22 2013 company suppliers said apple testing larger screens iphone ipad apple asked prototype smartphone screens larger four inches also asked screen designs new tablet device measuring slightly less 13 inches diagonally said september 10 2013 apple unveiled two new iphone models highly anticipated press event cupertino iphone 5c mid-range-priced version handset designed increase accessibility due price available five colors green blue yellow pink white made plastic iphone 5s comes three colors black white gold home button replaced fingerprint scanner touch id phones shipped september 20 2013 september 9 2014 apple revealed iphone 6 iphone 6 plus event cupertino devices larger screen predecessor 4.7 5.5 inches respectively 2016 apple unveiled iphone 7 7 plus added water dust resistance improved system graphics performance new dual-camera setup plus model new color options featured removal 3.5 mm headphone jack iphone september 12 2017 apple officially unveiled iphone 8 8 plus features new glass design camera improvements true tone display wireless charging improved system performance also unveiled iphone x features near bezel-less design facial recognition feature dubbed face id facial tracking used animojis oled screen highest pixel density iphone new telephoto lens works better low light conditions improved cameras ar september 12 2018 apple officially unveiled iphone xs xs max xr steve jobs theater apple park xs xs max feature improved super retina display dolby vision hdr10 support xs max featuring larger 6.5 display improved cameras smart hdr a12 bionic chip iphone xs xs max ip68 water liquid dust resistant allow devices submerged 2 meters duration 30 minutes iphone xr retained ip67 certification found first-generation iphone x also features ips lcd display instead oled displays found higher end models iphone xs/xs max ip68 certifications tested using various liquids chlorinated-water salt water tea wine beer juices apple also announced fourth generation apple watch apple watch series 4 apple sold 6.1 million first generation iphone units five quarters sales fourth quarter 2008 temporarily surpassed research motion rim blackberry sales 5.2 million units briefly made apple third largest mobile phone manufacturer revenue nokia samsung however income deferred recorded sales grew steadily thereafter end fiscal year 2010 total 73.5 million iphones sold 2010 iphone market share barely 4 cell phones however apple pulled 50 total profit global cellphone sales generated apple sold 14.1 million iphones third quarter 2010 representing 91 unit growth year-ago quarter well ahead idc latest published estimate 64 growth global smartphone market september quarter apple sales surpassed research motion 12.1 million blackberry units sold recent quarter ended august 2010 united states market alone third quarter 2010 9.1 million android-powered smartphones shipped 43.6 market apple ios number two phone operating system 26.2 5.5 million iphones sold made popular single device march 2 2011 ipad 2 launch event apple announced sold 100 million iphones worldwide result success iphone sales volume high selling price headlined iphone 4s apple became largest mobile handset vendor world revenue 2011 surpassing long-time leader nokia samsung galaxy ii proved popular iphone 4s parts europe iphone 4s dominant united states january 2012 apple reported best quarterly earnings ever 53 revenue coming sale 37 million iphones average selling price nearly 660 average selling price remained fairly constant phone lifespan hovering 622 660 eight largest phone manufacturers q1 2012 according horace dediu asymco apple samsung combined take 99 industry profits htc took remaining 1 rim lg sony ericsson motorola nokia suffered losses apple earning 73 cents every dollar earned phone makers industry profits grew 5.3 billion first quarter 2010 14.4 billion first quarter 2012 quadruple profits 2007 apple managed increase share profits due increasing carrier subsidies high selling prices iphone negative effect wireless carriers mobility verizon sprint seen ebitda service margins drop sold increasing number iphones quarter ended march 31 2012 apple sales iphone alone 22.7 billion exceeded total microsoft businesses 17.4 billion fourth quarter 2012 iphone 5 iphone 4s best-selling handsets sales 27.4 million 13 smartphones worldwide 17.4 million units respectively samsung galaxy iii third 15.4 million according strategy analytics data impressive performance given iphone portfolio premium pricing adding galaxy iii global popularity appears peaked galaxy iii touted iphone-killer press released samsung led worldwide sales smartphones apple iphone line still managed top samsung smartphone offerings united states 21.4 share 37.8 market respectively ios grew 3.5 37.8 android slid 1.3 fall 52.3 share continued top popularity iphone despite growing android competition also attributed apple able deliver ios updates air android updates frequently impeded carrier testing requirements hardware tailoring forcing consumers purchase new android smartphone get latest version os however 2013 apple market share fallen 13.1 due surging popularity android offerings apple announced september 1 2013 iphone trade-in program would implemented 250 specialty stores us program become available customers must valid contract must purchase new phone rather simply receive credit used later date significant part program goal increase number customers purchase iphones apple stores rather carrier stores september 20 2013 sales date iphone 5s 5c models longest ever queue observed new york city flagship apple store addition prominent queues san francisco us canada however locations throughout world identified anticipation corresponding consumers apple also increased production gold-colored iphone 5s additional one-third due particularly strong demand emerged apple decided introduce gold model finding gold seen popular sign luxury product among chinese customers apple released opening weekend sales results 5c 5s models showing all-time high product sales figures ninemillion handsets sold—the previous record set 2012 fivemillion handsets sold opening weekend 5 model first time apple simultaneously launched two models inclusion china list markets contributed record sales result apple also announced 200 million devices running ios 7 update making fastest software upgrade history apple store located christiana mall newark delaware us claimed highest iphones sales figures november 2013 store high sales results due absence sales tax state delaware finalization deal apple china mobile world largest mobile network announced late december 2013 multi-year agreement provides iphone access 760 million china mobile subscribers first quarter 2014 apple reported sold 51million iphones all-time quarterly record compared 47.8million year-ago quarter iphone upgrade program 24-month program designed consumers able get latest iphone every year without paying whole price up-front program consists low monthly payments consumers gradually pay iphone 24-month period opportunity switch upgrade new iphone 12 months payment passed 12 months passed consumers trade current iphone new one payments transferred old device new device program restarts new 24-month period additional features program include unlocked handsets means consumers free pick network carrier want two-year applecare+ protection includes hardware repairs software support coverage two incidents accidental damage criticism program includes potential endless cycle payments huffington post damon beres writing complete full 24-month payment cycle 're stuck outdated phone upgrade every 12 months 'll never stop owing apple money iphones additionally program limited iphone hardware cell phone service network operator included release iphone handset manufacturers nokia motorola enjoying record sales cell phones based fashion brand rather technological innovation smartphone market dominated time blackberry os windows mobile devices staid corporate-led smartphone paradigm focused enterprise needs phones time designed around carrier business limits conservative regards bandwidth usage battery life phones sold large number models often segmented marketing strategy confusing customers sapping engineering resources example phones marketed business often deliberately stripped cameras ability play music games apple approach deliberately simplify product line offering one model year customers making expensive high-end product apple marketing developing success ipod campaigns allowed phone become mass-market product many buyers launch day market research found unusually technology product iphone users disproportionately female ars technica noted 2012 apple avoided 'patronizing marketing female customers practice used often sell low-quality high-priced products many competitors then-ceo research motion mike lazaridis pried open iphone impression mac stuffed cellphone used much memory processing power smartphones market time capacitive touchscreen consumer-friendly design iphone fundamentally changed mobile industry steve jobs proclaiming 2007 phone communication tool way life dominant mobile operating systems time symbian blackberry os windows mobile designed handle additional tasks beyond communication basic functions operating systems never focused applications developers due infighting among manufacturers well complexity developing low-memory hardware never developed thriving ecosystem like apple app store android google play iphone os renamed ios 2010 designed robust os capabilities multitasking graphics order meet future consumer demands many services provided mobile carriers often extensively customized devices meanwhile apple decision base os os x unexpected benefit allowing os x developers rapidly expand ios development rival manufacturers forced spend software development costs catch iphone iphone success led decline sales high-end fashion phones business-oriented smartphones vertu blackberry well nokia nokia realised limitations operating system symbian attempted develop advanced system maemo without success ultimately agreed technology-sharing deal takeover microsoft prior iphone handsets viewed largely cheap disposable lures massively subsidized snare subscribers lock using carriers proprietary services however according wired apple retained complete control design manufacturing marketing iphone meaning carrier would control software updates extension security patches contrast google allowed carriers oems dictate pace upgrades pre-load phones software top android result many android oems often lag months behind google release next iteration android although nexus pixel devices guaranteed two years operating system updates third addition year security however apple supported older iterations iphones four years december 2017 reports apple using policy slowing speed older iphones issuing operating system upgrades spurred allegations firm using tactic prompt users older iphones buy newer models iphone 4 iphone models well ios devices manufactured exclusively foxconn based taiwan 2011 tim cook became ceo company apple changed outsourcing strategy first time increasing supply partners iphone 4s 2012 first model manufactured simultaneously two stand-alone companies foxconn well pegatron also based taiwan although foxconn still responsible larger share production pegatron orders slowly increased company tasked producing part iphone 5c line 2013 30 iphone 6 devices 2014 6 plus model produced solely foxconn touchscreen first five generations 9 cm 3.5 liquid crystal display scratch-resistant glass one iphone 5 four inches capacitive touchscreen designed bare finger multiple fingers multi-touch sensing screens first three generations resolution 320×480 hvga 163 ppi iphone 4 iphone 4s resolution 640×960 326 ppi 4-inch models 640×1136 326 ppi 4.7-inch models 750×1334 326 ppi 5.5-inch models 1080×1920 401 ppi 5.8-inch model x 1125×2436 458 ppi initial models using twisted-nematic tn lcds starting iphone 4 technology changed in-plane switching ips lcds iphone 5 model screen results aspect ratio approximately 16:9 iphone x first iphone use oled display near bezel-less screen ≈19.5:9 aspect ratio touch gesture features iphone based technology originally developed fingerworks gloves styli prevent necessary electrical conductivity although capacitive styli used iphone finger-touch screen iphone 3gs later also feature fingerprint-resistant oleophobic coating iphone minimal hardware user interface models featuring five buttons physical menu button situated directly display called home button primary function close active app navigates home screen interface earlier models included rounded square reminiscent shape icons home screen however new models include apple fingerprint recognition feature touch id use home button fingerprint sensor symbol iphone x later n't home button instead face id facial recognition authentication method multi-function sleep/wake button located top device serves unit power button also controls phone calls call received pressing sleep/wake button silences ringtone pressed twice transfers call voicemail situated left spine volume adjustment controls iphone 4 two separate circular buttons increase decrease volume earlier models house two switches single plastic panel known rocker switch could reasonably counted either one two buttons directly volume controls ring/silent switch engaged mutes telephone ringing alert sounds new sent emails text messages push notifications camera shutter sounds voice memo sound effects phone lock/unlock sounds keyboard clicks spoken auto-corrections switch mute alarm sounds clock application countries regions mute camera shutter voice memo sound effects buttons except home made plastic original first generation iphone metal later models touchscreen furnishes remainder user interface software update january 2008 allowed first-generation iphone use cell tower wi-fi network locations trilateration despite lacking gps hardware since iphone 3g generation iphone employs a-gps operated united states since iphone 4s generation device also supports glonass global positioning system operated russia since iphone 8 supports galileo iphone 6s 6s plus introduced 2015 feature 3d touch displays allows screen recognize hard pressed using pressure sensitive multi-touch technology subsequent iphones exception iphone se iphone xr feature example technology used lightly pressing screen preview photograph pressing take iphones feature number sensors used adjust screen based operating conditions enable motion-controlled games location-based services unlock phone authenticate purchases apple pay among many things proximity sensor deactivates display touchscreen device brought near face call done save battery power prevent inadvertent inputs user face ears ambient light sensor adjusts display brightness saves battery power prevents screen bright dark 3-axis accelerometer senses orientation phone changes screen accordingly allowing user easily switch portrait landscape mode photo browsing web browsing music playing support upright left right widescreen orientations unlike ipad iphone rotate screen turned upside-down home button screen unless running program specifically designed 3.0 update added landscape support still applications email introduced shaking unit form input generally undo functionality accelerometer also used control third-party apps notably games also used fitness tracking purposes primarily pedometer starting iphone 5s functionality included m7 motion coprocessor subsequent revisions embedded chip magnetometer built-in since iphone 3gs used measure strength direction magnetic field vicinity device sometimes certain devices radio signals interfere magnetometer requiring users either move away interference re-calibrate moving device figure-eight motion since iphone 3gs iphone also features compass app unique time release showing compass points direction magnetic field beginning iphone 4 apple smartphones also include gyroscopic sensor enhancing perception moved previous iphone models contained chip capable receiving radio signals however apple fm radio feature switched antenna connected chip later iterations iphone starting iphone 7 however contain radio chips campaign called free radio phone started encourage cellphone manufacturers apple enable radio phones manufacture reasons cited radio drains less power useful emergency 2016 fort mcmurray wildfire 2017 iphone models starting iphone 5s excluding iphone 5c featured apple fingerprint recognition sensor used unlocking device authenticating apple pay purchases since iphone 6 using touch id located home button touch id replaced face id starting iphone x included iphone 6 later excluding iphone se barometer used determine air pressure elevation device starting iphone x facial recognition sensor named truedepth camera system featured used unlocking device authenticating purchases using face id also used animojis ar bottom iphone speaker left dock connector microphone right additional loudspeaker screen serves earpiece phone calls iphone 4 includes additional microphone top unit noise cancellation switches placement microphone speaker base unit—the speaker right volume controls located left side iphone models slider ipod application 3.5 mm trrs connector headphones located top left corner device first five generations original 4s time moved bottom left corner headphone socket first-generation iphone recessed casing making incompatible headsets without use adapter subsequent generations eliminated problem using flush-mounted headphone socket cars equipped auxiliary jack allow handsfree use iphone driving substitute bluetooth iphone 7 later 3.5 mm headphone jack instead headsets must connect iphone bluetooth use apple lightning port replaced 3.5 mm headphone jack traditional headsets use lightning 3.5 mm headphone jack adapter included iphone 7 iphone x plugs lightning port apple headset multipurpose button near microphone play pause music skip tracks answer end phone calls without touching iphone third-party headsets designed iphone also include microphone control button current headsets also provide volume controls compatible recent models fourth ring audio jack carries extra information built-in bluetooth 2.x+edr supports wireless earpieces headphones requires hsp profile stereo audio added 3.0 update hardware supports a2dp non-sanctioned third-party solutions exist iphone officially support obex file transfer protocol lack profiles prevents iphone users exchanging multimedia files pictures music videos bluetooth-enabled cell phones composite component video 576i stereo audio output dock connector using adapter sold apple iphone 4 also supports 1024×768 vga output without audio hdmi output stereo audio via dock adapters iphone support voice recording 3.0 software update iphone features internal rechargeable lithium-ion battery like ipod unlike mobile phones time launch battery user-replaceable iphone charged connected computer syncing across included usb dock connector cable similar charging ipod alternatively usb ac adapter wall charger also included connected cable charge directly ac outlet models iphone support wireless charging apple runs tests preproduction units determine battery life apple website says battery life designed retain 80 original capacity 400 full charge discharge cycles comparable ipod batteries battery life early models iphone criticized several technology journalists insufficient less apple claims also reflected j. d. power associates customer satisfaction survey gave battery aspects iphone 3g lowest rating two five stars battery malfunctions dies prematurely phone returned apple replaced free still warranty warranty lasts one year purchase extended two years applecare battery replacement service pricing made known buyers day product launched similar apple third parties replace batteries ipods foundation taxpayer consumer rights consumer advocate group sent complaint apple fee consumers pay battery replaced apple reduced price out-of-warranty iphone battery replacement 29 since july 2007 third-party battery replacement kits available much lower price apple battery replacement program kits often include small screwdriver instruction leaflet many newer ipod models battery first generation iphone soldered therefore soldering iron required install new battery iphone 3g uses different battery fitted connector easier replace iphone x features different battery two battery cells adhesive pull tabs adhered sides instead folded top therefore making repairs little difficult patent filed corporation published late july 2013 revealed development new iphone battery system uses location data combination data user habits moderate handsets power settings accordingly apple working towards power management system provide features ability estimate length time user away power source modify energy usage detection function adjusts charging rate best suit type power source used december 28 2017 amidst many complaints older iphone models slowing new ones released apple released communication customers website acknowledging effect old batteries iphone performance company offered 29 battery replacements solution first-generation iphone iphone 3g fixed-focus 2.0-megapixel camera back digital photos optical zoom flash autofocus natively support video recording video recording possible first-generation iphone iphone 3g via third-party app available app store jailbreaking iphone os 2.0 introduced geotagging photos iphone 3gs 3.2-megapixel camera autofocus auto white balance auto macro 10 cm manufactured omnivision camera also capture 640×480 vga resolution video 30 frames per second video cropped iphone directly uploaded youtube services iphone 4 introduced 5.0-megapixel camera 2592×1936 pixels record video 720p resolution considered high-definition also backside-illuminated sensor capture pictures low light led flash stay lit recording video first iphone natively high dynamic range photography iphone 4 also second camera front take vga photos record sd video saved recordings may synced host computer attached email supported sent mms iphone 4s camera shoot 8-mp stills 1080p video accessed directly lock screen triggered using volume-up button shutter trigger built-in gyroscope stabilize image recording video iphone 5 iphone 4s running ios 6 later take panoramas using built-in camera app iphone 5 also take still photos recording video camera iphone 5 reportedly shows purple haze light source frame although consumer reports said prone purple hazing photos shot bright light source predecessor several android phones fine cameras ... five model generations phone configured bring camera app quickly pressing home key twice iphones running also accessed lock screen directly iphone 5s features true tone flash two led lights white amber improve white balance adjusted 1,000 combinations image sensor 15 percent larger previous model iphone 6 6 plus include phase detection autofocus 6 plus optical image stabilization models shoot 1080p videos 60 frames per second release ios 8 iphone 4s later models shoot time-lapse videos capability switch frame rates automatically recording increases time iphone 6s 6s plus outfitted 12 megapixel camera 4k hd video capability front-facing camera upgraded 5 megapixels user may change resolution 4k 1080p settings iphone se features 12 mp camera found iphone 6s iphone 6s plus models 4k video capability front camera 1.2 mp iphone 7 features optical image stabilization rear camera feature previously exclusive plus models 7 plus first iphone feature dual-lens cameras 12 mp models 7 mp front-facing camera second camera iphone 7 plus telephoto lens enables 2× optical zoom 10× digital zoom rear cameras 7 7 plus f/1.8 aperture also new quad-led true tone flash brighter compared predecessors iphone 8 camera remains largely predecessor features larger sensor newer color filter camera also record 4k 60 24 frames per second slow-mo 1080p 240 frames per second new camera system also enables portrait lighting defines light scene also features quad-led true tone flash 2× better light uniformity slow sync iphone x camera almost iphone 8 camera telephoto lens aperture f/2.4 optical image stabilization front camera also portrait mode portrait lighting due new truedepth camera system iphone xs xs max xr updated 12mp 1/2.55 sensor size 1.4 μm pixel size xs series telephoto lens lower end xr one lens iphone initially released two options internal storage size 4 8gb september 5 2007 apple discontinued 4gb models february 5 2008 apple added 16gb model iphone 3g available 8 16gb released 2008 iphone 3gs came 16 32gb variants remained available 8gb september 2012 three years launch iphone 4 available 16 32gb variants well 8gb variant sold alongside iphone 4s reduced price point iphone 4s available three sizes 16 32 64gb iphone 5 5s available three sizes iphone 4s 16 32 64gb.. lower-cost iphone 5c model initially available 16 32gb models 8gb model added later iphone 6 6s available three sizes launch 16 64 128gb iphone se available 16 64gb variants launch iphone 7 7 plus released apple changed base model storage capacity 16 32gb iphone 7 7 plus configurations 32 128 256gb storage apple doubled storage iphone 6s 6s plus two configurations 32 128gb well iphone se six months later iphone 8 8 plus x changed base model capacity 64gb retaining 256gb storage option iphone xs xs max introduced 512gb storage option addition existing 64 256 gb options iphone xr comes three storage options 64 128 256gb gsm models iphone use sim card identify gsm network sim sits tray inserted slot top device sim tray ejected paper clip sim ejector tool simple piece die-cut sheet metal included iphone 3g 3gs united states models elsewhere world iphone models shipped sim ejector tool fabricated alloy dubbed liquidmetal countries iphone usually sold sim lock prevents iphone used different mobile network gsm iphone 4 features microsim card located slot right side device cdma model iphone 4 cdma-only cell phone use sim card sim card slot iphone 4s activated cdma carrier however sim card slot rely sim card activation cdma network cdma-activated iphone 4s usually carrier-approved roaming sim preloaded sim slot time purchase used roaming certain carrier-approved international gsm networks sim slot locked use roaming sim card provided cdma carrier case verizon example one request sim slot unlocked international use calling support number requesting international unlock account good standing past 60 days method unlocks iphone 4s use international carriers iphone 4s unlocked way reject non international sim cards mobility t-mobile usa example iphone 5 later iphones use nano-sim order save space internally iphone xs xs max xr added esim support addition nano-sim therefore support dual sim functionality iphones well many devices apple small disc bottom headphone jack changes white red contact water iphone 3g later models also similar indicator bottom dock connector apple warranties cover water damage employees examine indicators approving warranty repair replacement however adoption water resistance feature iphone practice longer use apple iphone indicators exposed mobile phones manufacturers carry protected location beneath battery behind battery cover indicators triggered routine use owner sweat steam bathroom light environmental moisture criticism led apple change water damage policy iphones similar products allowing customers request internal inspection phone verify internal liquid damage sensors triggered iphone models include written documentation dock connector usb cable first generation 3g iphones also came cleaning cloth first generation iphone includes stereo headset earbuds microphone plastic dock hold unit upright charging syncing iphone 3g includes similar headset plus sim eject tool first generation model requires paperclip iphone 3gs includes sim eject tool revised headset adds volume buttons functional previous iphone versions iphone 3g 3gs compatible dock sold separately first generation model dock versions include usb power adapter wall charger allows iphone charge ac outlet iphone 3g iphone 3gs sold north america japan colombia ecuador peru include ultracompact usb power adapter september 2014 launch iphone 6 apple announced apple pay mobile payment system feature aimed revolutionize way users pay uses nfc chip touch id fingerprint scanner face id iphone x later apple wallet app dedicated secure element chip encrypted payment information make purchases participating stores physical online iphone models haptic engine vibrate notification alert incoming call etc iphone models iphone 4s use eccentric rotating mass motor iphone 4s uses linear resonant actuator vibrator usually uses less power creates quieter vibration however iphone 5 5c 5s uses eccentric rotating mass motor unsure apple decided switch back however iphone 6 6 plus uses linear resonant actuator vibrator iphone 6s uses taptic engine vibration haptic feedback works similar eccentric rotating mass motor iphone runs operating system known ios formerly iphone os variant darwin operating system core found macos also included core animation software component mac os x v10.5 leopard together graphics hardware iphone 3gs opengl es 2.0 responsible interface motion graphics iphone comes set bundled applications developed apple supports downloading third-party applications app store apple provides free updates operating system iphone either wirelessly itunes major new updates historically accompanied new models size operating system depends version ios 8 required 4.5 gb successor required 1.3 gb interface based around home screen graphical list available applications iphone applications normally run one time starting iphone 4 primitive version multitasking came play users could double click home button select recently opened applications however apps never ran background starting ios 7 though apps truly multitask open application runs background use although functionality still available making call listening music home screen accessed hardware button screen iphone 8 earlier iphone x later models require swipe original iphone contained following apps messages sms mms messaging calendar photos camera youtube stocks maps google maps weather voice memos notes clock calculator settings itunes store app store introduced iphone 3gs iphone 4 compass facetime gamecenter added ios 4 4.1 respectively ios 5 reminders newsstand added ipod application split separate music videos applications ios 6 added passbook well updated version maps relies data provided tomtom well sources youtube longer came pre-installed application ios 8 added health app ios 9 replaced newsstand passbook news wallet ios 10 introduces home ios 11 added files ios 12 introduces measure app uses ar technology measure objects things available devices a9 chip newer docked base screen four icons phone mail safari internet music delineate iphone main purposes january 15 2008 apple released software update 1.1.3 allowing users create web clips home screen icons resemble apps open user-defined page safari update iphone users rearrange place icons holding icon moving desired location start shaking nine adjacent home screens accessed horizontal swipe users also add delete icons dock every home screen home screen holds twenty icons first-generation iphone 3g 4 4s home screen iphone 5 holds twenty-four icons due larger screen display dock holds four icons users delete web clips third-party applications time may select certain applications transfer itunes apple default programs could removed since ios 10 update 3.0 update adds system-wide search known spotlight left first home screen almost input given touch screen understands complex gestures using multi-touch iphone interaction techniques enable user move content touch-drag motion finger example zooming web pages photos done placing two fingers screen spreading farther apart bringing closer together gesture known pinching scrolling long list menu achieved sliding finger display bottom top vice versa go back either case list moves pasted outer surface wheel slowly decelerating affected friction way interface simulates physics real object unlike previous scrollable views user pressed control move view downwards ios user pushes upwards moving plank wood floating water creating impression user directly manipulating content displayed screen user-centered interactive effects include horizontally sliding sub-selection vertically sliding keyboard bookmarks menu widgets turn around allow settings configured side menu bars found top bottom screen necessary options vary program always follow consistent style motif menu hierarchies back button top-left corner screen displays name parent folder iphone allows audio conferencing call holding call merging caller id integration cellular network features iphone functions example music playing call received music fades fades back call ended proximity sensor shuts screen touch-sensitive circuitry iphone brought close face save battery prevent unintentional touches iphone support video calling videoconferencing versions prior fourth generation one camera opposite side screen iphone 4 supports video calling using either front back camera wi-fi feature apple calls facetime voice control introduced iphone 3gs allows users say contact name number iphone dial first two models support voice dialing third-party applications iphone includes visual voicemail countries feature allowing users view list current voicemail messages on-screen without call voicemail unlike systems messages listened deleted non-chronological order choosing message on-screen list music ringtone feature introduced united states september 5 2007 users create custom ringtones songs purchased itunes store small additional fee ringtones three 30 seconds long part song fade pause half second five seconds looped loop continuously customizing done itunes apple garageband software 4.1.1 later available mac os x third-party tools release ios 6 released september 19 2012 apple added features enable user options decline phone call person calling user reply message set reminder call back later time layout music library similar ipod iphone sort media library songs artists albums videos playlists genres composers podcasts audiobooks compilations options presented alphabetically except playlists retain order itunes iphone uses large font allows users plenty room touch selection users rotate device horizontally landscape mode access cover flow like itunes feature shows different album covers scroll-through photo library scrolling achieved swiping finger across screen alternatively headset controls used pause play skip repeat tracks iphone 3gs volume changed included apple earphones voice control feature used identify track play songs playlist specific artist create genius playlist iphone supports gapless playback like fifth-generation ipods introduced 2005 iphone play digital video allowing users watch tv shows movies widescreen double-tapping switches widescreen video playback iphone allows users purchase download songs itunes store directly iphone feature originally required wi-fi network since 2012 used cellular data network iphone includes software allows user upload view email photos taken camera user zooms photos sliding two fingers apart closer together much like safari camera application also lets users view camera roll pictures taken iphone camera pictures also available photos application along transferred iphoto aperture mac photoshop windows pc internet access available iphone connected local area wi-fi wide area gsm edge network second-generation 2g wireless data standards iphone 3g introduced support third-generation umts hsdpa 3.6 iphone 4s introduced support hsupa networks 14.4 mbit/s support hsdpa 7.2 introduced iphone 3gs networks accessible iphone models include 1xrtt represented 1× status bar gprs shown gprs status bar edge shown capital e status bar umts ev-do shown 3g faster version umts 4g shown 4g symbol status bar lte shown lte status bar 5g evolution supported areas implemented stylized larger 5g reduced size capital e. 5ge uses 4x4 mimo doubling number antennas 256-qam three-way carrier aggregation true 5g expected iphone 2020 release introduced 3g july 2004 late 2007 steve jobs stated still widespread enough us chipsets energy efficient enough included iphone support 802.1x authentication system commonly used university corporate wi-fi networks added 2.0 version update default iphone ask join newly discovered wi-fi networks prompt password required alternatively join closed wi-fi networks manually iphone automatically choose strongest network connecting wi-fi instead edge available similarly iphone 3g onwards prefer 3g 2g wi-fi either wi-fi bluetooth 3g iphone 3g onwards deactivated individually airplane mode disables wireless connections overriding preferences however airplane mode one explicitly enable wi-fi and/or bluetooth modes join continue operate one networks cellular network transceivers remain safari iphone native web browser displays pages similar mac windows counterparts web pages may viewed portrait landscape mode device supports automatic zooming pinching together spreading apart fingertips screen double-tapping text images safari allow file downloads except predefined extensions iphone support flash still popular iphone introduced consequently uk advertising standards authority adjudicated advertisement claiming iphone could access parts internet withdrawn current form grounds false advertising rare public letter april 2010 apple ceo steve jobs outlined reasoning behind absence flash iphone ipad iphone supports svg css html canvas bonjour google chrome introduced ios june 26 2012 opera mini also available maps application access google maps map satellite hybrid form also generate directions two locations providing optional real-time traffic information iphone announcement jobs demonstrated feature searching nearby starbucks locations placing prank call one single tap support walking directions public transit street view added version 2.2 software update voice-guided navigation iphone 3gs iphone 4 orient map digital compass apple also developed separate application view youtube videos iphone streams videos encoding using h.264 codec simple weather stock quotes applications also tap internet iphone users access internet frequently variety places according google 2008 iphone generated 50 times search requests mobile handset according deutsche telekom ceo rené obermann average internet usage iphone customer 100 megabytes 30 times use average contract-based consumer customers nielsen found 98 iphone users use data services 88 use internet china iphone 3g iphone 3gs built distributed without wi-fi introduction verizon iphone january 2011 issue using internet phone brought public attention two us carriers internet phone could used simultaneously networks whereas verizon networks support use separately however 2014 verizon announced iphone 6 6 plus would allow simultaneous voice data lte network t-mobile sprint enabled calls wi-fi verizon soon text input iphone implements virtual keyboard touchscreen automatic spell checking correction predictive word capabilities dynamic dictionary learns new words keyboard predict word user typing complete correct accidental pressing keys near presumed desired key keys somewhat larger spaced farther apart landscape mode supported limited number applications touching section text brief time brings magnifying glass allowing users place cursor middle existing text virtual keyboard accommodate 21 languages including character recognition chinese alternative characters accents example letters alphabets languages emoji typed keyboard pressing letter two seconds selecting alternative character popup 3.0 update brought support cut copy pasting text well landscape keyboards applications iphone 4s siri allows dictation since ios 8 third party keyboards distributed app store allowed previously available jailbroken iphones iphone also features email program supports html email enables user embed photos email message pdf word excel powerpoint attachments mail messages viewed phone yahoo offers free push-email service iphone imap although push-imap pop3 mail standards also supported including microsoft exchange kerio connect first versions iphone firmware accomplished opening imap exchange server apple also licensed microsoft activesync supports platform including push email release iphone 2.0 firmware iphone sync email account settings apple mail application microsoft outlook microsoft entourage manually configured device email program access almost imap pop3 account text messages presented chronologically mailbox format similar mail places text recipients together replies text messages displayed speech bubbles similar ichat recipient name iphone built-in support email message forwarding drafts direct internal camera-to-email picture sending support multi-recipient sms added 1.1.3 software update support mms added 3.0 update original first generation iphone us september 25 2009 wwdc 2007 june 11 2007 apple announced iphone would support third-party web applications using ajax share look feel iphone interface october 17 2007 steve jobs open letter posted apple hot news weblog announced software development kit sdk would made available third-party developers february 2008 iphone sdk officially announced released march 6 2008 apple town hall facility free download apple registration allows developers develop native applications iphone ipod touch test iphone simulator however loading application onto real device possible paying apple developer connection membership fee developers free set price applications distributed app store receive 70 share developers also opt release application free pay costs release distribute application beyond membership fee app store launched release ios 2.0 july 11 2008 update free iphone users owners older ipod touches required pay us 10 developer submitted application app store apple holds firm control distribution apple halt distribution applications deems inappropriate example rich us 1000 program simply demonstrated wealth user apple criticized banning third-party applications enable functionality apple want iphone 2008 apple rejected podcaster allowed iphone users download podcasts directly iphone claiming duplicated functionality itunes apple since released software update grants capability netshare another rejected app would enabled users tether iphone laptop desktop using cellular network load data computer many carriers iphone later globally allowed tethering apple officially supported upgrade ios 3.0 mobility relative latecomer united states cases carrier charges extra tethering iphone sdk released third parties permitted design web apps would run safari unsigned native applications also available jailbroken phones ability install native applications onto iphone outside app store supported apple stated reason native applications could broken software update apple stated design software updates specifically break native applications perform sim unlocking apple passed 60 billion app downloads 140 billion app downloads app store app store 2.2million apps iphone original iphone described revolutionary game-changer mobile phone industry credited helping make apple one world valuable publicly traded companies 2011 newer iterations also received praise called best phone iphone attracts users ages besides consumer use iphone also adopted business purposes starting iphone 4s apple added accessibility feature optimize function iphone hearing aids apple released program made iphone hearing aids hearing aids deliver power-efficient high-quality digital audio experience allow user manage hearing aid right iphone made iphone hearing aids also feature live listen live listen iphone acts remote microphone sends sound made iphone hearing aid live listen help user hear conversation noisy room hear someone speaking across room braille displays ios program announced apple coinciding release iphone 3gs ipad ipod touch 3rd generation program added support 50 bluetooth wireless braille displays work ios box user needs pair keyboard device start using navigate ios device voiceover without additional software ios supports braille tables 25 languages iphone lets user know alert sent variety notice methods delivers visual vibrating alerts incoming phone facetime calls new text messages new sent mail calendar events users set led light flash incoming calls alerts incoming calls display photo caller users choose different vibration patterns even create iphone enlarge text make accessible vision-impaired users accommodate hearing-impaired users closed captioning external tty devices iphone 3gs also features white black mode voiceover screen reader zooming impaired vision mono audio limited hearing one ear apple regularly publishes voluntary product accessibility templates explicitly state compliance us regulation section 508 release ios 9 iphones users ability choose two different screen view options user choose standard view zoomed view iphone placed standard view setting icons normal size text remains zoomed view option icons screen text become slightly larger enables user customized appearance potentially help users read screen easier assistivetouch helps adapt multi-touch screen ios device user unique physical needs great assistance difficulty gestures like pinch one make accessible tap finger user create gestures customize layout assistivetouch menu user trouble pressing home button set activated onscreen tap gestures like rotate shake available even ios device mounted wheelchair guided access helps people autism attention sensory challenges stay focused task app hand guided access parent teacher therapist limit ios device stay one app disabling home button limit amount time spent app user restrict access keyboard touch input certain areas screen 21 different iphone models produced models bold current flagship devices apple filed 200 patent applications related technology behind iphone lg electronics claimed design iphone copied lg prada woo-young kwak head lg mobile handset r center said press conference consider apple copied prada phone design unveiled presented design award prize september 2006 conversely iphone also inspired share high-tech clones september 3 1993 infogear filed us trademark phone march 20 1996 applied trademark iphone phone registered march 1998 iphone registered 1999 since phone mark abandoned infogear trademarks cover communications terminals comprising computer hardware software providing integrated telephone data communications personal computer functions 1993 filing computer hardware software providing integrated telephone communication computerized global information networks 1996 filing 2000 infogear filed infringement claim owners iphones.com domain name owners iphones.com domain name challenged infringement claim northern district court california june 2000 cisco systems acquired infogear including iphone trademark september 2000 cisco systems settled owners iphones.com allowed owners keep iphones.com domain name along intellectual property rights use designation iphones.com domain name sale cellular phones cellular phones internet access wap phones handheld pdas storage devices computer equipment hardware/software digital cameras hardware/software intellectual property rights granted owners iphones.com domain name cisco systems september 2000 october 2002 apple applied iphone trademark united kingdom australia singapore european union canadian application followed october 2004 new zealand application september 2006 october 2006 singapore australian applications granted september 2006 company called ocean telecom services applied iphone trademark united states united kingdom hong kong following filing trinidad tobago ocean telecom trademark applications use exactly wording new zealand application apple assumed ocean telecom applying behalf apple canadian application opposed august 2005 canadian company called comwave applied trademark three months later comwave selling voip devices called iphone since 2004 shortly steve jobs january 9 2007 announcement apple would selling product called iphone june 2007 cisco issued statement negotiating trademark licensing apple expected apple agree final documents submitted night january 10 2007 cisco announced filed lawsuit apple infringement trademark iphone seeking injunction federal court prohibit apple using name february 2007 cisco claimed trademark lawsuit minor skirmish money interoperability february 2 2007 apple cisco announced agreed temporarily suspend litigation held settlement talks subsequently announced february 20 2007 reached agreement companies allowed use iphone name exchange exploring interoperability security consumer business communications products october 22 2009 nokia filed lawsuit apple infringement gsm umts wlan patents nokia alleges apple violating ten nokia patents since iphone initial release december 2010 reuters reported iphone ipad users suing apple inc. applications passing user information third-party advertisers without permission makers applications textplus4 paper toss weather channel dictionary.com talking tom cat pumpkin maker also named co-defendants lawsuit august 2012 apple smartphone patent lawsuit u.s. samsung world largest maker smartphones however december 6 2016 scotus reversed decision awarded nearly 400 million apple returned case federal circuit court define appropriate legal standard define article manufacture smartphone could case screen design patents relate march 2013 apple patent wraparound display revealed around april 20 2011 hidden unencrypted file iphone ios devices widely discussed media alleged file labeled consolidated.db constantly stores iphone user movement approximating geographic locations calculated triangulating nearby cell phone towers technology proven inaccurate times file released june 2010 update apple ios4 may contain almost year worth data previous versions ios stored similar information file called h-cells.plist f-secure discovered data transmitted apple twice day postulate apple using information construct global location database similar ones constructed google skyhook wardriving nevertheless unlike google latitude application performs similar task android phones file dependent upon signing specific eula even user knowledge stated 15,200 word-long terms conditions iphone apple partners licensees may collect use share precise location data including real-time geographic location user apple computer device file also automatically copied onto user computer synchronized iphone open-source application named iphonetracker turns data stored file visual map made available public april 2011 file erased without jailbreaking phone encrypted apple gave official response web site april 27 2011 questions submitted users associated press others apple clarified data small portion crowd-sourced location database cache wi-fi hotspots cell towers downloaded apple iphone making location services faster gps therefore data represent locations iphone volume data retained error apple issued update ios version 4.3.3 4.2.8 cdma iphone 4 reduced size cache stopped backed itunes erased entirely whenever location services turned upload apple also selectively disabled system services cell network search regardless july 2014 report state-owned china central television labeled iphone national security concern frequent locations feature found settings location services stores commonly visited locations locally device feature said help accuracy gps apple maps since log information locations user frequently visited however feature also keeps track number times user location dates exact times media outlets publicized instructions disabled concerned users revealed part 2013 mass surveillance disclosures american british intelligence agencies national security agency nsa government communications headquarters gchq access user data iphones blackberrys android phones respectively read almost smartphone information including sms location emails notes according article new york times titled signaling post-snowden era new iphone locks n.s.a apple developed new encryption method ios 8 described deep apple could longer comply government warrants asking customer information extracted devices throughout 2015 prosecutors united states argued u.s. government able compel decryption iphone contents 2015 san bernardino attack fbi recovered iphone 5c issued one shooters employer icloud backups phone month half shooting shooters destroyed personal phones u.s. government attempted obtain court order writs act compelling apple produce ipsw file would allow investigators brute force device passcode tim cook responded company website outlining need encryption arguing produce backdoor one device would inevitably used compromise privacy iphone users february 19 apple communicated journalists password apple id iphone changed within day government obtaining preventing apple producing workaround would target older devices see fbi–apple encryption dispute graykey manufactured grayshift unlock iphones even disabled countermeasure apple implemented usb restricted mode apple privacy policy addresses requests government agencies access customers data apple never worked government agency country create 'backdoor products services also never allowed government access servers never 2015 electronic frontier foundation awarded apple five five stars commend ing apple strong stance regarding user rights transparency privacy apple ios combination specific hardware uses crypto-shredding activating erase content settings obliterating keys 'effaceable storage renderes user data device cryptographically inaccessible apple tightly controls certain aspects iphone according jonathan zittrain emergence closed devices like iphone made computing proprietary early versions microsoft windows hacker community found many workarounds disallowed apple make difficult impossible obtain warranty service jailbreaking allows users install apps available app store modify basic functionality sim unlocking allows iphone used different carrier network however united states apple void iphone warranty unless show problem component failure linked installation placement after-market item unauthorized applications federal trade commission magnuson-moss warranty act 1975 users set restrictions parental controls apps downloaded used within iphone restrictions area requires password iphone normally prevents access media player web features unless also activated phone authorized carrier july 3 2007 jon lech johansen reported blog successfully bypassed requirement unlocked iphone features combination custom software modification itunes binary published software offsets others use unlike first generation iphone iphone 3g must activated store countries makes iphone 3g difficult impossible hack need in-store activation well huge number first-generation iphone ipod touch users upgrading iphone os 2.0 caused worldwide overload apple servers july 11 2008 day iphone 3g iphone os 2.0 updates well mobileme released update devices required connect apple servers authenticate causing many devices temporarily unusable users o2 network united kingdom however buy phone online activate via itunes previous model even required vendors usually offer activation buyer convenience us apple begun offer free shipping iphone 3g iphone 3gs available reversing in-store activation requirement best buy walmart also sell iphone iphone operating system designed run software apple-approved cryptographic signature restriction overcome jailbreaking phone involves replacing iphone firmware slightly modified version enforce signature check may circumvention apple technical protection measures apple statement united states copyright office response electronic frontier foundation eff lobbying dmca exception kind hacking claimed jailbreaking iphone would copyright infringement due necessary modification system software however 2010 jailbreaking declared officially legal united states dmca jailbroken iphones may susceptible computer viruses incidents reported ios android 2.3.3 'gingerbread may set dual boot jailbroken iphone help openiboot idroid 2007 2010 2011 developers released series tools called jailbreakme used security vulnerabilities mobile safari rendering jailbreak device allows users install compatible software device instead app store apps exploits quickly fixed ios updates apple theoretically flaws could also used malicious purposes july 2011 apple released ios 4.3.5 4.2.10 cdma iphone fix security vulnerability certificate validation following release iphone 5s model group german hackers called chaos computer club announced september 21 2013 bypassed apple new touch id fingerprint sensor using easy everyday means group explained security system defeated photographing fingerprint glass surface using captured image verification spokesman group stated hope finally puts rest illusions people fingerprint biometrics plain stupid use something ca n't change leave everywhere every day security token iphones still sold sim lock restricts use phone one particular carrier common practice subsidized gsm phones unlike gsm phones however phone officially unlocked entering code locked/unlocked state maintained apple servers per imei set iphone activated iphone initially sold us network sim lock place various hackers found methods unlock phone specific network although sprint t-mobile verizon authorized iphone carriers united states unlocked iphones used carriers example unlocked iphone may used t-mobile network us unlocked iphone compatible t-mobile voice network may able make use 3g functionality i.e mobile web e-mail etc. quarter original first generation iphones sold us registered apple speculates likely shipped overseas unlocked lucrative market iphone 3g worldwide release march 26 2009 united states began selling iphone without contract though still sim-locked network up-front purchase price iphone units often twice expensive bundled contracts outside united states policies differ especially us territories insular areas like guam gta teleguam exclusive carrier iphone since introduction none four us carriers sprint t-mobile verizon presence area since 2013 docomo pacific ended gta exclusivity starting iphone 5 beginning april 8 2012 began offering factory sim unlock option apple calls whitelisting allowing used carrier phone supports iphone owners reported verizon 4g lte phones come factory unlocked discovery verizon announced 4g lte phones including iphones would remain unlocked due regulations fcc placed 700 mhz c-block spectrum used verizon united kingdom o2 ee 3 vodafone tesco mobile sell device subsidised contracts use pay go locked network initially though usually unlocked either certain period contract length passed small fee exception 3 network unlock device time charge however current versions iphone available purchase sim-free apple store apple online store consequently unlocked use gsm network iphones purchased full retail price apple store online apple.com come unlocked allows customer selection carriers iphones sold canada purchased mobile carries telus rogers bell locked respective networks unlocking required visiting carrier store paying unlocking fee third party methods unlock iphones existed highly unreliable sometimes rendered phones unusable however 2017 crtc abolished sim-locking required mobile devices sold december 1 2017 come unlocked crtc also mandated carriers must offer unlocking services existing devices free consumers regardless whether purchased phone three major carriers australia optus telstra vodafone offer legitimate unlocking cost iphone devices current prior models internationally policies vary many carriers sell iphone unlocked full retail price 2003 four years iphone officially introduced trademark ifone registered mexico communications systems services company ifone apple tried gain control brandname mexican court denied request case began 2009 mexican firm sued apple supreme court mexico upheld ifone rightful owner held apple iphone trademark violation brazil brand iphone registered 2000 company called gradiente eletrônica s.a. igb eletrônica s.a according filing gradiente foresaw revolution convergence voice data internet time brazil final battle brandname concluded 2008 december 18 2012 igb launched line android smartphones tradename exclusive rights local market february 2013 brazilian patent trademark office known instituto nacional da propriedade industrial issued ruling gradiente eletrônica apple owned iphone mark brazil iphone term registered gradiente 2000 7 years apple release first iphone decision came three months gradiente eletrônica launched lower-cost smartphone using iphone brand june 2014 apple second time right use brandname brazil court ruling determined gradiente registration exclusive rights brand although gradiente intended appeal decision apple use freely brand without paying royalties brazilian company philippines solid group launched myphone brand 2007 stylized my|phone solid broadband filed trademark application brand apple later filed trademark case intellectual property office philippines ipophl solid broadband myphone confusingly similar iphone may likely deceive cause confusion among consumers apple lost trademark battle solid group 2015 decision made ipo director nathaniel arevalo also reportedly said unlikely consumers would confused iphone myphone case giant trying claim territory entitled great prejudice local 'pinoy phone merchant managed obtain significant foothold mobile phone market marketing sale innovative products distinctive trademark arevalo later added | [
5011,
3933,
2,
3940,
3612,
7890,
2555,
5029,
6092,
722,
1094,
2564,
2926,
4320,
2566,
4690,
6440,
734,
2570,
5393,
5046,
7910,
740,
5752,
6113,
405,
5405,
7189,
3648,
6119,
47,
4348,
6125,
3313,
2954,
1123,
2240,
6479,
7211,
6847,
4003,... | Test |
6,789 | 9 | Sed:sed sed stream editor unix utility parses transforms text using simple compact programming language sed developed 1973 1974 lee e. mcmahon bell labs available today operating systems sed based scripting features interactive editor ed editor 1971 earlier qed quick editor 1965–66 sed one earliest tools support regular expressions remains use text processing notably substitution command popular alternative tools plaintext string manipulation stream editing include awk perl first appearing version 7 unix sed one early unix commands built command line processing data files evolved natural successor popular grep command original motivation analogue grep g/re/p substitution hence g/re/s foreseeing special-purpose programs command would also arise g/re/d mcmahon wrote general-purpose line-oriented stream editor became sed syntax sed notably use codice_1 pattern matching codice_2 substitution originated ed precursor sed common use time regular expression syntax influenced languages notably ecmascript perl later powerful language awk developed functioned cousins allowing powerful text processing done shell scripts sed awk often cited progenitors inspiration perl influenced perl syntax semantics notably matching substitution operators gnu sed added several new features including in-place editing files super-sed extended version sed includes regular expressions compatible perl another variant sed minised originally reverse-engineered 4.1bsd sed eric s. raymond currently maintained rené rebe minised used gnu project gnu project wrote new version sed based new gnu regular expression library current minised contains extensions bsd sed feature-rich gnu sed advantage fast uses little memory used embedded systems version sed provided minix sed line-oriented text processing utility reads text line line input stream file internal buffer called pattern space line read starts cycle pattern space sed applies one operations specified via sed script sed implements programming language 25 commands specify operations text input line running script sed ordinarily outputs pattern space line modified script begins cycle next line end-of-script behaviors available sed options script commands e.g codice_3 delete pattern space codice_4 quit codice_5 add next line pattern space immediately thus sed script corresponds body loop iterates lines stream loop loop variable current line number implicit maintained sed sed script either specified command line codice_6 option read separate file codice_7 option commands sed script may take optional address terms line numbers regular expressions address determines command run example codice_8 would run codice_3 delete command second input line printing lines second codice_10 would delete lines beginning space separate special buffer hold space may used sed commands hold accumulate text cycles sed command language two variables hold space pattern space goto-like branching functionality nevertheless language turing-complete esoteric sed scripts exist games sokoban arkanoid chess tetris main loop executes line input stream evaluating sed script line input lines sed script pattern-action pair indicating pattern match action perform recast conditional statement main loop working variables pattern space hold space input output streams default actions copy line pattern space print pattern space implicit possible write terse one-liner programs example sed program given print first 10 lines input stop following example shows typical common use sed substitution usage indeed original motivation sed versions sed expression must preceded codice_6 indicate expression follows codice_12 stands substitute codice_13 stands global means matching occurrences line would replaced regular expression i.e pattern searched placed first delimiting symbol slash replacement follows second symbol slash codice_1 conventional symbol originating character search ed could used make syntax readable occur pattern replacement useful avoid leaning toothpick syndrome substitution command originates search-and-replace ed implements simple parsing templating codice_15 provides pattern matching saving text via sub-expressions codice_16 either literal text format string containing characters codice_17 entire match special escape sequences codice_18 codice_19 n th saved sub-expression example codice_20 replaces occurrences cat dog cats dogs without duplicating existing codice_21 1st saved sub-expression regexp codice_18 format string substitutes output besides substitution forms simple processing possible using 25 sed commands example following uses command delete lines either blank contain spaces example uses following regular expression metacharacters sed supports full range regular expressions complex sed constructs possible allowing serve simple highly specialised programming language flow control example managed use label colon followed string branch instruction codice_29 instruction codice_29 followed valid label name move processing block following label unix sed often used filter pipeline program generatedata generates data sed makes small change replacing x example often useful put several sed commands one command per line script file codice_31 use codice_7 option run commands codice_33 file number commands may placed script file using script file also avoids problems shell escaping substitutions script file may made directly executable command line prepending shebang line containing sed command assigning executable permission file example file codice_31 created contents file may made executable current user codice_35 command chmod u+x subst.sed file may executed directly command line codice_36 option introduced gnu sed allows in-place editing files actually temporary output file created background original file replaced temporary file example hello world script file e.g. script.txt invoked codice_37 inputfilename input text file script changes inputfilename line 1 hello world quits printing result sed exits input lines past line 1 read printed sole output hello world example emphasizes many key characteristics sed follow various sed scripts executed passing argument sed put separate file executed via codice_7 making script executable replace instance certain word file redacted irc password save result delete line containing word yourword address '/yourword/ delete instances word yourword delete two words file simultaneously express previous example one line entering command line one may join two commands via semicolon next example sed usually works one line removes newlines sentences second line starts one space consider following text sed script turn text following text note script affects input lines start space script explained expressed single line via semicolons simple limited sed sufficiently powerful large number purposes sophisticated processing powerful languages awk perl used instead particularly used transforming line way complicated regex extracting template replacement though arbitrarily complicated transforms principle possible using hold buffer conversely simpler operations specialized unix utilities grep print lines matching pattern head print first part file tail print last part file tr translate delete characters often preferable specific tasks designed carry specialized utilities usually simpler clearer faster general solution sed ed/sed commands syntax continue used descendent programs text editors vi vim analog ed/sed sam/ssam sam plan 9 editor ssam stream interface yielding functionality similar sed | [
361,
362,
2176,
4662,
366,
1837,
3984,
2589,
3987,
3313,
6470,
7583,
5789,
7592,
4020,
6507,
3685,
4387,
7246,
1537,
6172,
5480,
1942,
3023,
5138,
1572,
1213,
7667,
4447,
5171,
6577,
3417,
6242,
4112,
3763,
5200,
3085,
3106,
5931,
578,
... | Train |
6,790 | 8 | Vanity_domain:vanity domain domain name system dns vanity domain domain name whose purpose express individuality person whose behalf registered contrasts domain names resolve organisation e.g company service organisation offers vanity domains may compared vanity car registration plates similarly identify owner individual someone relying another organisation services subdomain isp domain aliased individual user account vanity domain definitions include uses apply primarily regular domain names registered highest allowed level rather subdomains although technically speaking second-level domain actually subdomain top-level domain vanity domains operated behalf individuals typically offer full complement services organisational domain name rather host points would expected honour example dns record may contain mx record identifying mail server accepting e-mail domain may e-mail forwarding server record identifying shared web hosting service offering http may url redirection service well easily remembered vanity domains especially registered highest level allowed registrar offer advantage personal mobility continue associated person even person switches service providers top-level domain become part vanity url taking advantage countries ask proof residence register country-specific tlds top level domains allow user incorporate two three letters following dot using help spell desired name word phrase | [
5151,
2043
] | Test |
6,791 | 8 | Twig_(template_engine):twig template engine twig template engine php programming language syntax originates jinja django templates open source product licensed bsd license maintained fabien potencier initial version created armin ronacher symfony php framework comes bundled support twig default template engine since version 2 twig supported following integrated development environments text editors twig defines three kinds delimiters apostrophe escape character create iterative array associative array operators precedence less priority filters provide treatments expression place separated pipes example example demonstrates basic features twig | [
6029,
5480,
6489,
4296,
3915,
6167,
5571
] | Validation |
6,792 | 2 | Bring_your_own_operating_system:bring operating system bring operating system byoos relates practice providing pc computers usually without internally installed disks users bring operating system commonly usb pen drives use supplied hardware operating system choice byoos made possible thanks ability create usb pen drives external storage devices 'live operating system images containing necessary drivers allow boot operation compatible computer bootable versions linux available 1993 2012 microsoft windows 8 enterprise edition followed introduced 'windows go functionality allow operating system boot run mass storage devices usb flash drives thus enabling byoos windows family operating system similar linux live cd/dvd allowing users bring operating system significant cost savings made organisations commonly many on-site users obliged provide computer hardware allow perform specific tasks longer need install hard drive computer upgrading maintaining many pc computers also become easier companies need supply users new pen drives containing operating system boot images rather re-image every pc latest build operating system thus eliminating upgrade costs users take usb devices containing version operating system around employees boot home computer usb stick exactly software environment use place work thus enabling employees work home exactly would office introduction cloud based storage means portable operating systems free need store data locally unbundling office application data user data drives containing operating systems key factor making byoos possible | [
788,
578
] | Validation |
6,793 | 3 | Intel_Graphics_Technology:intel graphics technology intel graphics technology gt collective name series integrated graphics processors igps produced intel manufactured package die central processing unit cpu first introduced 2010 intel hd graphics intel iris graphics intel iris pro graphics igp series introduced 2013 models haswell processors high-performance versions hd graphics iris pro graphics first series incorporate embedded dram fourth quarter 2013 intel integrated graphics represented units 65 pc graphics processor shipments however percentage represent actual adoption number shipped units end systems outfitted discrete graphics cards introduction intel hd graphics intel integrated graphics built motherboard northbridge part intel hub architecture known intel extreme graphics intel gma part platform controller hub pch design northbridge eliminated graphics processing moved die central processing unit cpu previous intel integrated graphics solution intel gma reputation lacking performance features therefore considered good choice demanding graphics applications 3d gaming performance increases brought intel hd graphics made products competitive integrated graphics adapters made rivals nvidia ati/amd intel hd graphics featuring minimal power consumption important laptops capable enough pc manufacturers often stopped offering discrete graphics options low-end high-end laptop lines reduced dimensions low power consumption important intel hd iris graphics divided generations within generation divided 'tiers increasing performance denominated 'gtx label january 2010 clarkdale arrandale processors ironlake graphics released branded celeron pentium core hd graphics one specification 12 execution units 43.2 gflops 900 mhz decode h264 1080p video 40 fps direct predecessor gma_x4500 featured 10 eus 800 mhz lacked capabilities january 2011 sandy bridge processors released introducing second generation hd graphics sandy bridge celeron pentium intel hd core i3 either hd 2000 hd 3000 hd graphics 2000 3000 include hardware video encoding hd postprocessing effects 24 april 2012 ivy bridge released introducing third generation intel hd graphics ivy bridge celeron pentium intel hd core i3 either hd 2500 hd 4000 hd graphics 2500 4000 include hardware video encoding hd postprocessing effects low-power mobile cpus limited video decoding support none desktop cpus limitation 12 september 2012 haswell cpus announced four models integrated gpus 128 mb edram iris pro gt3e package cpu separate die manufactured different process intel refers level 4 cache available cpu gpu naming crystalwell linux support edram expected kernel version 3.12 making codice_1 driver aware capable using integrated iris pro graphics adopted apple late-2013 15-inch macbook pro laptops retina display first time history series discrete graphics cards although low-end model also included late-2013 21.5-inch imac november 2013 announced broadwell-k desktop processors aimed enthusiasts also carry iris pro graphics following models integrated gpu announced broadwell processors skylake line processors launched august 2015 retires vga support supporting multi-monitor setups three monitors connected via hdmi 1.4 displayport 1.2 embedded displayport edp 1.3 interfaces following models integrated gpu available announced skylake processors new features speed increases support 4k uhd premium drm encoded streaming services media engine full hardware acceleration 8- 10-bit hevc vp9 decode new features hdcp 2.2 support new features hdmi 2.0 support vp9 10-bit profile2 hardware decoder new features 10 nm gen 11 gpu microarchitecture two hevc 10-bit encode pipelines three 4k display pipelines 2x 5k60 1x 4k120 variable rate shading vrs beginning sandy bridge graphics processors include form digital copy protection digital rights management drm called intel insider allows decryption protected media within processor previously similar technology called protected audio video path pavp intel quick sync video intel hardware video encoding decoding technology integrated intel cpus name quick sync refers use case quickly transcoding syncing video example dvd blu-ray disc format appropriate example smartphone quick sync introduced gen 6 sandy bridge microprocessors 9 january 2011 graphics virtualization technology announced supported iris pro gpus hd 2500 hd 4000 gpus ivy bridge cpus advertised supporting three active monitors many users found work due chipsets supporting two active monitors many common configurations reason chipsets include two phase-locked loops plls pll generates pixel clock certain frequency used sync timings data transferred gpu displays therefore three simultaneously active monitors achieved hardware configuration requires two unique pixel clocks asrock z87- h87-based motherboards support three displays simultaneously asus h87-based motherboards also advertised support three independent monitors opencl 2.1 2.2 possible software update opencl 2.0 hardware broadwell+ future software updates mesa support direct3d 9.3 implemented gallium3d-style drivers mesa intel driver intel developed dedicated sip core implements multiple video decompression compression algorithms branded intel quick sync video implemented completely partially intel releases programming manuals intel hd graphics devices via open source technology center allows various open source enthusiasts hackers contribute driver development port drivers various operating systems without need reverse engineering | [
2449,
2814,
8054,
6332,
6698,
3942,
3849,
4765,
6170,
3443,
6344,
1833,
7442,
7449,
7364,
740,
3717,
7093,
5939,
3803,
1117,
1867,
3565,
7848,
240,
7669,
766,
4537,
6307,
8024,
691,
5343,
959,
3061,
4098,
1237,
6057,
352,
6152,
2351,
29... | Validation |
6,794 | 2 | Walnut_Creek_CDROM:walnut creek cdrom walnut creek cdrom walnut creek california early provider freeware shareware free software cd-roms company founded august 1991 bob bruce one first commercial distributors free software cd-roms company produced hundreds titles cd-roms ran busiest ftp site internet ftp.cdrom.com many years early years popular products simtel shareware ms-dos cica shareware microsoft windows sunny archives aminet archives amiga january 1994 published collection 350 texts project gutenberg one first published ebook collections walnut creek developed close relationship freebsd unix-like open source operating system project inception 1993 company published freebsd cd-rom distributed ftp employed freebsd project founders jordan hubbard david greenman ran freebsd servers sponsored freebsd conferences published freebsd books including complete freebsd 1997 freebsd walnut creek successful product according bruce 1995 onwards walnut creek also official publisher slackware linux walnut creek also gained fame codice_1 subdirectory de facto distribution center doom -engine modification community time users gained access high-speed internet connections demand software physical media decreased dramatically company merged berkeley software design inc. bsdi 2000 focus engineering effort similar freebsd bsd/os operating systems soon bsdi acquired telenet system solutions inc. internet infrastructure server supplier software assets bsdi freebsd slackware bsd/os acquired wind river systems 2001 remainder company renamed ixsystems wind river dropped sponsorship slackware soon afterwards freebsd unit divested separate entity 2002 freebsd mall inc. ixsystems server business acquired 2002 offmyserver reverted ixsystems name 2005 february 2007 ixsystems acquired freebsd mall walnut creek cdrom url time redirected simtel.net page found simtel shut march 15 2013 | [
5268,
3838,
1341,
7514,
4759,
462,
6085,
3856,
908,
7075,
481,
3457,
1279,
5571,
1193,
738,
6367,
6369,
2583,
6918,
6380,
594,
4441,
6477,
2512,
424,
6489,
6583,
443
] | Train |
6,795 | 4 | Public_key_certificate:public key certificate cryptography public key certificate also known digital certificate identity certificate electronic document used prove ownership public key certificate includes information key information identity owner called subject digital signature entity verified certificate contents called issuer signature valid software examining certificate trusts issuer use key communicate securely certificate subject email encryption code signing e-signature systems certificate subject typically person organization however transport layer security tls certificate subject typically computer device though tls certificates may identify organizations individuals addition core role identifying devices tls sometimes called older name secure sockets layer ssl notable part https protocol securely browsing web typical public-key infrastructure pki scheme certificate issuer certificate authority ca usually company charges customers issue certificates contrast web trust scheme individuals sign keys directly format performs similar function public key certificate common format public key certificates defined x.509 x.509 general format constrained profiles defined certain use cases public key infrastructure x.509 defined nowiki rfc 5280 /nowiki tls updated replacement ssl server required present certificate part initial connection setup client connecting server perform certification path validation algorithm primary hostname domain name website listed common name subject field certificate certificate may valid multiple hostnames multiple websites certificates commonly called subject alternative name san certificates unified communications certificates ucc certificates contain field subject alternative name though many cas also put subject common name field backward compatibility hostnames contain asterisk certificate may also called wildcard certificate tls server may configured self-signed certificate case clients generally unable verify certificate terminate connection unless certificate checking disabled per applications ssl certificates classified three types- client certificates less common server certificates used authenticate client connecting tls service instance provide access control services provide access individuals rather devices client certificates contain email address personal name rather hostname also authentication usually managed service provider client certificates usually issued public ca provides server certificates instead operator service requires client certificates usually operate internal ca issue client certificates supported many web browsers services use passwords cookies authenticate users instead client certificates client certificates common rpc systems used authenticate devices ensure authorized devices make certain rpc calls s/mime protocol secure email senders need discover public key use given recipient get information email certificate publicly trusted certificate authorities provide email certificates commonly s/mime used communicating within given organization organization runs ca trusted participants email system certificates also used validate signatures programs ensure tampered delivery certificate identifying individual typically electronic signature purposes commonly used europe eidas regulation standardizes requires recognition self-signed certificate used sign certificates also sometimes called trust anchor certificate used sign certificates intermediate certificate must signed another intermediate certificate root certificate certificate used sign certificates instance tls/ssl server client certificates email certificates code signing certificates qualified certificates end-entity certificates certificate subject matches issuer signature verified public key types certificate self-signed self-signed certificates also often called snake oil certificates emphasize untrustworthiness common fields certificates certificates contain number fields listed note terms certificate x.509 representation certificate flat contains fields nested various structures within certificate european union electronic signatures legal documents commonly performed using digital signatures accompanying identity certificates largely signatures granted enforceability handwritten signatures eidas eu regulation x.509 trust model certificate authority ca responsible signing certificates certificates act introduction two parties means ca acts trusted third party ca processes requests people organizations requesting certificates called subscribers verifies information potentially signs end-entity certificate based information perform role effectively ca needs one broadly trusted root certificates intermediate certificates corresponding private keys cas may achieve broad trust root certificates included popular software obtaining cross-signature another ca delegating trust cas trusted within relatively small community like business distributed mechanisms like windows group policy certificate authorities also responsible maintaining up-to-date revocation information certificates issued indicating whether certificates still valid provide information online certificate status protocol ocsp and/or certificate revocation lists crls major software contains list certificate authorities trusted default makes easier end-users validate certificates easier people organizations request certificates know certificate authorities issue certificate broadly trusted particularly important https web site operator generally wants get certificate trusted nearly potential visitors web site policies processes provider uses decide certificate authorities software trust called root programs influential root programs browsers firefox generally use operating system facilities decide certificate authorities trusted instance chrome windows trusts certificate authorities included microsoft root program macos ios chrome trusts certificate authorities apple root program edge safari use respective operating system trust stores well available single os firefox uses mozilla root program trust store platforms mozilla root program operated publicly certificate list part open source firefox web browser broadly used outside firefox instance common linux root program many linux distributions like debian include package periodically copies contents firefox trust list used applications root programs generally provide set valid purposes certificates include instance cas may considered trusted issuing tls server certificates code signing certificates indicated set trust bits root certificate storage system common use certificates https-based web sites web browser validates https web server authentic user feel secure his/her interaction web site eavesdroppers web site claims security important electronic commerce practice web site operator obtains certificate applying certificate authority certificate signing request certificate request electronic document contains web site name company information public key certificate provider signs request thus producing public certificate web browsing public certificate served web browser connects web site proves web browser provider believes issued certificate owner web site example user connects codice_1 browser browser give certificate warning message user theoretically sure interacting codice_1 equivalent interacting entity contact email address listed public registrar example.com even though email address may displayed anywhere web site surety kind implied relationship purchaser certificate operator web site generator web site content may tenuous guaranteed best certificate guarantees uniqueness web site provided web site compromised hacked certificate issuing process subverted certificate provider opt issue three types certificates requiring degree vetting rigor order increasing rigor naturally cost domain validation organization validation extended validation rigors loosely agreed upon voluntary participants ca/browser forum certificate provider issue domain validation dv class certificate purchaser purchaser demonstrate one vetting criterion right administratively manage domain name certificate provider issue organization validation ov class certificate purchaser purchaser meet two criteria right administratively manage domain name question perhaps organization actual existence legal entity certificate provider publishes ov vetting criteria certificate policy acquire extended validation ev certificate purchaser must persuade certificate provider legal identity including manual verification checks human ov certificates certificate provider publishes ev vetting criteria certificate policy browsers generally offer users visual indication legal identity site presents ev certificate browsers show legal name domain use bright green color highlight change way user see legal identity owner verified web browser give warning user web site suddenly presents different certificate even certificate lower number key bits even different provider even previous certificate expiry date far future however change ev certificate non-ev certificate apparent green bar longer displayed certificate providers jurisdiction governments governments may freedom order provider generate certificate purposes law enforcement subsidiary wholesale certificate providers also freedom generate certificate web browsers come extensive built-in list trusted root certificates many controlled organizations may unfamiliar user organizations free issue certificate web site guarantee web browsers include root certificates accept genuine instance end users must rely developer browser software manage built-in list certificates certificate providers behave correctly inform browser developer problematic certificates uncommon incidents fraudulent certificates issued cases browsers detected fraud others time passed browser developers removed certificates software list built-in certificates also limited provided browser developer users degree applications free extend list special purposes company intranets means someone gains access machine install new root certificate browser browser recognize websites use inserted certificate legitimate provable security reliance something external system consequence public key certification scheme rely special setup assumption existence certificate authority spite limitations described certificate-authenticated tls considered mandatory security guidelines whenever web site hosts confidential information performs material transactions practice spite weaknesses described web sites secured public key certificates still secure unsecured http // web sites national institute standards technology nist computer security division provides guidance documents public key certificates | [
363,
6795,
3958,
1460,
1467,
6448,
5399,
2577,
38,
5052,
6458,
2587,
7567,
7925,
5773,
770,
7214,
73,
84,
1513,
2620,
7604,
4025,
794,
96,
6515,
1168,
1173,
7975,
6894,
2644,
2287,
112,
5824,
1554,
6540,
1559,
3383,
6553,
502,
4071,
2... | Validation |
6,796 | 9 | R._Kent_Dybvig:r. kent dybvig r. kent dybvig professor computer science indiana university bloomington bloomington indiana research focuses programming languages principal developer optimizing chez scheme compiler runtime system initially released 1985 together daniel p. friedman long advocated use scheme language teaching computer science professor emeritus retired indiana university iu join cisco 2011 contributions practical theoretical aspects computing information technology particular design development chez scheme association computing machinery acm named dybvig distinguished member 2006 first year association awarded distinguished ranks | [
7878,
1445,
5019,
1820,
4669,
6087,
2915,
5734,
1478,
2218,
4704,
5757,
6116,
1116,
6471,
7573,
2600,
5077,
1885,
1889,
4737,
795,
6876,
6888,
1557,
4783,
5494,
5501,
6210,
144,
4074,
4085,
7298,
5515,
8025,
3749,
6949,
5883,
6955,
4837,
... | Test |
6,797 | 4 | Harold_T._Martin_III:harold t. martin iii harold thomas martin iii born november 1964 former contractor booz allen hamilton accused stealing approximately 50 terabytes data national security agency nsa investigators reportedly difficulty determining martin engaged conventional espionage digital hoarding public reporting indicated united states government agencies apparently failed note effectively respond number issues martin security practices behaviors period 10 20 years martin earned bachelor degree economics math university wisconsin-madison 1989 master degree information systems george mason university 2004 time arrest martin pursuing phd computing university maryland baltimore county research area virtual interfaces exploration heterogeneous cloud computing architectures martin previously worked computer sciences corp tenacity solutions martin worked national security agency 2012 2015 including spending time elite tailored access operations unit albeit support capacity martin previously served surface warfare officer united states navy serving 1987 2000 including aboard uss seattle awarded kuwait liberation medal moved united states navy reserve first received access classified data 2015 still booz allen hamilton contractor transferred department defense office acquisition technology logistics l attempting trace source shadow brokers leak summer 2016 federal bureau investigation fbi alerted nsa internet post made martin allegedly communicated via twitter account hal_999999999 martin used twitter contact russian-based kaspersky lab cyber-security firm turn alerted national security agency federal bureau investigations used information provided kaspersky researchers obtain search warrant martin residence subsequently according united states department justice fbi discovered thousands pages terabytes data classified information martin residence personal vehicle including classified computer code martin reported stolen classified information simply walking secure workplaces possession prosecutors stated stolen classified information includes names covert intelligence officers according indictment martin stole materials central intelligence agency national security agency united states cyber command united states department defense national reconnaissance office according prosecutors evidence martin actually accessed files stole martin charged united states department justice willful retention national defense information martin entered plea guilty october 2016 hearing united states district court district maryland magistrate judge a. david copperthite sided prosecution agreeing martin flight risk would released pending trial fbi failure provide martin miranda warning led u.s. district court judge richard bennett rendering many martin statements inadmissible martin defense attorneys argued suffered mental health issues hoarding symptom martin agreed plead guilty december 2017 scheduled occur january 22 2018 martin pled guilty according court memorandum opinion dated december 3 2018 martin trial date scheduled june 17 2019 march 17 2019 martin agreed plead guilty willful retention national defense information deal called nine years prison three years supervised release fine 250,000 july 19 2019 martin sentenced nine years prison | [
5452,
7057,
6046
] | Test |
6,798 | 9 | PL/P:pl/p pl/p programming language acronym programming language prime computers mid-level programming language developed prime computer serve second primary system programming language fortran iv pl/p subset pl/i additions primos operating system prime 50 series computers written mostly pl/p later years certain primos modules written fortran iv primos early years rewritten pl/p pl/p widespread compiled programming language used commercial primos applications outpacing use prime c compiler cpl primos scripting language fortran iv compiler commercial applications | [
3509,
4670,
5932,
1435
] | Train |
6,799 | 4 | Quantum_Byzantine_agreement:quantum byzantine agreement byzantine fault tolerant protocols algorithms robust arbitrary types failures distributed algorithms advent popularity internet need develop algorithms require centralized control guarantee always working correctly byzantine agreement protocol essential part task article quantum version byzantine protocol works constant time described byzantine agreement protocol protocol distributed computing takes name problem formulated lamport shostak pease 1982 reference historical problem byzantine army divided divisions division led general following properties see proof impossibility result problem usually equivalently restated form commanding general loyal lieutenants general either loyal traitor lieutenants following properties failures algorithm protocol categorized three main types byzantine resilient byzantine fault tolerant protocol algorithm algorithm robust kinds failures mentioned example given space shuttle multiple redundant processors processors give incorrect data processors sets processors believed solution formulated byzantine fault tolerant protocol sketch asynchronous algorithm algorithm works two phases two types coin flipping protocols generate random coin assign integer range 0 n-1 player player allowed choose random id player formula_17 selects random number formula_18 every player formula_19 distributes using verifiable secret sharing scheme end phase players agree secrets properly shared secrets opened player formula_11 assigned value formula_21 requires private information channels replace random secrets superposition formula_22 state encoded using quantum verifiable secret sharing protocol qvss distribute state formula_23 since bad players collapse state prevent bad players encode state using quantum verifiable secret sharing qvss send player share secret verification requires byzantine agreement replacing agreement grade-cast protocol enough grade-cast protocol following properties using definitions informally graded broadcast protocol protocol designated player called “ dealer ” one broadcasts protocol p said achieve graded broadcast beginning protocol designated player called dealer holds value v end protocol every player formula_19 outputs pair formula_25 following properties hold formula_26 formula_38 verification stage qvss protocol guarantees good dealer correct state encoded possibly faulty dealer particular state recovered recovery stage note purpose byzantine quantum coin flip protocol recovery stage much simpler player measures share qvss sends classical value players verification stage guarantees high probability presence formula_38 faulty players good players recover classical value value would result direct measurement encoded state 2007 quantum protocol byzantine agreement demonstrated experimentally using four-photon polarization-entangled state shows quantum implementation classical byzantine agreement protocols indeed feasible | [
8124
] | Test |
6,800 | 2 | Message_Maps:message maps message maps microsoft foundation class library message map facility microsoft windows implements polymorphism window classes using messaging facility due large number messages involved providing separate virtual function windows message results prohibitively large vtable mfc provides alternative switch statement used traditional windows programs handle messages sent window mapping messages member-functions may defined message handled window appropriate member function called automatically message-map facility designed similar virtual functions additional benefits possible c++ virtual functions message maps maps user action appropriate mfc class functions handle mfc class handle message member ccmdtarget i.e hierarchically derived ccmdtarget advantage message map action mapped one mfc class function similar handling messages sdk application using wndproc callback functions mfc help oops concepts | [
8097,
4759,
7438
] | Test |
6,801 | 2 | GEOS_(8-bit_operating_system):geos 8-bit operating system geos graphic environment operating system operating system berkeley softworks later geoworks originally designed commodore 64 version released 1986 enhanced versions geos later became available 1987 commodore 128 1988 apple ii family computers lesser-known version also released commodore plus/4 geos closely resembles early versions classic mac os includes graphical word processor geowrite paint program geopaint december 1987 survey commodore-dedicated magazine compute gazette found nearly half readers used geos many years commodore bundled geos redesigned cost-reduced c64 c64c peak geos third-most-popular microcomputer operating system world terms units shipped trailing ms-dos mac os besides original commodore 64 kernal geos-compatible software packages available berkeley softworks third parties including reasonably sophisticated desktop publishing application called geopublish spreadsheet called geocalc geopublish sophisticated aldus pagemaker geocalc sophisticated microsoft excel packages provide reasonable functionality berkeley softworks founder brian dougherty claimed company ran business using software commodore 8-bit computers several years written group programmers geos design team jim defrisco dave durran michael farr doug fults chris hawley clayton jung tony requist led dougherty cut teeth limited-resource video game machines atari 2600 geos revered could accomplish machines 64–128 kb ram memory 1–2 mhz 8-bit processing power unlike many pieces proprietary software c64 c128 geos takes full advantage many add-ons improvements available systems commodore 1351 mouse supported geos various ram expansion units geos 128 also fully supports c128 640×200 high-resolution vdc display mode compatible rgb monitor c64 version geos incorporates built-in fast loader called diskturbo significantly increases speed drive access slow 1541 geos first commodore software could use floppy disk swap space virtual memory geos 128 take advantage c128 enhanced burst mode conjunction 1571 1581 drives commodore version geos uses copy protection scheme renders users disks unbootable detects disk illegally duplicated via berkeley special geocable interface converter third-party interfaces connect standard rs-232 centronics printers commodore serial bus geos supports wide variety printers including hp pcl printers apple laserwriter ability print high-end printers major factor making geos desktop publishing platform apple ii version geos released freeware august 2003 commodore 64/128 versions followed february 2004 latest geos desktop suite ibm pc compatibles breadbox ensemble revivals seen omnigo handhelds brother geobook line laptop-appliances newdeal office package pcs related code found way earlier zoomer pdas creating unclear lineage palm inc. later work nokia used geos base operating system nokia communicator series switching epoc symbian august 19 2016 michael steil posted blog source code geos 2.0 commodore c64 fully reverse-engineered cc65 compiler suite reverse-engineered source code made available github dozens official third-party applications products produced geos among important popular following | [
405,
1522,
3764,
6380,
5571,
4670,
8066,
3359
] | Test |
6,802 | 5 | Firefox_2:firefox 2 mozilla firefox 2 version firefox web browser released october 24 2006 mozilla corporation firefox 2 uses version 1.8 gecko layout engine displaying web pages release contained many new features found firefox 1.5 including improved support scalable vector graphics svg javascript 1.7 well user interface changes march 22 2006 first alpha version firefox 2 bon echo alpha 1 released featured gecko 1.8.1 first time mozilla firefox 2.0.0.x final version officially supported windows nt 4.0 windows 98 windows although run windows 95 windows nt 3.51 using tweaks mac os x 10.5 support added october 18 2007 version 2.0.0.8 firefox 2.0 featured updates tabbed browsing environment extensions manager gui find search software update engines new session restore feature inline spell checking anti-phishing feature implemented google extension later merged program mozilla ended support firefox 2 december 18 2008 one article noted release firefox 2.0 october 2006 ie6 lion share browser market 77.22 internet explorer 7 climbed 3.18 firefox 2.0 0.69 softpedia article however noted july 2007 firefox 2.0 also expanding share constantly spite ie7 0.69 october 2006 firefox 2.0 accounting 11.07 market mozilla even sacrificed version 1.5 open source browser firefox 2.0 support cut end june firefox 1.5 dropped 2.85 firefox 2 began lose notable market share firefox 3 within 24 hours release firefox 3 usage rose 1 3 according net applications time period firefox 2 market share consistently dropped eventually surpassed firefox 3 2008 firefox 3.5 2009 general browser market firefox version greatest share early 2009 dropped 3 percent firefox 2.x end-of-lifed december 2008 roughly 26 months support firefox 3.6 supported longer gecko 1.8.1 browser core continued receive patches projects camino k-meleon seamonkey even official firefox releases ceased 2011 1.8.1 core become obsolete major websites dropped support employing newer technologies presentation complex scripting latter resource-intensive older core users stuck use noscript avoid problems scripts take long process cost losing site features beyond basic functionality services large user bases relegated browsers gecko 1.8.1 rendering engine using lightweight mobile versions sites alongside recommendations upgrade browser others recommend upgrade nevertheless still large number websites freely usable navigable firefox 2.0 equivalents alone many must still support older browsers like internet explorer 6 ie7 | [
4655,
5378,
2205,
7537,
6809,
393,
3291,
2574,
6452,
6458,
4352,
4725,
1136,
7587,
2261,
84,
7597,
445,
1152,
448,
4755,
4759,
1536,
7975,
7628,
5821,
5127,
1190,
3383,
8006,
5506,
3043,
1970,
6221,
520,
3057,
3060,
3412,
5887,
6962,
55... | Test |
6,803 | 4 | Sparrowiq:sparrowiq sparrowiq packet-based traffic analysis network performance monitoring solution provides network managers near real-time traffic visibility network usage based conversations applications users class service product developed solana networks ottawa ontario canada allow smaller businesses gain access flow-based network traffic monitoring solutions normally complex unaffordable sparrowiq awarded best new product ascii group june 2015 strong value award enterprise management associates 2013 sparrowiq key features | [] | Test |
6,804 | 2 | VAXELN:vaxeln vaxeln discontinued real-time operating system vax family computers produced digital equipment corporation dec maynard massachusetts rsx-11 vms dave cutler principal force behind development operating system cutler team developed product moving seattle washington area form decwest engineering group dec first engineering group outside new england initial target platforms vaxeln backplane interconnect computers model code-named scorpio time vax microcomputers vaxeln well way cutler spearheaded next project microvax -- first vax microcomputer although low-volume product compared new england-developed microvax ii microvax demonstrated set architectural decisions needed support single-board implementation vax computer family also provided platform embedded applications written vaxeln vaxeln team made decision first release use pascal language system programming language languages including c supported later releases system small focused development team built first product approximately 18 months vaxeln allowed developer write self-contained embedded system application would run vax later microvax hardware operating system present system debuted las vegas early 1980s variety amusing applications written development team ranging system composed played minuets robotic system played solved tower hanoi puzzle system originally supposed named elan executive local area network dec discovered last minute trademarked european country dec wished conduct business company holding trademark elan slovenian sports equipment manufacturer elan order avoid litigation dec quickly renamed vaxeln dropping much disgruntlement developers documentation marketing material already printed referring product elan samples posters prized many years members original team | [
190,
4946,
5571,
4786,
4795,
2582,
1765,
5948,
8117,
7396,
861,
3751,
1435
] | Test |
6,805 | 7 | QuickSchools.com:quickschools.com maestro planning solutions early origins providing supply chain management software company founded early 2003 winning venture 2002 business plan writing competition competition organized mckinsey co supported malaysia largest venture capital company mavcap ministry finance malaysia publicity support garnered win company born 2006 maestro made exploratory move schools market via project premier malaysian private school kolej tuanku ja'afar maestro used optimalone platform injected supply chain ideas creation school management system project cross-fertilization ideas supply chain school management system recognized ktj different several school management systems evaluating time january 2008 maestro decided embark launching school administrative software online system subsequently branded quickschools.com fully online school management system small schools april 2009 maestro planning solutions raised 4.5 million malaysian ringgit venture capital funded dta growth capital malaysia financing support quickschool.com expansion us school market strengthen company r well sales marketing efforts also april 2009 maestro received grant 1.06 million malaysian ringgit spearhead r web 2.0 timetable scheduling software eventually part quickschools.com grant awarded mdec multimedia development corporation malaysia august 17 2009 quickschools released brand new version school management system based extensive feedback current user base approach software design decided upon best way forward focused improving user experience therefore attention give introducing simple user interface extensive feature hiding one key improvements allow users running minutes administrator simply registers his/her school website along custom domain school software automatically creates publishes fully functional school management system real time admin proceed 'invite teachers faculty test system another improvement involves 'livefeed feature creates notifications certain activities take place essential paradigm shift achieved way software reformats match user requirements features required specific school made available making software easy use makes barriers entry almost negligible quickschool long-term goal create software require technical support training release goes long way achieving system allows users log details inquiries parents guardians keep track contact details student applications also maintained along grades achieved entrance exams details picture subjects taken classes attended grades extra-curricular activities tracked student grading also done end term reports printed pdf parents track progress children daily basis makes hard student wants cut missing assignment plain tardy system sending parents e-mail notification soon teacher marks student late/absent schedules generated students teachers subjects classrooms flexible type information school wants track students foreign language character support arabic chinese currently available quickschools.com based maestro optimalone platform quickschools.com runs java ee backend front-end runs adobe flash previously macromedia flash use flash enables quickschools.com run many different browsers different operating systems also enables web2.0-style interface servers located 2 locations around world first location established malaysia january 2008 second location established seattle us august 2008 | [
6015
] | Validation |
6,806 | 7 | FUJITSU_Cloud_IaaS_Trusted_Public_S5:fujitsu cloud iaas trusted public s5 fujitsu cloud iaas trusted public s5 fujitsu cloud computing platform aims deliver standardized enterprise-class public cloud services globally offers infrastructure-as-a-service iaas fujitsu data centers provide computing resources employed on-demand suited customers needs service ensures high level reliability sufficient deployment mission-critical systems japan service offered on-demand virtual system service oviss launched globally fujitsu global cloud platform/s5 fgcp/s5 since july 2013 service called iaas trusted public s5 globally service operated fujitsu data centers located australia singapore united states united kingdom germany fujitsu also launched windows azure powered global cloud platform partnership microsoft platform-as-a-service paas offering known fgcp/a5 japan since renamed fujitsu cloud paas a5 windows azure operated fujitsu data center japan offers set application development frameworks microsoft .net java php data storage capabilities consistent windows azure platform provided microsoft basic service consists compute storage microsoft sql azure windows azure appfabric technologies service bus access control service options interoperating services covering implementation migration applications system building systems operation support 2015 fujitsu launched next generation cloud service k5 deployed globally october 2018 fujitsu announced discontinuing k5 regions except japan october 16 2018 company stated hire 10,000 employees train use microsoft azure order address see industry-wide shortage cloud related skills help clients address execution gap provision services support operational efficiency digital co-creation multi-cloud management. ” fujitsu launched global cloud strategy april 2010 provision services platform offered trial basis 200 companies japan following month fujitsu announced general availability iaas service japan name on-demand virtual system service oviss starting 1 october 2010 part service global rollout launched australia name fujitsu global cloud platform fgcp february 2011 followed launches march 2011 singapore may 2011 united kingdom germany united states america july 2012 fujitsu added center western japan bring total number seven july 2013 fujitsu announced fujitsu cloud initiative globally also announced new name fujitsu cloud iaas trusted public s5 october 2018 fujitsu announced discontinuing k5 regions except japan basic component iaas trusted public s5 called virtual system consists firewall one multiple network segments customers host virtual machines signed customers deploy multiple systems within environment much like virtual data center iaas trusted public s5 employs templates allow customers quickly deploy virtual systems template consists firewall network segment definitions virtual servers os/middleware installed set allows quick selection example system three network zones pre-installed web server dmz application server secure zone database another secure zone virtual system includes firewall control access network segments internet intranet intranet connection communication virtual servers customers existing servers hosted fujitsu data center virtual servers chosen list pre-defined images operating system installed also additional software servers different computational resources offered operating systems offered globally include windows server 2008 windows server 2012 red hat enterprise linux centos ubuntu fujitsu claimed licensing issue prevents delivery microsoft office cloud service web based devices manner similar google docs virtual server system disk pre-defined size additional disks sizes configurable 10 gb 10 tb attached server running customers provision global ip addresses assign virtual servers similar amazon elastic ip address feature users provision manage virtual systems self-service portal also used initiate vpn connection virtual zone operations offered service portal also offered cloud api api xml-rpc based using ssl encrypt messages certificates authentication operations also possible multi-cloud api apache deltacloud fujitsu submitted cloud api specification distributed management task force open cloud standards incubator promote open standards cloud interoperability contributed dmtf cloud infrastructure management interface cimi standard july 2013 fujitsu demonstrated client using cimi manage system iaas trusted public s5 management developers conference servers physically located fujitsu tier iii data centers japan australia singapore uk us germany | [
370,
7165,
3954,
3958,
6806,
22,
3627,
2212,
737,
3309,
754,
5064,
2961,
4014,
1514,
2988,
7613,
1550,
1185,
6906,
5135,
3028,
2317,
842,
1982,
2700,
5889,
5894,
189,
1634,
3091,
6262,
7722,
5571,
5927,
578,
7741,
5940,
7756,
2430,
2433... | Train |
6,807 | 3 | Texas_Instruments_AR7:texas instruments ar7 texas instruments ar7 ti-ar7 fully integrated single-chip adsl cpe access router solution ar7 combines mips32 processor dsp-based digital transceiver adsl analog front end 2007 ti sold dsl business infineon 2009 infineon technologies spins wireline division lantiq november 6 2009 lantiq announced became standalone company | [
5055,
4667,
1670,
1992
] | Validation |
6,808 | 8 | StatCounter:statcounter statcounter web traffic analysis website started 1999 access basic services free advanced services cost us 119 month statcounter based dublin ireland statistics statcounter used compute web usage share example statcounter used 0.9 websites statcounter statistics directly derived hits—as opposed unique visitors—from 3 million sites use statcounter resulting total hits 15 billion per month artificial weightings used correct sampling bias thus numbers statistics considered representative samples company founded aodhán cullen age 16 cullen received internet hero award 2008 eircom golden spider awards also named 2007 businessweek young european entrepreneur year 2008 company surpassed two million members globally | [
2812,
5984,
2818,
4575,
4759,
6024,
1582,
518,
3057
] | Train |
6,809 | 5 | Epic_(web_browser):epic web browser epic privacy-centric web browser developed hidden reflex software product company founded alok bhardwaj based washington dc bangalore india chromium source code epic always private browsing mode exiting browser causes browsing data deleted even browsing little possible stored epic developers remove google tracking code binaries chromium source code compile clean executable blocks companies tracking users browser connection electronic privacy information center civil liberties group also known epic epic released august 29 2013 customized indian users browser integrated widgets social networking chat clients email facilities epic default configuration takes proactive approach ensuring session data cookies history cache removed upon exit browser includes proxy service enabled user discretion automatically enabled using search engine features preferring ssl connections always sending track header advance privacy however many implementations extension based part core browser code epic browser extension based feature implementation allow users extract import extensions chromium based browsers chrome extension developer mode ad user activity trackers blocked default epic browser prevents user tracking occur browser also blocks cryptocurrency miners running users system browsers fingerprinting protection blocks access image canvas font canvas audio context data webrtc ip address leaking blocked default well epic proxy service relay connections user 8 countries including united states united kingdom canada germany france netherlands india singapore company claims encrypted routes dns requests well supplementary services found chromium browser send data external servers address bar suggestion installation tracking removed epic reduce scope potential data leakage epic supports windows 7 later mac os x list web browsers | [
4655,
6802,
5378,
7537,
393,
3291,
2574,
2577,
6452,
4352,
4725,
1136,
6858,
445,
1152,
1525,
7628,
5821,
5127,
6540,
3383,
8006,
8009,
3043,
1970,
6221,
520,
3057,
5887,
6966,
5542,
1640,
1276,
5571,
7015,
7749,
2049,
4565,
2812,
2451,
... | Test |
6,810 | 7 | G.ho.st:g.ho.st g.ho.st usually pronounced ghost trading name ghost inc. service name url company hosted computer operating system web desktop service name acronym global hosted operating system old url g.ho.st domain hack using são tomé príncipe .st country extension april 2010 ghost closed service due competition lack funding g.ho.st service provided web-based working environment mimicked classic desktop provided personal computer operating systems users able create save return working environment different physical computers mobile phones g.ho.st called virtual computer services considered operating systems traditional sense although sometimes referred web operating systems whilst include gui e.g desktop virtual file system application management security contain kernel interface physical hardware therefore use service operating system required supporting least web browser service run july 2009 software entered beta stage development remained stage beta launch near jerusalem attended quartet representative former uk prime minister tony blair company primary investor benchmark capital g.ho.st hosted amazon web services utilizing cloud computing backend delivering consumer version cloud computing according g.ho.st website longer accessible planned additionally offer commercial fully featured scalable private cloud file system ghost cloud file system cfs would run within customer amazon web services account business model would based surcharges ghost collected amazon company received growing press coverage relating technology israelis palestinians worked partners build company products time considered joint palestinian israeli technology startup company first company offer employee stock options palestinian territories march 3 2010 ghost.cc formed g.ho.st sent users following e-mail dear ghost user hope enjoying free ghost service regrettably changes marketplace mean longer economical us host ghost service closing service around march 15 instead focusing licensing selling technology larger companies advise migrate important folders files emails another secure place march 15 might like consider google docs microsoft skydrive files services gmail yahoo mail email instructions migrating data included really sorry inconvenience may cause grateful fantastic support community similar services | [
2086,
2961,
2608,
5064
] | Test |
6,811 | 3 | Fire_Hawk:_Thexder_-_The_Second_Contact:fire hawk thexder second contact fire hawk thexder second contact テグザー2 ファイアーホーク also known firehawk thexder 2 firehawk thexder ii video game developed published game arts msx2 ms-dos pc-8801 1989 sequel thexder japan ms-dos version later released sierra on-line one predicted furious arcade action high-resolution graphics 11 complete songs ... thexder ii looks set surpass success original game indeed well received upon release sold well japan usa | [
6380,
6768
] | Test |
6,812 | 9 | DOORS_Extension_Language:doors extension language doors extension language dxl scripting language used extend functionality ibm rational doors programming language somewhat similar c c++ language specific doors syntax declaration forum discuss development addition specific reference manuals dxl scripts utilized help users doors much native doors gui written dxl dxl used client-server based doors classic used newer web-based doors next generation several ways use dxl rational doors dxl scripts usually stored extension dxl however use library files extension .inc print hello world following code used print hello world sodius dxl editor built top eclipse one tool provides option edit browse compile execute debug dxl scripts many open source free editors like notepad++ jedit support dxl custom properties | [
1435
] | Test |
6,813 | 3 | Input/output_base_address:input/output base address x86 architecture input/output base address first address range consecutive read/write addresses device uses x86 io bus base address sometimes called i/o port | [
4277,
3230
] | Train |
6,814 | 2 | Andy_Hertzfeld:andy hertzfeld andy hertzfeld born april 6 1953 american computer scientist inventor member original apple macintosh development team 1980s buying apple ii january 1978 went work apple computer august 1979 march 1984 designer macintosh system software since leaving apple co-founded three companies radius 1986 general magic 1990 eazel 1999 2002 helped mitch kapor promote open source software open source applications foundation hertzfeld worked google 2005 2013 2011 key designer circles user interface google+ graduating brown university computer science degree 1975 hertzfeld attended graduate school university california berkeley 1978 bought apple ii computer soon began developing software hired apple computer systems programmer 1979 developed apple silentype printer firmware wrote firmware sup r'terminal first 80-column card apple ii early 1980s invited high school friend artist susan kare join apple order help design would become standard macintosh icons first macintosh hertzfeld wrote icon editor font editor susan kare could design symbols used operating system hertzfeld member apple macintosh design team shakeup apple ii team hertzfeld request apple co-founder steve jobs added nearly two-year-old macintosh team february 1981 working bud tribble alongside bill atkinson burrell smith hertzfeld became primary software architect macintosh operating system considered revolutionary use graphical user interface gui jef raskin also made contributions hertzfeld business card apple listed title software wizard wrote large portions macintosh original system software including much rom code user interface toolbox number innovative components standard many graphic user interfaces like control panel scrapbook hertzfeld book revolution valley insanely great story mac made chronicles development macintosh launch since leaving apple 1984 hertzfeld co-founded three new companies – radius 1986 general magic 1990 eazel 1999 eazel helped create nautilus file manager linux gnome desktop volunteered open source applications foundation 2002 2003 writing early prototypes chandler information manager 1996 hertzfeld interviewed robert cringely television documentary triumph nerds interviewed cringely nerdtv 2005 early 2004 started folklore.org web site devoted collective storytelling contains dozens anecdotes development original macintosh stories collected o'reilly book revolution valley published december 2004 august 2005 hertzfeld joined google june 28 2011 google announced google+ latest attempt social networking hertzfeld key designer google+ circles component user interface entire project mistakenly claimed also worked picasa gmail profile image selector retired google july 2013 october 2018 investor startup spatial hertzfeld portrayed elden henson 2013 film jobs michael stuhlbarg 2015 film steve jobs steve jobs film herztfeld stated almost nothing like really happened ultimately said film n't aiming realism hertzfeld wife live palo alto california | [
6971,
7245,
3001,
7814,
578,
1103,
405,
5598,
4355,
2961,
6765,
1599,
961,
1509,
3920,
360
] | Test |
6,815 | 5 | Internet_0:internet 0 internet 0 low-speed physical layer designed route 'ip anything developed mit center bits atoms neil gershenfeld raffi krikorian danny cohen invented number proposals labelled internet 2 name chosen emphasize designed slow inexpensive internetworking system forestall high-performance comparison questions fast effectively would enable platform pervasive computing -- everything building could network share data gathering actuation light switch could turn light bulb sending packet linked together user internet 0 originally minor expedient bit engineering support mit projects intended network buildings improve efficiency gather data control hvac systems heating ventilation air conditioning protocol works pretty well wide variety media wide utility multiple media protocol interested network theorists awakened burst academic papers started commercial interest simple inexpensive implementation still appeals hobbyists students new implementations found 2011 modern implementations mostly software small microcontrollers usually transistor transmit capacitors isolate transmitter receiver connector literally becomes major expense communication system simple inexpensive system embedded many devices allow data retrieval control via internet -- small devices used form internet things current largest deployment internet 0 venice biennale architecture exhibition year 2008 group led institute advanced architecture catalonia directed architect vicente guallart idea behind internet 0 provide general-purpose physical layer operates well many media similar morse code general-purpose layer 1 internet logically recursive application internet principle ubiquitous protocol layer 1 network pulse-position modulation internet 0 operates best segregated wire works many media tested radio frequency rf infrared ir ultrasonics optical dc ac power wiring even physical representations printed bar codes engraving key one main advantages approach routers become simple sensor pulse reshaper transmitter coupling reusable physical layer internet protocols enables network inexpensive nodes also addressable global internet design intent provide simple inexpensive system transmit data slowly many types media yet still connect devices internet connecting internet crucial part design much value networked device provided easy wide access higher layers internet 0 network usually serial line internet protocol slip internet protocol ip usually user datagram protocol udp rarely transmission control protocol tcp protocol layers chosen need minimum code keep expense computer low internet 0 implemented small avr microcontrollers existing implementations layers distinct small code important elegant design small translation device normally attaches local network internet 0 devices serial port pc acts gateway firewall internet devices talk directly without requiring server distributed architecture ensures central point failure address assignment cryptographic key initialization sometimes performed closing contact device master controller broadcast assignment message security via simplified encryption system internet 0 similar serial port running 9600 baud except sends data pulse-position modulation accepts 30 timing deviations medium broadcast half duplex software receiving devices examines ip address packet rejecting unwanted packets zero bit one-microsecond pulse center first half bit time one pulse second half bit time data sent 8 bit bytes byte preceded bit time two pulses 1 0 times ends bit time another two pulses variations stop bit-time optional dual-pulse bit times treated byte separators dual-pulse start stop bit times permit receiver synchronize beginnings bytes also measure baud rate sender synchronizing 8-bit bytes permits 9600 baud internet-0 connection easily translate standard low-speed 19,200 baud tcp/ip serial port baud rate measurement permits senders receivers use inexpensive low-precision oscillators ceramic resonators resistor-capacitor oscillators common interface uses power supply wiring device circuit small surface mounted capacitor ac mains wire dc power wire single digital pin small microcontroller switches high-power transistor briefly pulses normally generated software toggle digital i/o pin microcontroller received another capacitor microcontroller pin configured interrupt hardware timer gate internet 0 works many media given transmission medium usually competing preexisting physical layers reliable higher speed lower power usually flexible rarely inexpensive less surprising early exploration concept sun microsystems cisco systems schneider electric interested commercial deployment schneider eventually decided deploy zigbee low-powered radio protocol | [
3821,
5648,
3507,
7876,
709,
7637,
4783,
1284,
108
] | Validation |
6,816 | 4 | Retina-X_Studios:retina-x studios retina-x studios software manufacturer company develops computer cell phone monitoring applications focused computers smartphones tablets networks company founded 1997 based jacksonville florida united states company founded july 1997 primarily web consulting design company 2003 period developing monitoring products outside companies company began creating monitoring software products using brand name first software product named acespy released april 28 2003 may 2007 company developed released first monitoring software mobile phones named mobile-spy particularly windows mobile target audiences retina-x studios parents employers parents employers use legal monitoring software check teens staff internet use legal since juveniles responsibility parents company markets products spy applications parents review child messages call details without child knowledge cases ethical issues arise employees made aware monitoring tools personal emails intentionally accessed managers involved directly evaluating contents logging activities be/become biased towards person whose email reviewed using cell phones spying also increased due multiplication smart phones compromising one information possible spy apps people stalk easily company software need onetime access gadget software would run invisibly wrong use software overlooked hackers access online information parsed customer account lead privacy issues | [
740,
1504
] | Test |
6,817 | 1 | Database_scalability:database scalability database scalability ability database handle changing demands adding/removing resources databases adopted host techniques cope initial history database scalability provide service ever smaller computers first database management systems ims ran mainframe computers second generation including ingres informix sybase rdb oracle emerged minicomputers third generation including dbase oracle ran personal computers period attention turned handling data demanding workloads one key software innovation late 1980s reduce update locking granularity tables disk blocks individual rows eliminated critical scalability bottleneck coarser locks could delay access rows even though directly involved transaction earlier systems completely insensitive increasing resources software limitations addressed attention turned hardware innovation occurred many areas first support multiprocessor computers involved allowing multiple processors handle database requests simultaneously without blocking evolved support multi-core processors much significant change involved allowing distributed transactions affect data stored separate computers using two-phase commit protocol establishing shared-nothing architecture still later oracle introduced shared-everything architecture provided full functionality multi-server clusters another innovation storing copies tables multiple computers database replication improved availability processing could continue copy even main system unavailable scalability particularly query/analysis requests could routed copy primary reached capacity early twenty-first century nosql systems gained favor relational databases workloads motivations included still greater scalability support documents non-relational data types often sacrificed strict acid consistency protocols guaranteed perfect consistency times favor eventual consistency ensured nodes would eventually return latest data even allowed transactions occasionally lost long system could handle sufficiently many requests prominent early system google bigtable/mapreduce developed 2004 achieved near-linear scalability across multiple server farms cost features multi-row transactions joins 2007 first newsql system h-store developed newsql systems attempt combine nosql scalability acid transactions sql interfaces database scalability three basic dimensions amount data volume requests size requests requests come many sizes transactions generally affect small amounts data may approach thousands per second analytic queries generally fewer may access data related concept elasticity ability system transparently add subtract capacity meet changing workloads vertical database scaling implies database system fully exploit maximally configured systems including typically multiprocessors large memories vast storage capacity systems relatively simple administer may offer reduced availability however single computer maximum configuration workloads expand beyond limit choices either migrate different still larger system rearchitect system achieve horizontal scalability horizontal database scaling involves adding servers work single workload horizontally scalable systems come functionality compromises application requires functionality migration vertically scaled system may preferable databases run individual hardware ranging capacity smartwatches supercomputers multiple transparently reconfigurable server farms databases also scaled vertically run 64-bit microprocessors multi-core cpus large smp multiprocessors using multi-threaded implementations fully exploiting hardware configuration requires variety locking techniques ranging locking entire database entire tables disk blocks individual table rows appropriate lock granularity depends workload smaller object locked less chance database requests blocking hardware idles typically row locks necessary support high volume transaction processing applications cost processing overhead manage larger number locks systems ensure query sees time-consistent view database locking data query examining prevent update modifying stalling work alternatively databases use multi-version read consistency avoid blocking read locks still providing consistent query results another potential bottleneck occur systems many requests attempt access data time example oltp systems many transactions may attempt insert data table time shared nothing system given moment inserts processed single server manages partition shard table possibly overwhelming rest system little many tables use sequence number primary key increases new inserted row index key also experience contention overheat processes inserts one solution reverse digits primary key spreads inserts table key across multiple parts database basic technique split large tables multiple partitions based ranges values key field example data year could held separate disk drive separate computer partitioning removes limits sizes single table replicated databases maintain copies tables databases multiple computers scaling technique particularly convenient seldom never-updated data transaction history tax tables variety approaches used scale beyond limits single computer hp enterprise nonstop sql uses shared nothing architecture neither data memory shared across server boundaries coordinator routes database requests correct server architecture provides near-linear scalability widely supported x/open xa standard employs global transaction monitor coordinate distributed transactions among semi-autonomous xa-compliant transaction resources oracle rac uses different model achieve scalability based shared-everything architecture approach incorporates shared disk approach allows multiple computers access disk cluster network-attached storage nas storage area networks sans coupled local area networks fibre channel technology enable configurations approach includes shared logical cache data cached memory server made available servers without requiring read data disk page moved server server satisfy requests updates generally happen quickly popular page updated multiple transactions little delay approach claimed support clusters containing 100 servers researchers question inherent limitations relational database management systems gigaspaces example contends space-based architecture required achieve performance scalability base one makes case extreme scalability within mainstream relational database technology | [
7788,
7958,
3255,
5455,
4031,
6893,
7453,
4798,
6462,
7924,
3396,
2054,
5956,
7213,
1134,
4274,
4195,
5447
] | Test |
6,818 | 3 | Embrace,_extend,_and_extinguish:embrace extend extinguish embrace extend extinguish eee also known embrace extend exterminate phrase u.s. department justice found used internally microsoft describe strategy entering product categories involving widely used standards extending standards proprietary capabilities using differences strongly disadvantage competitors strategy phrase embrace extend first described outside microsoft 1996 article new york times titled tomorrow world wide web microsoft pc king wants reign internet writer john markoff said rather merely embrace extend internet company critics fear microsoft intends engulf phrase embrace extend also appears facetious motivational song anonymous microsoft employee interview steve ballmer new york times variation embrace extend extinguish first introduced united states v. microsoft antitrust trial vice president intel steven mcgeady used phrase explain microsoft vice president paul maritz statement 1995 meeting intel described microsoft strategy kill html extending strategy three phases microsoft claims original strategy anti-competitive rather exercise discretion implement features believes customers want older variant phrase embrace extend innovate j allard 1994 memo windows next killer application internet paul maritz executives microsoft memo starts background internet general proposes strategy turn windows next killer app internet browser wars companies besides microsoft introduced proprietary non–standards-compliant extensions example 1995 netscape implemented font tag among html extensions without seeking review standards body rise internet explorer two companies became locked dead heat out-implement non–standards-compliant features 2004 prevent repeat browser wars resulting morass conflicting standards browser vendors apple inc. safari mozilla foundation firefox google inc. google chrome opera software opera browser formed web hypertext application technology working group whatwg create open standards complement world wide web consortium microsoft refused join citing group lack patent policy reason | [
5984,
3915,
5571,
4261,
6221,
87
] | Test |
6,819 | 0 | Praat:praat praat talk free computer software package speech analysis phonetics designed continues developed paul boersma david weenink university amsterdam run wide range operating systems including various versions unix linux mac microsoft windows 2000 xp vista 7 8 10 program supports speech synthesis including articulatory synthesis | [
2738,
4759,
5571,
578,
1435
] | Test |
6,820 | 3 | Approximate_computing:approximate computing approximate computing computation technique returns possibly inaccurate result rather guaranteed accurate result used applications approximate result sufficient purpose one example situation search engine exact answer may exist certain search query hence many answers may acceptable similarly occasional dropping frames video application go undetected due perceptual limitations humans approximate computing based observation many scenarios although performing exact computation requires large amount resources allowing bounded approximation provide disproportionate gains performance energy still achieving acceptable result accuracy example k -means clustering algorithm allowing 5 loss classification accuracy provide 50 times energy saving compared fully accurate classification key requirement approximate computing approximation introduced non-critical data since approximating critical data e.g. control operations lead disastrous consequences program crash erroneous output several strategies used performing approximate computing approximate computing used variety domains applications error-tolerant multimedia processing machine learning signal processing scientific computing etc google using approach tensor processing units tpu custom asic main issue approximate computing identification section application approximated case large scale applications common find people holding expertise approximate computing techniques enough expertise application domain vice versa order solve problem programming paradigms proposed common clear role separation application programmer application domain expert approaches allow spread common optimizations approximate computing techniques | [
1254,
6507
] | Test |
6,821 | 7 | Sqoop:sqoop sqoop command-line interface application transferring data relational databases hadoop sqoop supports incremental loads single table free form sql query well saved jobs run multiple times import updates made database since last import imports also used populate tables hive hbase exports used put data hadoop relational database sqoop got name sql-to-hadoop sqoop became top-level apache project march 2012 informatica provides sqoop-based connector version 10.1 pentaho provides open-source sqoop based connector steps sqoop import sqoop export etl suite pentaho data integration since version 4.5 software microsoft uses sqoop-based connector help transfer data microsoft sql server databases hadoop couchbase inc. also provides couchbase server-hadoop connector means sqoop | [
7238,
894,
4303,
7715,
5728,
7805,
2741,
7444,
7896,
917,
5571,
3463,
3542,
3204,
1286,
5054,
840,
1392,
3031,
5408,
3558,
5677,
6462,
3479,
5863,
6387,
5075,
6137,
7488,
7857,
5874,
3915,
1511,
4742,
5007,
1333,
702
] | Validation |
6,822 | 9 | Envoy_(WordPerfect):envoy wordperfect computing envoy proprietary portable document file format marketed wordperfect corporation created competitor acrobat pro introduced tumbleweed communications corporation 1993 shipped wordperfect office march 1994 envoy file could created use special printer driver wordperfect resulting document could viewed separate viewer application envoy distributable viewer also worked web browser plugin unlike adobe pdf file format publicly documented envoy failed make headway pdf largely unused reported success reading envoy documents printing postscript envoy distributable viewer converting postscript file pdf postscript file also viewed directly using viewer ghostscript | [
2815,
7223,
6015,
6016
] | Test |
6,823 | 4 | Rootkit:rootkit rootkit collection computer software typically malicious designed enable access computer area software otherwise allowed example unauthorized user often masks existence existence software term rootkit concatenation root traditional name privileged account unix-like operating systems word kit refers software components implement tool term rootkit negative connotations association malware rootkit installation automated attacker install obtained root administrator access obtaining access result direct attack system i.e exploiting known vulnerability privilege escalation password obtained cracking social engineering tactics like phishing installed becomes possible hide intrusion well maintain privileged access key root administrator access full control system means existing software modified including software might otherwise used detect circumvent rootkit detection difficult rootkit may able subvert software intended find detection methods include using alternative trusted operating system behavioral-based methods signature scanning difference scanning memory dump analysis removal complicated practically impossible especially cases rootkit resides kernel reinstallation operating system may available solution problem dealing firmware rootkits removal may require hardware replacement specialized equipment term rootkit root kit originally referred maliciously modified set administrative tools unix-like operating system granted root access intruder could replace standard administrative tools system rootkit intruder could obtain root access system whilst simultaneously concealing activities legitimate system administrator first-generation rootkits trivial detect using tools tripwire compromised access information lane davis steven dake wrote earliest known rootkit 1990 sun microsystems sunos unix operating system lecture gave upon receiving turing award 1983 ken thompson bell labs one creators unix theorized subverting c compiler unix distribution discussed exploit modified compiler would detect attempts compile unix codice_1 command generate altered code would accept user correct password additional backdoor password known attacker additionally compiler would detect attempts compile new version compiler would insert exploits new compiler review source code codice_1 command updated compiler would reveal malicious code exploit equivalent rootkit first documented computer virus target personal computer discovered 1986 used cloaking techniques hide brain virus intercepted attempts read boot sector redirected elsewhere disk copy original boot sector kept time dos-virus cloaking methods became sophisticated advanced techniques including hooking low-level disk int 13h bios interrupt calls hide unauthorized modifications files first malicious rootkit windows nt operating system appeared 1999 trojan called ntrootkit created greg hoglund followed hackerdefender 2003 first rootkit targeting mac os x appeared 2009 stuxnet worm first target programmable logic controllers plc 2005 sony bmg published cds copy protection digital rights management software called extended copy protection created software company first 4 internet software included music player silently installed rootkit limited user ability access cd software engineer mark russinovich created rootkit detection tool rootkitrevealer discovered rootkit one computers ensuing scandal raised public awareness rootkits cloak rootkit hid user file starting sys soon russinovich report malware appeared took advantage vulnerability affected systems one bbc analyst called public relations nightmare sony bmg released patches uninstall rootkit exposed users even serious vulnerability company eventually recalled cds united states class-action lawsuit brought sony bmg greek wiretapping case 2004-05 also referred greek watergate involved illegal telephone tapping 100 mobile phones vodafone greece network belonging mostly members greek government top-ranking civil servants taps began sometime near beginning august 2004 removed march 2005 without discovering identity perpetrators intruders installed rootkit targeting ericsson axe telephone exchange according ieee spectrum first time rootkit observed special-purpose system case ericsson telephone switch rootkit designed patch memory exchange running enable wiretapping disabling audit logs patch commands list active processes active data blocks modify data block checksum verification command backdoor allowed operator sysadmin status deactivate exchange transaction log alarms access commands related surveillance capability rootkit discovered intruders installed faulty update caused sms texts undelivered leading automated failure report generated ericsson engineers called investigate fault discovered hidden data blocks containing list phone numbers monitored along rootkit illicit monitoring software modern rootkits elevate access rather used make another software payload undetectable adding stealth capabilities rootkits classified malware payloads bundled malicious example payload might covertly steal user passwords credit card information computing resources conduct unauthorized activities small number rootkits may considered utility applications users example rootkit might cloak cd-rom-emulation driver allowing video game users defeat anti-piracy measures require insertion original installation media physical optical drive verify software legitimately purchased rootkits payloads many uses instances rootkits provide desired functionality may installed intentionally behalf computer user least five types rootkit ranging lowest level firmware highest privileges least privileged user-based variants operate ring 3 hybrid combinations may occur spanning example user mode kernel mode user-mode rootkits run ring 3 along applications user rather low-level system processes number possible installation vectors intercept modify standard behavior application programming interfaces apis inject dynamically linked library .dll file windows .dylib file mac os x processes thereby able execute inside target process spoof others sufficient privileges simply overwrite memory target application injection mechanisms include kernel-mode rootkits run highest operating system privileges ring 0 adding code replacing portions core operating system including kernel associated device drivers operating systems support kernel-mode device drivers execute privileges operating system many kernel-mode rootkits developed device drivers loadable modules loadable kernel modules linux device drivers microsoft windows class rootkit unrestricted security access difficult write complexity makes bugs common bugs code operating kernel level may seriously impact system stability leading discovery rootkit one first widely known kernel rootkits developed windows nt 4.0 released phrack magazine 1999 greg hoglund kernel rootkits especially difficult detect remove operate security level operating system thus able intercept subvert trusted operating system operations software antivirus software running compromised system equally vulnerable situation part system trusted rootkit modify data structures windows kernel using method known direct kernel object manipulation dkom method used hide processes kernel mode rootkit also hook system service descriptor table ssdt modify gates user mode kernel mode order cloak similarly linux operating system rootkit modify system call table subvert kernel functionality common rootkit creates hidden encrypted filesystem hide malware original copies files infected operating systems evolving counter threat kernel-mode rootkits example 64-bit editions microsoft windows implement mandatory signing kernel-level drivers order make difficult untrusted code execute highest privileges system kernel-mode rootkit variant called bootkit infect startup code like master boot record mbr volume boot record vbr boot sector way used attack full disk encryption systems example attack disk encryption evil maid attack attacker installs bootkit unattended computer envisioned scenario maid sneaking hotel room victims left hardware bootkit replaces legitimate boot loader one control typically malware loader persists transition protected mode kernel loaded thus able subvert kernel example stoned bootkit subverts system using compromised boot loader intercept encryption keys passwords recently alureon rootkit successfully subverted requirement 64-bit kernel-mode driver signing windows 7 modifying master boot record although malware sense something user n't want certain vista loader windows loader software work similar way injecting acpi slic system licensed internal code table ram-cached version bios boot order defeat windows vista windows 7 activation process vector attack rendered useless non-server versions windows 8 use unique machine-specific key system used one machine many antivirus companies provide free utilities programs remove bootkits rootkits created type ii hypervisors academia proofs concept exploiting hardware virtualization features intel vt amd-v type rootkit runs ring -1 hosts target operating system virtual machine thereby enabling rootkit intercept hardware calls made original operating system unlike normal hypervisors load operating system load operating system promoting virtual machine hypervisor rootkit make modifications kernel target subvert however mean detected guest operating system example timing differences may detectable cpu instructions subvirt laboratory rootkit developed jointly microsoft university michigan researchers academic example virtual machine–based rootkit vmbr blue pill software another 2009 researchers microsoft north carolina state university demonstrated hypervisor-layer anti-rootkit called hooksafe provides generic protection kernel-mode rootkits windows 10 introduced new feature called device guard takes advantage virtualization provide independent external protection operating system rootkit-type malware firmware rootkit uses device platform firmware create persistent malware image hardware router network card hard drive system bios rootkit hides firmware firmware usually inspected code integrity john heasman demonstrated viability firmware rootkits acpi firmware routines pci expansion card rom october 2008 criminals tampered european credit card-reading machines installed devices intercepted transmitted credit card details via mobile phone network march 2009 researchers alfredo ortega anibal sacco published details bios-level windows rootkit able survive disk replacement operating system re-installation months later learned laptops sold legitimate rootkit known absolute computrace absolute lojack laptops preinstalled many bios images anti-theft technology system researchers showed turned malicious purposes intel active management technology part intel vpro implements out-of-band management giving administrators remote administration remote management remote control pcs involvement host processor bios even system powered remote administration includes remote power-up power-down remote reset redirected boot console redirection pre-boot access bios settings programmable filtering inbound outbound network traffic agent presence checking out-of-band policy-based alerting access system information hardware asset information persistent event logs information stored dedicated memory hard drive accessible even os pc powered functions require deepest level rootkit second non-removable spy computer built around main computer sandy bridge future chipsets ability remotely kill restore lost stolen pc via 3g hardware rootkits built chipset help recover stolen computers remove data render useless also present privacy security concerns undetectable spying redirection management hackers might gain control rootkits employ variety techniques gain control system type rootkit influences choice attack vector common technique leverages security vulnerabilities achieve surreptitious privilege escalation another approach use trojan horse deceiving computer user trusting rootkit installation program benign—in case social engineering convinces user rootkit beneficial installation task made easier principle least privilege applied since rootkit explicitly request elevated administrator-level privileges classes rootkits installed someone physical access target system rootkits may also installed intentionally owner system somebody authorized owner e.g purpose employee monitoring rendering subversive techniques unnecessary malicious rootkit installations commercially driven pay-per-install ppi compensation method typical distribution installed rootkit takes active measures obscure presence within host system subversion evasion standard operating system security tools application programming interface apis used diagnosis scanning monitoring rootkits achieve modifying behavior core parts operating system loading code processes installation modification drivers kernel modules obfuscation techniques include concealing running processes system-monitoring mechanisms hiding system files configuration data uncommon rootkit disable event logging capacity operating system attempt hide evidence attack rootkits theory subvert operating system activities perfect rootkit thought similar perfect crime one nobody realizes taken place rootkits also take number measures ensure survival detection cleaning antivirus software addition commonly installing ring 0 kernel-mode complete access system include polymorphism changing signature hard detect stealth techniques regeneration disabling turning anti-malware software installing virtual machines may easier researchers discover analyze fundamental problem rootkit detection operating system subverted particularly kernel-level rootkit trusted find unauthorized modifications components actions requesting list running processes list files directory trusted behave expected words rootkit detectors work running infected systems effective rootkits defect camouflage run lower user-mode privileges detection software kernel computer viruses detection elimination rootkits ongoing struggle sides conflict detection take number different approaches including looking virus signatures e.g antivirus software integrity checking e.g digital signatures difference-based detection comparison expected vs. actual results behavioral detection e.g monitoring cpu usage network traffic kernel-mode rootkits detection considerably complex requiring careful scrutiny system call table look hooked functions malware may subverting system behavior well forensic scanning memory patterns indicate hidden processes unix rootkit detection offerings include zeppoo chkrootkit rkhunter ossec windows detection tools include microsoft sysinternals rootkitrevealer avast antivirus sophos anti-rootkit f-secure radix gmer windowsscope rootkit detectors prove effective ultimately contribute ineffectiveness malware authors adapt test code escape detection well-used tools detection examining storage suspect operating system operational miss rootkits recognised checking software rootkit active suspicious behavior suppressed conventional anti-malware software running rootkit operational may fail rootkit hides effectively best reliable method operating-system-level rootkit detection shut computer suspected infection check storage booting alternative trusted medium e.g rescue cd-rom usb flash drive technique effective rootkit actively hide presence running behavioral-based approach detecting rootkits attempts infer presence rootkit looking rootkit-like behavior example profiling system differences timing frequency api calls overall cpu utilization attributed rootkit method complex hampered high incidence false positives defective rootkits sometimes introduce obvious changes system alureon rootkit crashed windows systems security update exposed design flaw code logs packet analyzer firewall intrusion prevention system may present evidence rootkit behaviour networked environment antivirus products rarely catch viruses public tests depending used extent even though security software vendors incorporate rootkit detection products rootkit attempt hide antivirus scan stealth detector may notice rootkit attempts temporarily unload system signature detection fingerprinting still find combined approach forces attackers implement counterattack mechanisms retro routines attempt terminate antivirus programs signature-based detection methods effective well-published rootkits less specially crafted custom-root rootkits another method detect rootkits compares trusted raw data tainted content returned api example binaries present disk compared copies within operating memory operating systems in-memory image identical on-disk image results returned file system windows registry apis checked raw structures underlying physical disks—however case former valid differences introduced operating system mechanisms like memory relocation shimming rootkit may detect presence difference-based scanner virtual machine latter commonly used perform forensic analysis adjust behaviour differences detected difference-based detection used russinovich rootkitrevealer tool find sony drm rootkit code signing uses public-key infrastructure check file modified since digitally signed publisher alternatively system owner administrator use cryptographic hash function compute fingerprint installation time help detect subsequent unauthorized changes on-disk code libraries however unsophisticated schemes check whether code modified since installation time subversion prior time detectable fingerprint must re-established time changes made system example installing security updates service pack hash function creates message digest relatively short code calculated bit file using algorithm creates large changes message digest even smaller changes original file recalculating comparing message digest installed files regular intervals trusted list message digests changes system detected monitored—as long original baseline created malware added more-sophisticated rootkits able subvert verification process presenting unmodified copy file inspection making code modifications memory reconfiguration registers later compared white list expected values code performs hash compare extend operations must also protected—in context notion immutable root-of-trust holds first code measure security properties system must trusted ensure rootkit bootkit compromise system fundamental level forcing complete dump virtual memory capture active rootkit kernel dump case kernel-mode rootkit allowing offline forensic analysis performed debugger resulting dump file without rootkit able take measures cloak technique highly specialized may require access non-public source code debugging symbols memory dumps initiated operating system always used detect hypervisor-based rootkit able intercept subvert lowest-level attempts read memory—a hardware device one implements non-maskable interrupt may required dump memory scenario virtual machines also make easier analyze memory compromised machine underlying hypervisor rootkits avoid infecting virtual machines reason manual removal rootkit often difficult typical computer user number security-software vendors offer tools automatically detect remove rootkits typically part antivirus suite microsoft monthly windows malicious software removal tool able detect remove classes rootkits also windows defender offline remove rootkits runs trusted environment operating system starts antivirus scanners bypass file system apis vulnerable manipulation rootkit instead access raw file system structures directly use information validate results system apis identify differences may caused rootkit experts believe reliable way remove re-install operating system trusted media antivirus malware removal tools running untrusted system may ineffective well-written kernel-mode rootkits booting alternative operating system trusted media allow infected system volume mounted potentially safely cleaned critical data copied off—or alternatively forensic examination performed lightweight operating systems windows pe windows recovery console windows recovery environment bartpe live distros used purpose allowing system cleaned even type nature rootkit known manual repair may impractical re-installing operating system applications safer simpler quicker like much malware used attackers many rootkit implementations shared easily available internet uncommon see compromised system sophisticated publicly available rootkit hides presence unsophisticated worms attack tools apparently written inexperienced programmers rootkits available internet originated exploits academic proofs concept demonstrate varying methods hiding things within computer system taking unauthorized control often fully optimized stealth rootkits sometimes leave unintended evidence presence even rootkits used attack often effective rootkits keylogging features gameguard installed part online commercial games system hardening represents one first layers defence rootkit prevent able install applying security patches implementing principle least privilege reducing attack surface installing antivirus software standard security best practices effective classes malware new secure boot specifications like unified extensible firmware interface designed address threat bootkits even vulnerable security features offer utilized server systems remote server attestation using technologies intel trusted execution technology txt provide way verifying servers remain known good state example microsoft bitlocker encryption data-at-rest verifies servers known good state bootup privatecore vcage software offering secures data-in-use memory avoid bootkits rootkits verifying servers known good state bootup privatecore implementation works concert intel txt locks server system interfaces avoid potential bootkits rootkits | [
2173,
3932,
7151,
2545,
6417,
6419,
1461,
2566,
5046,
7186,
2577,
3638,
5401,
2221,
7570,
2241,
74,
4371,
5440,
7597,
7600,
1150,
788,
3680,
3681,
91,
4025,
6515,
4759,
7616,
7617,
2996,
6895,
3698,
5482,
1939,
5485,
3714,
2310,
496,
58... | Test |
6,824 | 4 | Sparse_binary_polynomial_hashing:sparse binary polynomial hashing sparse binary polynomial hashing sbph generalization bayesian spam filtering match mutating phrases well single words sbph way generating large number features incoming text automatically using statistics determine weights features terms predictive values spam/nonspam evaluation | [
6102
] | Train |
6,825 | 7 | C-RAN:c-ran c-ran cloud-ran sometimes referred centralized-ran architecture cellular networks first introduced china mobile research institute april 2010 beijing china 9 years disclosed patent applications filed u.s. companies simply speaking c-ran centralized cloud computing-based architecture radio access networks supports 2g 3g 4g future wireless communication standards name comes four c main characteristics c-ran system clean centralized processing collaborative radio real-time cloud radio access network traditional cellular radio access networks ran consist many stand-alone base stations bts bts covers small area whereas group bts provides coverage continuous area bts processes transmits signal mobile terminal forwards data payload mobile terminal core network via backhaul bts cooling back haul transportation backup battery monitoring system limited spectral resources network operators 'reuse frequency among different base stations cause interference neighbouring cells several limitations traditional cellular architecture first bts costly build operate moore law helps reduce size power electrical system supporting facilities bts improved quite well second bts added system improve capacity interference among bts severe bts closer using frequency third users mobile traffic bts fluctuates called 'tide effect result average utilization rate individual bts pretty low however processing resources shared bts therefore bts designed handle maximum traffic average traffic resulting waste processing resources power idle times 1g 2g cellular networks base stations all-in-one architecture analog digital power functions housed single cabinet large refrigerator usually base station cabinet placed dedicated room along necessary supporting facilitates power backup battery air conditioning environment surveillance backhaul transmission equipment rf signal generated base station rf unit propagates pairs rf cables antennas top base station tower mounting points all-in-one architecture mostly found macro cell deployments 3g distributed base station architecture introduced ericsson nokia huawei leading telecom equipment vendors architecture radio function unit also known remote radio head rrh separated digital function unit baseband unit bbu fiber digital baseband signals carried fiber using open base station architecture initiative obsai common public radio interface cpri standard rrh installed top tower close antenna reducing loss compared traditional base station rf signal travel long cable base station cabinet antenna top tower fiber link rrh bbu also allows flexibility network planning deployment placed hundreds meters kilometres away modern base stations use decoupled architecture c-ran may viewed architectural evolution distributed base station system takes advantage many technological advances wireless optical communications systems example uses latest cpri standard low cost coarse dense wavelength division multiplexing cwdm/ dwdm technology mmwave allow transmission baseband signal long distance thus achieving large scale centralised base station deployment applies recent data centre network technology allow low cost high reliability low latency high bandwidth interconnect network bbu pool utilises open platforms real-time virtualisation technology rooted cloud computing achieve dynamic shared resource allocation support multi-vendor multi-technology environments c-ran architecture following characteristics distinct cellular architectures kt telecom operator republic korea introduced cloud computing center ccc system 3g wcdma/hspa 4g lte/lte-a network 2011 2012 concept ccc basically c-ran sk telecom also deployed smart cloud access network scan advanced-scan 4g lte/lte-a network korea later 2012 2014 airvana commscope introduced onecell c-ran-based small cell system designed enterprises public spaces one major alternative solution addressing similar challenges ran small size all-in-one outdoor bts thanks achievements semiconductor industry functionality bts including rf baseband processing mac processing package level processing implemented volume 50 litres makes system small weatherproof reduces difficulty bts site choice construction eliminates air conditioning requirement thus reduces operational costs however bts still working readily make use collaboration algorithms reduce interference neighboring btss also relatively hard upgrade repair all-in-one bts units usually mounted near antenna processing units less-protected environments also implies higher failure rate compared c-ran rru deployed outdoors advantage cloud ran lies ability implement lte-advanced features coordinated multipoint comp low latency multiple radio heads however economic benefit improvements comp negated higher backhaul costs operators main competition small cell c-ran occurs two deployment scenarios outdoor hotspot coverage indoor coverage one promising evolution paths future cellular network architecture c-ran attracted high academic research interest meanwhile native support cooperative radio capability built c-ran architecture also enables many advanced algorithms hard implement cellular networks including cooperative multi-point transmission/receiving network coding etc october 2011 wireless world research forum 27 hosted germany china mobile invited give c-ran presentation august 2012 ieee c-ran 2012 workshop hosted kunming china crc press published book green communications theoretical fundamentals algorithms applications 11th chapter c-ran green ran framework december 2012 ieee globalcom 2012 conference international workshop cloud based-stations large-scale cooperative communications hosted california usa european committee frame project 7 sponsors currently addressing many problems related cellular network architecture evolution many projects taken c-ran one future cellular network architectures like mobile cloud network project | [
1592,
3724,
7189
] | Validation |
6,826 | 9 | HP-GL:hp-gl hp-gl short hewlett-packard graphics language often written hpgl printer control language created hewlett-packard hp hp-gl primary printer control language used hp plotters introduced plotter hp-8972 1977 became standard almost plotters hewlett-packard printers also usually support hp-gl/2 addition pcl language formed series two letter codes mnemonics followed optional parameters instance arc drawn page sending string codice_1 means arc absolute parameters place center arc absolute coordinates 100,100 page starting angle 50 degrees measured counter-clockwise fourth optional parameter used specifies far arc continues defaults 5 degrees first introduced hp-gl contained following commands formats typical hp-gl files start setup commands followed long string graphics commands file ascii text file format instance coordinate system based smallest units one hp plotters could support set 25 µm i.e 40 units per millimeter 1016 per inch coordinate space positive negative floating point numbers specifically ±2 original hp-gl language support definition line width parameter determined pens loaded plotter advent first inkjet plotters line width pens specified within hp-gl files set printer would know line width print pen cumbersome error-prone process hewlett-packard graphics language/2 aka hp-gl/2 definition line width introduced language allowed elimination step also among improvements binary file format defined allowed smaller files shorter file transfer times minimal resolution reduced.. hp-gl related agl graphics language extension basic programming language agl implemented hewlett-packard minicomputers simplify controlling plotter agl commands describe desired graphics plotting function computer relays several hp-gl instructions plotter | [
4609,
7745,
3764,
4780,
6016,
6091
] | Test |
6,827 | 0 | Semantic_parsing:semantic parsing semantic parsing task converting natural language utterance logical form machine-understandable representation meaning semantic parsing thus understood extracting precise meaning utterance applications semantic parsing include machine translation question answering code generation phrase first used 1970 yorick wilks basis machine translation programs working semantic representations shallow semantic parsing concerned identifying entities utterance labelling roles play shallow semantic parsing sometimes known slot-filling frame semantic parsing since theoretical basis comes frame semantics wherein word evokes frame related concepts roles slot-filling systems widely used virtual assistants conjunction intent classifiers seen mechanisms identifying frame evoked utterance popular architectures slot-filling largely variants encoder-decoder model wherein two recurrent neural networks rnns trained jointly encode utterance vector decode vector sequence slot labels type model used amazon alexa spoken language understanding system deep semantic parsing also known compositional semantic parsing concerned producing precise meaning representations utterances contain significant compositionality shallow semantic parsers parse utterances like show flights boston dallas classifying intent list flights filling slots source destination boston dallas respectively however shallow semantic parsing parse arbitrary compositional utterances like show flights boston anywhere flights juneau deep semantic parsing attempts parse utterances typically converting formal meaning representation language early semantic parsers used highly domain-specific meaning representation languages later systems using extensible languages like prolog lambda calculus lambda dependency-based compositional semantics λ-dcs sql python java alexa meaning representation language abstract meaning representation amr work used exotic meaning representations like query graphs semantic graphs vector representations modern deep semantic parsing models either based defining formal grammar chart parser utilizing rnns directly translate natural language meaning representation language examples systems built formal grammars cornell semantic parsing framework stanford university semantic parsing execution sempre word alignment-based semantic parser wasp datasets used training statistical semantic parsing models divided two main classes based application used question answering via knowledge base queries used code generation standard dataset question answering via semantic parsing air travel information system atis dataset contains questions commands upcoming flights well corresponding sql another benchmark dataset geoquery dataset contains questions geography u.s. paired corresponding prolog overnight dataset used test well semantic parsers adapt across multiple domains contains natural language queries 8 different domains paired corresponding λ-dcs expressions popular datasets code generation include two trading card datasets link text appears cards code precisely represents cards one constructed linking card texts java snippets linking hearthstone card texts python snippets ifttt dataset uses specialized domain-specific language short conditional commands django dataset pairs python snippets english japanese pseudocode describing robocup dataset pairs english rules representations domain-specific language understood virtual soccer-playing robots | [
2558,
2648,
1209,
5965,
7389,
8065,
7340,
5008
] | Test |
6,828 | 7 | Distributed_manufacturing:distributed manufacturing distributed manufacturing also known distributed production cloud producing local manufacturing form decentralized manufacturing practiced enterprises using network geographically dispersed manufacturing facilities coordinated using information technology also refer local manufacture via historic cottage industry model manufacturing takes place homes consumers within maker movement diy culture small scale production consumers often using peer peer resources referred distributed manufacturing consumers download digital designs open design repository website like youmagine thingiverse produce product low costs distributed network 3d printing services 3d hubs home open-source 3-d printer reprap primary attribute distributed manufacturing ability create value geographically dispersed locations via manufacturing example shipping costs could minimized products built geographically close intended markets also products manufactured number small facilities distributed wide area customized details adapted individual regional tastes manufacturing components different physical locations managing supply chain bring together final assembly product also considered form distributed manufacturing digital networks combined additive manufacturing allow companies decentralized geographically independent distributed production cloud manufacturing call attention conjunction commons-based peer production distributed manufacturing techniques self-reinforced fantasy system eternal growth overcome development economies scope civil society play important role contributing raising whole productive structure higher plateau sustainable customised productivity true many issues problems threats rise due large democratization means production especially regarding physical ones instance recyclability advanced nanomaterials still questioned weapons manufacturing could become easier mention implications counterfeiting intellectual property might maintained contrast industrial paradigm whose competitive dynamics economies scale commons-based peer production distributed manufacturing could develop economies scope advantages scale rest cheap global transportation economies scope share infrastructure costs intangible tangible productive resources taking advantage capabilities fabrication tools following neil gershenfeld “ least developed parts world need advanced technologies ” commons-based peer production distributed manufacturing may offer necessary tools thinking globally act locally response certain problems needs well supporting individual personal manufacturing social economic benefits expected result development local production economies particular humanitarian development sector becoming increasingly interested distributed manufacturing overcome supply chain challenges last mile distribution | [
7770
] | Validation |
6,829 | 0 | Julius_(software):julius software julius speech recognition engine specifically high-performance two-pass large vocabulary continuous speech recognition lvcsr decoder software speech-related researchers developers perform almost real-time computing rtc decoding current personal computers pcs 60k word dictation task using word trigram 3-gram context-dependent hidden markov model hmm major search methods fully incorporated also modularized carefully independent model structures various hmm types supported shared-state triphones tied-mixture models number mixtures states phones standard formats adopted cope free modeling toolkit main platform linux unix workstations works windows julius free open-source software released revised bsd style software license julius developed part free software toolkit japanese lvcsr research since 1997 work continued continuous speech recognition consortium csrc japan 2000 2003 rev.3.4 grammar-based recognition parser named julian integrated julius julian modified version julius uses hand-designed type finite-state machine fsm termed deterministic finite automaton dfa grammar language model used build kind voice command system small vocabulary various spoken dialog system tasks run julius recognizer needs language model acoustic model language julius adopts acoustic models hidden markov model toolkit htk ascii format pronunciation dictionary htk-like format word 3-gram language models arpa standard format forward 2-gram reverse 3-gram trained speech corpus reversed word order although julius distributed japanese models voxforge project working create english acoustic models use julius speech recognition engine recently april 2018 thanks effort mozilla foundation 350 hours spoken english audio corpus made available new english envr-v5.4 open source speech model released alongside polish plpl-v7.1 models available sourceforge | [
1314,
6489,
4759,
4349,
5571,
578,
4442,
7372,
1435,
2832,
6367
] | Test |
6,830 | 3 | Sound_Blaster_X-Fi:sound blaster x-fi sound blaster x-fi lineup sound cards creative technology sound blaster series series launched august 2005 lineup pci sound cards served introduction x-fi audio processing chip models ranging xtrememusic lower end platinum fatal1ty fps elite pro top range top-end elite pro model aimed musicians bundled x-fi external i/o box offering phono preamp inputs turntables high-impedance input guitars inch mic input headphone output line-in full size midi i/o well optical rca coaxial digital inputs outputs remote control platinum fatal1ty fps models offer front-panel drive-bay control unit remote control base model supplied without accessories top model claimed 109 db signal-to-noise ratio elite pro model uses higher-end dac 116 db claimed bottom two models feature 2 mb onboard x-ram top models offer 64 mb x-ram designed use games store sound samples improved gaming performance launch reviews support creative claims higher performance however even top-end 64 mb equipped model falling slightly behind older audigy cards october 2006 saw minor rebranding x-fi xtrememusic edition fact highly capable gaming card offers hardware decoding eax support replaced xtremegamer model revised model featured half-width pcb non-gold-plated connectors optical instead digital digital i/o module jack lacked connector users wishing purchase separate x-fi i/o box functionality otherwise market segment occupied xtrememusic moved downwards introduction cheaper 'xtreme audio 'xtreme audio notebook products despite x-fi label products x-fi line using emu20k1 chip ca20k1 older chip similar audigy se sb live cards ca0106-wbtlf thus lacking hardware acceleration 3d sound eax sound effects gaming content creation features i/o extensibility x-fi models new product introduced x-fi 'xtremegamer fatal1ty pro identical function fatal1ty fps made affordable unbundling i/o panel remote control 2007 creative technology unveiled pci express x1 expresscard/34 versions sound blaster x-fi xtreme audio consumer electronics show creative yet release pcie versions emu-based x-fi cards adapting ca20k1 chip pcie proved troublesome company reporting design difficulties latency problems delays 2008 x-fi titanium series announced using revised ca20k2 chip featured integraded risc processor safeguarding pcie-induced latencies ddr sdram interface place sdram integrated high definition audio architecture uaa component products included fatal1ty cards 64 mb x-ram optional i/o drive bay regular titanium 16 mb x-ram 109 db snr spec former unlike pci cards cards use software-based dolby digital live 5.1 encoding 2010 titanium hd added lineup featuring new dac 122 db snr rca audio outputs dropping support windows xp addition pci pcie internal sound cards creative also released external usb-based solution named x-mod november 2006 x-mod listed category rest x-fi lineup stereo device marketed improve music playing laptop computers lower specifications internal offerings external products use x-fi name include usb-based sound blaster x-fi hd sound blaster x-fi surround 5.1 pro sound blaster x-fi go pro internal hardware components different various usages needs gaming surround audiophile standards audio processor x-fi powerful time release offering extremely robust sample rate conversion src engine addition enhanced internal sound channel routing options greater 3d audio enhancement capabilities significant portion audio processing unit devoted resampling engine src engine far capable previous creative sound card offerings limitation major thorn creative side digital audio sampled 44.1 khz standard doubt related cd-da sound cards often designed process audio 48 khz 44.1 khz audio must resampled 48 khz creative previous cards dsps operated 48 khz audio dsp able process affect poor resampling implementation introduces artifacts audio heard measured higher intermodulation distortion within higher frequencies generally 16 khz x-fi resampling engine produces near-lossless-quality result far exceeding known audio card dsp available time release functionality used simple audio playback several features card technology claims improve clarity digital music digital analysis supported x-fi models including xtreme audio x-mod sound blaster x-fi presents following features usually implemented aid x-fi dsp software xtreme audio model since release x-fi caused several unsolved problems sound glitches various motherboards creative labs states primary function restore portions sound lost compression compression meant digital file-size reduction achieved digital audio data compression technologies like example mp3 rather idea reverse effects dynamic range compression analog technique used production 1990s newer audio cds exception classical music recordings make sound louder volume level setting found subjectively louder cds get airplay sell better achieve loudness without introducing strong distortion points signal volume reaches maximum compressed means case reduced volume whole signal multiplied factor maximum volume reached music whole louder maximum volume points mostly transients pronounced since whole process done final audio cd recorded effect equally present uncompressed audio files created cd lossless compressed audio made cd well lossy compressed audio cd transients typically found percussive sounds plosive consonants voice recordings first milliseconds so-called attack phase non-percussive instrument sounds tend somewhat muffled dynamic range compression undo effect uses multiband compander compressor/expander dynamically adjusted compression/expansion main function detect transients increase relative volume level consequence enabling signal altered whether result improves upon input audio purely matter perception depend type audio played cmss-3d recreates realistic surround sound audio source puts right center action whether using multichannel speakers headphones cmss-3d dsp feature provides audio enhancement requires creative proprietary drivers supported linux os depending equipment used cmss-3d 3 variants enabling setting apply special filtering algorithms order improve localization sound sources located close listener enabling setting apply special filtering algorithms order improve localization sound sources located listener environmental audio extensions designed enabled game developers within game enhance simulated-reality user experiencing example ringing game-world swords sound differently depending whether protagonist currently game-world temple vault game-world open field also 8 built-in eax effects enabled user smart volume management compressor evens dynamic range given source quieter sounds louder loud sounds quiet best used circumstances noise disturbance might issue late night instance otherwise generally preferable disabled render sound less dynamic instance lessening impact loud parts movies also making music sound less lively function divides music ten frequency bands adjusted using sliders multiple volume adjustments different inputs outputs system master volume affects settings default recommended value 50 sources actually equates 0 db amplification none 100 value causes 16 db amplification many creative previous sound cards x-fi supports soundfonts additionally audio creation mode card allows use eax midi playback via use controllers setting controls dd sound encoder setting dolby digital bitstream dts sound instead although creative slow embrace 64-bit drivers x-fi lineup x86-64 architecture based operating systems supported microsoft windows 7 includes basic driver support many x-fi series cards many x-fi features however require software applications provided creative order utilize full capabilities hardware september 24 2007 creative labs released closed source unsupported beta driver providing linux 64-bit os support following sound blaster x-fi series sound cards open-source driver available oss v4 build 1013 datasheets provided creative enable alsa driver development november 6 2008 creative finally released driver gpl license supports x86 well x86-64 architectures listed support area may 15 2009 communications creative suse developer takashi iwai finally got mergeable version x-fi driver august 31 2009 driver snd-ctxfi included release alsa 1.0.21 support creative sound blaster x-fi titanium hd added january 25 2012 alsa v1.0.25 release driver support i/o front panel ir documentation part missing xtreme audio different chipset stayed unsupported longer time currently supported advanced linux alsa driver modules might require installation additional packages alternative repositories x-fi mb pure software solution windows system requirement thus provide linux support entry-level model x-fi series sound blaster x-fi xtreme audio actually emu20k1 chip re-branded audigy se using family chips ca0106-wbtlf even drivers thus x-fi–related processing performed software also lacks basic hardware acceleration like sb live 24-bit audigy se budget soundblaster models x-fi xtreme audio use drivers rest x-fi family lacks asio games recognize x-fi capable hardware device hardware profile resembles older live audigy cards x-fi mb software solution enables basic x-fi features computers integrated audio x-fi device requires degree driver support audio hardware manufacturer x-fi mb commonly bundled motherboards computer systems comparable x-fi xtremeaudio bundled asus asrock motherboards x-fi mb sold x-fi supreme fx actually standard analog devices integrated hd audio codec paired x-fi mb x-fi features implemented entirely software hardware vendors sell x-fi mb solution simply sound blaster x-fi integrated sound x-fi mb available different versions e.g x-fi mb x-fi mb2 x-fi mb3 x-fi mb5 current version available select laptops desktops x-fi mb5 non-oem version x-fi mb3 sold creative labs works compatible motherboard sound chips realtek x-fi mb3 provides effective software version full x-fi card also provided version alchemy works non-creative sound cards restore legacy eax effects | [
1659,
4879,
5459,
2680,
1670,
415,
4479,
5970,
6014,
7228,
3319
] | Test |
6,831 | 4 | GingerMaster:gingermaster gingermaster malware affects android operating system version 2.3 first detected august 2011 gingermaster android malware contains root exploit packaged within infected app application launched android device acquires root privileges device accesses sensitive data gingermaster steals data | [
624,
5401,
1787,
1582
] | Test |
6,832 | 4 | Backup_(software):backup software backup backup utility made apple mac os x available apple mobileme formerly .mac collection internet services backup used connection either user online mobileme idisk macintosh cd-rw dvd-r drive make safe archival copies critical files folders release icloud backup longer available release macos sierra longer works initial versions backup regarded feature-sparse frequently unstable however november 5 2003 apple released backup 2.0 added new features offered greater reliability predecessors backup 2 allowed creation archive copies important data overall basic feature set backup software apple introduced backup 3 paris expo september 20 2005 along upgrades .mac version offered backup settings ability back mail databases 2006 worldwide developers conference apple announced development time machine new backup application included mac os x v10.5 leopard time machine complete backup solution thus ability completely replace backup general backup solution mac users mobileme released july 11 2008 .mac discontinued backup continued available mobileme users software re-branded mobileme backup version 3.2 release | [
8051,
2627,
7609,
3940,
7335,
713,
6342,
5109,
3445,
2284,
997,
2390,
569,
1187,
4690,
5571,
6188,
734,
7000,
1562,
6909,
6548,
6289,
502,
6557,
6295,
2679,
4975,
3989,
2597,
6565,
2145,
3322,
2880,
1502,
163,
3151,
6582,
5786,
4740,
18... | Test |
6,833 | 2 | WiperSoft:wipersoft wipersoft anti-spyware program developed wiper software designed help users protect computers threats adware browser hijackers worms potentially unwanted programs pups currently available microsoft windows wipersoft launched 2015 available free program home users users able use scan removal functions without buy subscription 2016 re-released new modern design improved detection removal functionalities user-friendly interface year wipersoft also became paid program wipersoft saw big increase downloads sales 2017 reportedly used 1 million users 120 different countries tested softpedia 2017 rated 100 clean wipersoft primarily anti-spyware program comes two versions free wipersoft offers users scan computers spyware paid wipersoft features include spyware detection removal help desk services custom fix according wiper software program detect remove threats like potentially unwanted programs adware browser hijackers questionable toolbars browser add-ons detected potential threats automatically deleted users option keeping installed program also undo changes made detected threats change homepage default search engine program currently available microsoft windows users popular browsers google chrome mozilla firefox internet explorer opera supported program also available 10 languages | [
5984,
4759,
5571
] | Test |
6,834 | 7 | Digital_transaction_management:digital transaction management digital transaction management dtm category cloud services designed digitally manage document-based transactions dtm removes friction inherent transactions involve people documents data create faster easier convenient secure processes dtm goes beyond content document management include e-signatures authentication non-repudiation enabling co-browsing customer business document transfer certification secure archiving goes beyond records management variety meta-processes around managing electronic transactions documents associated dtm standards proposed managed xdtm standard association aragon research estimated ye 2016 70 large enterprises dtm initiative underway fully implemented | [
2961
] | Train |
6,835 | 2 | Software_appliance:software appliance software appliance software application combined enough operating system jeos run optimally industry-standard hardware typically server virtual machine software distribution firmware implements computer appliance virtual appliances subset software appliances main distinction packaging format specificity target platform virtual appliance virtual machine image designed run specific virtualization platform software appliance often packaged generally applicable image format e.g. live cd supports installations physical machines multiple types virtual machines installing software appliance virtual machine packaging image creates virtual appliance software appliances several benefits traditional software applications installed top operating system software appliance packaged virtual machine format virtual appliance allowing run within virtual machine container virtual appliance could built using either standard virtual machine format open virtualization format ovf format specific particular virtual machine container example vmware virtualbox amazon ec2 software appliance packaged live cd image allowing run real hardware addition types virtual machines allows developers avoid complexities involved supporting multiple incompatible virtual machine image formats focus lowest common denominator instead i.e. iso images supported virtual machine platforms commercial software appliances typically sold subscription service pay-as-you-go alternative approach software service customers receive service maintenance application vendor eliminating requirement manage multiple maintenance streams licenses service contracts cases application vendor may install software appliance piece hardware prior delivery customer thereby creating computer appliance cases primary value customer remains simplicity purchase deployment maintenance | [
6528,
5342,
2746,
5571,
3130,
1699,
7969,
330,
6661,
788
] | Test |
6,836 | 2 | Billix:billix billix live usb live cd supports multiple linux distributions including several special purpose distributions billix designed toolkit unix linux system administrators configured supports several distributions also following programs included | [
4496,
3751,
578,
5232,
3271,
788
] | Test |
6,837 | 4 | WAP_billing:wap billing wap billing mechanism consumers buy content wireless application protocol wap sites charged directly mobile phone bill alternative payment mechanism debit credit cards premium sms billing using wap billing consumers buy mobile content without registering service entering username password user clicks link agrees make purchase download content wap billing particularly associated downloading mobile entertainment content like ringtones mobile games wallpapers commentators suggested could compete premium sms leading payment channel mobile content wap billing works wap-enabled mobile phones gprs 3g wireless connection customer initiates wap session content service provider browsing wap page example wap site hoster obtains visitor ’ msisdn without visitor register specific wap gateway service information provided integration operator msisdn lookup service consumers confirm purchase clicking ‘ confirm purchase ’ link mobile phone wap billing platform informs wap application completed purchase transaction consumers redirected content purchased purchases recorded billed directly via mobile phone bill using msisdn attempts made create single cross-operator wap billing platform support purchase products mobile network markets like ireland wap billing available across o2 vodafone mobile operators via msidsn forwarding wap billing available mobile aggregators operating irish market case case business model basis unlike uk market benefits cited wap billing include ability sell minors lack credit card bank account improved customer experience including ‘ single click ’ purchases transactions completed without consumers send receive text message remember shortcodes claimed wap billing also reduces possibility fraud paying mobile content another benefit cited wap billing assertion users experience ‘ browse buy ’ experience used via pc internet wap billing lacks transparency customer act signing contract handing money human reading understanding writing least typing something thus also indirectly proving legitimate customer reduced single touch even child pet occasionally touches screen may trigger purchase often customer n't notice 've actually paid something bought subscription look phone bill afterwards silently start billing single click inviting malicious apps malicious embedded ads misuse wap billing form clickjacking triggered hard stop cancel payment normally three entities involved claim money thus service indirectly paid phone bill makes complicated deny payment claim money back 2013 federal trade commission settled jesta digital llc concerning unauthorized wap billing charges | [
4101
] | Test |
6,838 | 2 | IBM_Basic_Programming_Support:ibm basic programming support ibm basic programming support/360 bps originally called special support set standalone programs system/360 mainframes minimum 8 kib memory bps developed ibm general products division endicott new york package included assemblers iocs compilers sorts utilities governing control program bps components introduced series product announcements 1964 1965 bps came two versions — strictly card system tape based system contrary stated goals kept small supervisor permanently resident programming languages available assembler rpg fortran iv subset tape fortran required 16 kib memory also two versions bps assembler tape version enhanced capabilities bps also disk counterpart called bos also required 8 kib memory supported disks ibm 2311 group responsible bps/bos went develop dos/360 tos/360 supposed interim solution became evident os/360 would large run 16 kib systems | [
839,
607,
958,
7331,
5571,
7003,
2803
] | Test |
6,839 | 2 | List_of_Xbox_Live_games_on_Windows_10:list xbox live games windows 10 list xbox live enabled games windows 10 currently planned released windows 10 operating systems windows store application first wave windows 10 xbox games announced xbox wire march 2015 xbox live enabled games windows 10 made available windows store order released windows 10 xbox live enabled game developer needs member id xbox xbox live enabled titles identifiable marketplace green banner running across top game page icon reads xbox live | [
3076,
8054,
3937,
4759,
7619,
8073,
8076,
5563,
5822,
6110,
3028,
6294,
7660,
7848,
239,
8118,
522,
432,
6054,
4011,
786,
2085
] | Test |
6,840 | 2 | Dynamic_Data_Exchange:dynamic data exchange computing dynamic data exchange dde technology interprocess communication used early versions microsoft windows os/2 dde allowed programs manipulate objects provided programs example cell embedded microsoft excel spreadsheet respond user actions affecting objects internally dde implemented terms windows message-passing architecture left vulnerable malformed third-party programs dde partially superseded object linking embedding ole currently maintained windows systems sake backwards compatibility dynamic data exchange first introduced 1987 release windows 2.0 method interprocess communication one program could communicate control another program somewhat like sun rpc remote procedure call time method communication operating system client applications windows messaging layer dde extended protocol allow peer-to-peer communication among client applications via message broadcasts dde runs via message broadcasts vulnerable window-management code pump messages problem considered design dde dde predates pre-emptive multitasking moreover code managing window handle respond dde broadcast initiator dde must distinguish expected unexpected responses dde interlocutors usually express information seek terms hierarchical string keys example cell microsoft excel known dde application name application could organize information groups known topic topic could serve individual pieces data item example user wanted pull value microsoft excel contained spreadsheet called book1.xls cell first row first column application would excel topic book1.xls item r1c1 internal changes cell due excel actions would signaled reverse calling application via additional message broadcasts common use dde custom-developed applications control off-the-shelf software example custom in-house application might use dde open microsoft excel spreadsheet fill data opening dde conversation excel sending dde commands feature mainly superseded component object model suite technologies microsoft used dde internally since release windows 95 example excel exposes extensive ole automation object model recommended method communicating excel technique however still use particularly distribution financial data dde also primary method interprocess communication internals sas programming language dde require operating system components conventional windows gui program also little-used alternative programs seeking minimize dependencies wonderware developed extension dde called netdde could used initiate maintain network connections needed dde conversations dde-aware applications running different computers network transparently exchange data dde conversation interaction client server applications netdde could used along dde dde management library ddeml applications codice_1 netdde library files microsoft licensed basic netbios frames protocol version product inclusion various versions windows windows workgroups windows xp addition wonderware also sold enhanced version netdde customers included support tcp/ip technology extensively used scada field basic windows applications using netdde clipbook viewer winchat microsoft hearts netdde still included windows server 2003 windows xp service pack 2 although disabled default removed entirely windows vista however prevent existing versions netdde installed functioning later versions windows | [
7149,
6420,
714,
720,
1460,
2928,
7907,
5747,
2953,
422,
5784,
4017,
6504,
447,
4022,
4026,
7607,
1526,
3687,
1161,
4759,
2283,
5479,
7263,
5850,
150,
6933,
519,
3052,
4448,
3407,
1232,
2702,
7687,
1989,
4848,
4129,
5910,
8073,
2018,
80... | Validation |
6,841 | 2 | SDSF:sdsf system display search facility sdsf component ibm mainframe operating system z/os interactive user interface allows users administrators view control various aspects mainframe operation system resources information displayed sdsf includes batch job output unix processes scheduling environments status external devices printers network lines sdsf primarily used access batch system log files dumps field-developed program offering sdsf known spool display search facility word spool changed system became program product late 1980s z/os release 9 sdsf supports rexx interface allowing batch programs use sdsf facilities support includes stem variables containing sdsf-originated information prior z/os release 10 sdsf supported use jes2 jes3 although isv products phoenix software international tone software available similar functionality jes3 beyond z/os release 10 sdsf fully supports jes3 including new commands jds ods display data/sets job output jes3 jobs release z/os v1r13 sdsf came packed interesting features like cursor sensitive sort point shoot sort extensive support oper logs rexx java programmed environments sdsf organized collection panels panel displays information specific aspect mainframe operations panels currently provided st panel sdsf supports following commands batch job commands translated jes2 jes3 command performs desired function | [
2769,
5571,
4673,
3201
] | Test |
6,842 | 4 | Secure_Computing_Corporation:secure computing corporation secure computing corporation scc public company developed sold computer security appliances hosted services protect users data mcafee acquired company 2008 company also developed filtering systems used governments iran saudi arabia blocks citizens accessing information internet 1984 research group called secure computing technology center sctc formed honeywell minneapolis minnesota centerpiece sctc work security-evaluated operating systems nsa work included secure ada target sat logical coprocessing kernel lock designed meet stringent a1 level trusted computer systems evaluation criteria tcsec next several years secure computing morphed small defense contractor commercial product vendor largely investment community much less interested purchasing security goods defense contractors commercial product vendors especially vendors growing internet space secure computing became publicly traded company 1995 following pattern internet-related startups stock price tripled first day opened 16 share closed 48 price peaked around 64 next several weeks collapsed following year ranged roughly 3 20 afterward company purchased mcafee company headquarters moved san jose california 1998 though bulk workforce remained twin cities roseville employees completed move st. paul minnesota february 2006 several sites exist largely result mergers secure computing consisted several merged units one oldest enigma logic inc. started around 1982 bob bosen founder claims created first security token provide challenge-response authentication bosen published computer game trs-80 home computer 1979 called 80 space raiders used simple challenge response mechanism copy protection people used mechanism encouraged repackage remote authentication bosen started enigma logic filed patents 1982–83 patent issued united kingdom 1986 ultimately challenge portion challenge response eliminated produce one-time password token similar securid product enigma logic merged secure computing corporation 1996 secure computing acquired smartfilter product line purchasing webster network strategies producer webtrack product 1996 acquisition included domain name webster.com eventually sold publishers webster dictionary shortly acquiring webster/smartfilter product secure computing merged border network technologies canadian company selling borderware firewall border network technologies boasted excellent product highly developed set sales channels said sales channels major inducement merger although plan completely merge borderware product sidewinder offer single product existing users products never quite succeeded 1998 borderware business unit sold new company borderware technologies inc. formed one original borderware founders time mergers yielded highly distributed company offices minnesota florida california two three ontario proved unwieldy company scaled back offices minnesota california 2002 company took gauntlet firewall product network associates 2003 secure computing acquired n2h2 makers bess web filtering package consolidation bess smartfilter bess referred smartfilter bess edition company literature acquisition cyberguard announced august 2005 approved january 2006 year earlier cyberguard attempted acquire secure computing proposal rejected largest merger secure computing time resulted addition several product lines including three classes firewalls content protocol filtering systems enterprise-wide management system controlling products several offices also added including cyberguard main facility deerfield beach florida well webwasher development office paderborn germany snapgear development office brisbane australia 2006 company merged atlanta-based ciphertrust developer email security solutions merger announced july 2006 completed august 2006 july 30 2008 secure computing announced intention sell safeword authentication product line aladdin knowledge systems leaving company business focused web/mail security firewalls sale concluded later year september 22 2008 mcafee announced intention acquire secure computing acquisition completed long afterwards combined company formed world largest dedicated security company time trustedsource reputation system secure computing obtained part ciphertrust acquisition key technology company enabling product lines global intelligence capability based behavioral analysis traffic patterns company email web firewall devices hosted services well numerous oem partners trustedsource derived real-time reputation scores ips urls domains mail/web content based variety data mining/analysis techniques support vector machine random forest term-frequency inverse-document frequency tfidf classifiers company flagship web security product line secure web appliance formerly known webwasher provided anti-malware protection trustedsource reputation-enabled url filtering controls content caching ssl scanning capabilities june 2008 secure computing launched secure web protection service in-the-cloud hosted web security service provided similar set features secure web appliance without requiring on-premises equipment software company flagship email security product line secure mail appliance formerly known ironmail provided trustedsource reputation-enabled anti-spam data-leakage protection dlp encryption anti-malware capabilities company flagship firewall product formerly known sidewinder renamed mcafee firewall enterprise mcafee sold sidewinder forcepoint january 2016 years secure computing antecedent organizations offered following major lines firewall products sidewinder firewall incorporated technical features high-assurance lock system including type enforcement technology later applied selinux however interaction secure computing open source community spotty due company ownership patents related type enforcement sidewinder never really tried achieve a1 tcsec rating earn eal-4+ common criteria rating along sidewinder gauntlet one earliest application layer firewalls developed large customer base united states department defense gauntlet originally developed trusted information systems tis commercial version tis firewall toolkit early open source firewall package developed darpa contract opennet initiative studied filtering software used governments block access citizens found secure computing smartfilter program heavily used iranian saudi governments according secure computing use software iran without consent—u.s sanctions prohibit american companies dealings iran—and 2005 company said actively working stop illegal use response company jonathan zittrain co-director harvard law school berkman center internet society stated fact remains software use extended period time 've seen secure computing software turn iran 've seen saudi arabia well 2001 new york times reported secure computing one ten companies competing saudi government contract software block citizens access websites deemed offensive company already deal saudis due expire 2003 defense secure computing always stated control customers use product sold according opennet initiative 2007 report saudi government censorship extensively covers religious social content though sites relating opposition groups regional political human rights issues also targeted governments united arab emirates oman sudan tunisia also actively use smartfilter tunisian government goes far redirect blocked pages fake error 404 page hide fact blocking software used tunisian government generally recognized poor record comes right free expression | [
3838,
6256,
7522,
3357,
2467,
7818,
2746,
578,
496,
2488,
6208,
6039,
1130,
2879,
4091,
689,
5700,
1805
] | Test |
6,843 | 7 | Cvent:cvent cvent inc. privately held software-as-a-service saas company specializes market-leading meetings events hospitality management technology company offers web-based software meeting site selection online event registration event management email marketing web surveys company owned private equity firm vista equity partners cvent founded september 1999 reggie aggarwal year received 17 million venture capital grew staff 125 employees following dot-com bubble burst september 11 attacks cvent faced near-bankruptcy forced cut 80 staff company became profitable 2003 2011 cvent growing 50 year received 136 million funding new enterprise associates july 2011 time largest investment u.s. software company since 2007 june 13 2012 cvent announced acquisition austin-based startup crowdtorch previously known seed labs 4.2 million seven days later announced acquisition portland-based application developer crowdcompass 10 million cvent filed s-1 u.s. securities exchange commission july 8 2013 proposing initial public offering 5.6 million shares went public new york stock exchange august 9 2013 initial price 21 company raised 117.6 million received market capitalization billion dollars ipo referenced regards use jobs act enabled company quickly offer ipo 2016 company acquired venture capital company vista equity partners usd 1.65 billion ashok trivedi co-founder mastech digital igate early investor company june 5 2018 cvent announced acquired kapow online booking platform venues experiences june 10 2019 cvent announced acquired mobile event technology provider doubledutch july 2000 cvent introduced first saas product web-based tool event planners manage invitations collect registration fees 2006 introduced product conducting online surveys followed introduction cvent supplier network two years later supplier network free online marketing place connects meeting planners venues services 2009 company began offering professional services app development tool crowdtorch launched 2009 cvent also produces destination guide free online 8,000-page travel guide designed meeting planners information 800 different destinations strategic meetings management helps users manage budgets | [
2282
] | Test |
6,844 | 6 | Special_folder:special folder microsoft windows special folder folder presented user interface abstract concept instead absolute folder path synonymous term shell folder sometimes used instead special folders make possible application ask operating system appropriate location certain kinds files found independently version user language windows used windows server 2003 earlier folder like start menu different name non-english versions windows example german versions windows xp startmenü however starting windows vista versions windows use english named folders display different names windows explorer windows 10 user switch another display language names special folders change windows uses concept special folders present contents storage devices connected computer fairly consistent way frees user deal absolute file paths often change operating system versions even individual installations idea evolved time new special folders added every version windows post introduction windows 95 microsoft compatible windows software logo requires application make use special folders locations locate appropriate folders documents application settings stored special folder either reference physical file system directory reference virtual folder former case analogous environment variables — fact many environment variables set user session defined special folders set point virtual folders actually exist file system instead presented windows explorer tree folders user navigate known shell namespace windows xp systems root namespace desktop virtual folder contains documents computer network places network neighborhood windows 95 98 recycle bin virtual folders virtual folders like desktop accompanying special folder reference directory physical file system windows explorer displays combined contents virtual folder associated file system folder user seen figure 1 shows folder view windows xp explorer desktop virtual folder four standard virtual folders seen well additional folder folder desktop real folder located desktop directory user profile third-party programs add virtual folders windows explorer following tables list file system virtual folders available windows vista os version special folder introduced given well items like userprofile windir windows environment variables notes notes | [
7879,
3937,
3263,
378,
2198,
6096,
1475,
7553,
7195,
5410,
7564,
2953,
422,
2245,
435,
5442,
4377,
5090,
3340,
7602,
6164,
4759,
1534,
6885,
7619,
2999,
5475,
6528,
2290,
4774,
1181,
5480,
3711,
5134,
7272,
1571,
5850,
140,
6558,
6575,
... | Validation |
6,845 | 2 | BLIS/COBOL:blis/cobol blis/cobol discontinued operating system unusually written cobol system gain reasonably wide acceptance optimised compile business applications written cobol blis available range data general nova data general eclipse 16-bit minicomputers marketed information processing inc. ipi regularly exhibited product national computer conference 1970s 80s priced us 830 10,000 depending number supported users features 1977 ipi boasted 100 operational installations system worldwide 1985 version ibm pc existed called pc-blis originally operating systems written assembly language particular processor family processors non-assembler operating systems comparatively slow easier revision repair one reasons c programming language low-level features resemble assembly language ways early intent use writing operating systems similar goals led ibm development pl/s high-level nature cobol created problems operating system development partially addressed blis since deliberately optimized cobol | [
336,
1361,
1522,
4544,
5571,
1237,
1435
] | Test |
6,846 | 9 | Charles_Brenner_(mathematician):charles brenner mathematician charles hallam brenner american mathematician originator forensic mathematics father joel lee brenner professor mathematics mother frances hallam brenner city councilor briefly mayor palo alto california uncle charles brenner md psychiatrist brenner received b.s stanford university 1967 ph.d. university california los angeles ucla 1984 brenner participated implementation apl\360 apl\1130 implemented transpose rotate primitive functions recently brenner specializes use mathematics dna analysis principal areas interest achievement mathematics forensic dna kinship rare haplotype matching dna mixtures couple haplotype papers recently showed haplotypes must much rarer much rarer sample frequency reference population sample brenner ’ symbolic kinship program example assess identification evidence based dna profiles anonymous body arbitrary set presumed relatives widely used mass victim identification projects including identifying 1/3 identified world trade center bodies brenner played key role resolution larry hillblom inheritance case resulting four amerasian children receiving 50 million | [
1243,
811,
6263,
470,
3464,
6285,
752,
5322,
1774,
1308,
7758,
8137,
3060,
1892,
6064,
356
] | Validation |
6,847 | 2 | IPod_Touch_(6th_generation):ipod touch 6th generation sixth-generation ipod touch stylized marketed ipod touch colloquially known ipod touch 6g ipod touch 6 ipod touch 2015 ipod 6 multipurpose handheld device designed marketed apple inc. touchscreen-based user interface successor ipod touch 5th generation becoming first major update ipod lineup two half years released online apple store july 15 2015 along minor upgrades ipod nano ipod shuffle ipod touch 6th generation officially discontinued apple may 28 2019 release successor ipod touch 7th generation support end 6th generation long discontinuation incompatible ios 13 sixth-generation ipod touch features ios apple mobile operating system user interface ios based concept direct manipulation using multi-touch gestures interface control elements consist sliders switches buttons interaction os includes gestures swipe tap pinch reverse pinch specific definitions within context ios operating system multi-touch interface internal accelerometers used applications respond shaking device one common result undo command rotating vertically one common result switching portrait landscape mode sixth-generation ipod touch ships ios 8.4 released june 30 2015 along apple music play music movies television shows audiobooks podcasts sort media library songs artists albums videos playlists genres composers podcasts audiobooks compilations scrolling achieved swiping finger across screen alternatively headset controls used pause play skip repeat tracks however earpods come sixth-generation ipod touch include remote microphone voice control feature also used identify track play songs playlist specific artist create genius playlist sixth-generation ipod touch supports ios 9 released september 2015 ios 10 released september 2016 ios 11 released september 2017 ios 12 released september 2018 sixth-generation ipod touch support ios 12 made first ipod touch model support five major versions ios far ios 8 ios 12 sixth-generation ipod touch supported latest version apple mobile operating system ios 13 sixth-generation ipod touch features apple a8 apple m8 motion co-processor chipset 64-bit architecture chip ipad mini 4 apple tv 4th gen iphone 6 homepod slightly underclocked 1.1 ghz iphone 6 6 plus clocked 1.4 ghz ipad mini 4 clocked 1.5 ghz due small battery 1gb lpddr3 ram twice amount previous generation ipod touch apple metal graphics technology also compatible ipod touch 6th generation ipod touch features 8mp rear isight camera video record 1080p 30fps 120fps slow-motion mode records 720p camera also supports burst mode led flash unlike 5th-generation version rear camera 6th-generation ipod touch lacks sapphire crystal lens front camera unchanged previous generation 1.2mp sensor record video 720p first ipod touch available 128 gb storage partially filling void left behind ipod classic offered 160 gb storage time discontinued exterior design sixth-generation ipod touch largely identical predecessor exception ipod touch loop button removed available silver gold space gray pink blue product red version available apple stores apple online store although color shade slightly different previous generation sixth-generation ipod touch comes lightning charging cable model also comes earpods without remote mic ipod touch compatible apple airpods wireless headphones announced september 7th 2016 apple special event along iphone 7 released late december 2016 also compatible earpods lightning connector came time iphone 7 remote functions active nate ralph cnet praised device camera quality noted ipod touch exceptional performance criticized middling battery life small display stated considered largely redundant due smartphones tablets sascha segan pcmag also noted poor battery life stated ipod touch still best option anyone would prefer handheld media player n't require intimate relationship cellular carrier | [
6788,
3940,
7890,
722,
1094,
4320,
2926,
4690,
734,
5752,
405,
6125,
2954,
1123,
6142,
2609,
1895,
4376,
5091,
4749,
5450,
7601,
6165,
3001,
2284,
3008,
5477,
120,
1940,
2300,
3025,
2665,
2679,
1582,
2327,
6565,
2331,
3050,
4820,
163,
1... | Validation |
6,848 | 9 | Graphics_Layout_Engine:graphics layout engine graphics layout engine gle graphics scripting language designed creating publication quality graphs plots diagrams figures slides gle supports various graph types function plots histograms bar graphs scatter plots contour lines color maps surface plots simple flexible set graphing commands complex output created relying gle scripting language full featured subroutines variables logic control gle relies latex text output supports mathematical formula graphs figures gle output formats include eps ps pdf jpeg png gle software dates back early 90 still active development currently gle development hosted sourceforge gle available major operating systems including microsoft windows mac os x unix included gnu/linux distributions debian fedora suse gle licensed bsd license qgle gle user interface licensed gpl license | [
6489,
3915,
4759,
2680,
6016,
578
] | Validation |
6,849 | 2 | TSS_(operating_system):tss operating system ibm time sharing system tss/360 discontinued early time-sharing operating system designed exclusively special model system/360 line mainframes model 67 made available trial basis limited set customers 1967 never officially released supported product ibm tss pioneered number novel features later appeared popular systems mvs tss migrated system/370 303x systems despite many advances novel capabilities tss failed meet expectations eventually canceled tss/370 used basis port unix ibm mainframe tss/360 also inspired development tss-8 operating system tss/360 one first implementations tightly-coupled symmetric multiprocessing pair model 67 mainframes shared common physical memory space ran single copy kernel application code i/o operation launched one processor could end cause interrupt model 67 used standard 360 instruction called test set implement locks code critical sections also implemented virtual memory virtual machines using position-independent code tss/360 included early implementation table driven scheduler user-configured table whose columns parameters current priority working set size number timeslices used date kernel would refer table calculating new priority thread later appeared systems diverse honeywell cp-v ibm z/os standard operating system software time tss/360 customers general motors research laboratories given full access entire source operating system code development tools user-developed improvements patches frequently incorporated official source code tss/360 suffered performance reliability problems lack compatibility os/360 although issues eventually addressed ibm attempted develop tss aggressive schedule large staff programmers compete multics 1967 become evident tss/360 suffering kinds delays os/360 february 1968 time share 30 eighteen s/360-67 sites attempting run tss conference ibm announced via blue letter tss/360 decommitted great blow time-sharing community decision temporarily reversed tss/360 officially canceled 1971 however tss/360 continued quietly available time existing tss/360 customers interim measure tss/360 canceled ibm put primary efforts time sharing option tso time-sharing monitor os/360 several groups developed less ambitious successful time sharing systems s/360-67 notably cp-67 ibm cambridge scientific center early virtual machine monitor evolved vm/370 mts university michigan orvyl stanford university ibm also provided tss/370 prpq migration path existing tss/360 customers went multiple releases tss provides users command-line interface users interact command system command format consists codice_1 command name one eight characters without imbedded blanks operands optional depending command must separated command name least one blank multiple operands separated tab characters commas command lines continued typing hyphen end line continued typing continuation beginning next line multiple commands written line separating semicolons comments allowed command lines separated command semicolon included single quotes operands either positional keyword format keyword=value system commands divided seven categories tss provided early implementation position-independent code ability different processes run single copy executable possibly mapped different virtual addresses process system/360 programs typically contain modifiable data working storage address constants adcons fields containing addresses code data tss virtual addresses differ process running program tss language processors place adcons working storage separate section code called prototype control section psect program loaded dynamic loader makes copy psect relocates adcons reflect virtual addresses assigned within current process therefore user program unique copy psect called program executed general register 13 contains address psect current process address used references variable data addresses | [
4566,
1522,
4291,
7605,
7331,
6518,
4670,
6705,
8066,
8173,
7172,
299,
5481,
5571,
5041,
7546,
4421,
5396,
5932,
7003,
3874,
402,
2582,
839,
4428,
4254,
3557,
850,
5244,
2266,
6472,
2786,
607,
2431,
3664,
4366,
5964,
7496,
265,
1516,
19... | Validation |
6,850 | 0 | Racter:racter racter artificial intelligence computer program generates english language prose random racter short raconteur written william chamberlain thomas etter existence program revealed 1983 book called policeman beard half constructed described composed entirely program according chamberlain introduction book program apparently ran cp/m machine written compiled basic z80 micro 64k ram version program allegedly wrote book released general public sophistication claimed program likely exaggerated could seen investigation template system text generation however 1984 mindscape inc. released interactive version racter developed inrac corporation dos amiga apple ii computers published racter similar chatterbot basic program released mindscape far less sophisticated anything could written fairly sophisticated prose policeman beard commercial version racter could likened computerized version mad libs game fill blanks advance plug text template produce surrealistic tale commercial program attempted parse text inputs identifying significant nouns verbs would regurgitate create conversations plugging input user phrase templates combined along modules conjugated english verbs contrast text policeman beard apart edited large amount output would product chamberlain specialized templates modules included commercial release program pc magazine described policeman beard scenes surprising frankness reflective concluded book whimsical wise sometimes fun computer gaming world described racter diversion another dimension might best seen paying price ticket try buy | [
4337,
5429
] | Test |
6,851 | 9 | LeJOS:lejos lejos firmware replacement lego mindstorms programmable bricks different variants software support original robotics invention system nxt ev3 includes java virtual machine allows lego mindstorms robots programmed java programming language includes also icommand.jar allows communicate via bluetooth original firmware mindstorm often used teaching java first-year computer science students lejos-based robot jitter flew around international space station december 2001 according official website name lejos conceived josé solórzano based acronym java operating system jos name another operating system rcx legos spanish word lejos lejos originally conceived tinyvm developed josé solórzano late 1999 started hobby open source project later forked known today lejos many contributors joined project provided important enhancements among brian bagnall jürgen stuber paul andrews later took project josé essentially retired august 20 2006 original lejos rcx discontinued 3.0 release soon afterwards icommand library control nxt bluetooth-enabled computer via lcp released library made use standard lego firmware library later superseded lejos nxj 0.8 january 2007 full port new lego mindstorms nxt released firmware replacement far faster x15 rcx version memory available menu system bluetooth support using bluecove library allows access many nxt features 2008 versions 0.5 0.6 0.7 released addition numerous improvements core classes eclipse plugin released along new version tutorial 2009 2 major releases 0.8 0.85 may 2011 0.9 released broadly speaking releases concentrated improvements navigation algorithms well support numerous 3rd party sensors eclipse plug-in 2013 development began port lego mindstorms ev3 brick 2014 0.5 0.6 alpha versions released 2015 beta versions 0.9 0.9.1 released since november 2014 lejos used slightly adapted version also open-source project open roberta lejos nxj provides support access robot i²c ports allows access standard sensors motors ultrasonic distance sensor touch sensor sound sensor light sensor companies mindsensors hitechnic extended basic set providing advanced sensors actuators multiplexers lejos nxj includes java apis products taking advantage object-oriented structure java developers lejos nxj able hide implementation details sensors actuators behind multiple interfaces allows robotics developer work high-level abstractions without worry details like hexadecimal addresses hardware components project includes implementations commonly used feedback controller pid controller kalman filter noise reduction algorithm lejos nxj also provides libraries support abstract functions navigation mapping behavior based robotics simple lejos program since first alpha release lejos nxj 2007 project consistently active following core development team relatively small group contributions accepted members community several interfaces third party sensors actuators contributed members outside core team platform used university robotics courses undergraduate research projects platform robotics research lejos nxj java project builds wealth functionality inherent java platform lejos nxj plugins two leading java ides eclipse netbeans robotics developers take advantage standard functionality ide code completion refactoring testing frameworks well point-and-click implementation nxj functions compiling linking uploading wealth java open source projects apache math likewise available nxj robotics developer | [
248,
1522,
7357,
3915,
7664,
1435
] | Test |
6,852 | 4 | Cyber_Security_Task_Force:cyber security task force cyber security task force organized department public safety emergency preparedness canada jane billings assistant deputy minister current cyber security task force secretariat | [
4419,
1805
] | Test |
6,853 | 2 | OS4000:os4000 os4000 proprietary operating system introduced gec computers limited 1977 successor gec dos range gec 4000 series 16-bit later 32-bit minicomputers os4000 developed late 1990s support-only mode since first operating systems gec 4000 series cos core operating system dos disk operating system basically single-user multi-tasking operating systems designed developing running process control type applications os4000 first released around 1977 reused many parts dos added multi-user access os4000 jcl command-line interpreter batch processing os4000 hierarchical filesystem although on-disk format similar non-hierarchical dos filesystem os4000 jcl based cambridge university phoenix command interpreter os4000 rel 3 arrived around 1980 included linked-os — support linked os4000 operating systems enable multi-node systems constructed main customer central computing service university college london euclid multi-node system consisting hub file server multiple rim multi-access compute server systems provided service 100 simultaneous users linked-os also used construct fail-over process control systems higher resilience os4000 rel 4 arrived around 1983 upped maximum number user modules 150 mainly university college london euclid system together enhanced batch processing system also included support gec 4090 processor introduced 32-bit addressing mode os4000 rel 5 introduced modified version os4000 filesystem called cfsx order allow easier use larger disks initial rel 5 supported cfsx filesystem support original cfs1 filesystem reintroduced well quite quickly os4000 rel 6 introduced support dual processor systems gec 4190d os4000 developed uk gec computers borehamwood offices elstree way gec computers dunstable development centre woodside estate dunstable architecture os4000 heavily based around architecture platform runs gec 4000 series minicomputers rather unusual platform includes feature called nucleus combination hardware firmware based kernel altered program control means many features typically found operating system kernels need included os4000 underlying platform performs functions instead operating system consequently provision running privileged mode code platform—all os4000 operating system code runs processes nucleus supports 256 processes schedules automatically using fixed priority scheme os4000 lives entirely within processes set system tables used configure nucleus access system tables granted processes need alter configuration nucleus e.g load new programs processes adjust nucleus scheduling time-shared processes etc system tables tell nucleus processes permitted communicate updated processes created destroyed e.g users login logout i/o performed directly processes system tables identify processes access peripherals handle peripheral interrupts example device driver disk controller process responsible issuing commands nucleus disk controller handling interrupts passed back disk controller via nucleus system tables explicitly state process access disk controller system tables grant device driver access peripherals event process stopping crashing nucleus looks owner process system tables informs owner process take decision let system continue running without process take system like unix panic take action reload and/or restart process functions filesystems store allocation terminal drivers timing services etc also exist separate processes nucleus implements segmented memory system processes access memory segments defined system tables maintained os4000 os4000 provides memory system handles store-resident memory virtual memory backed disk known overlay overlaying performed segment level os4000 also inherited grouped segments dos group segments overlaid retrieved single group feature little used os4000 process may use mixture resident overlayable segments although process performing real-time tasks would normally designed use resident segments os4000 supports fully mixed set process scheduling within system hard real-time processes soft real-time time-shared background given os4000 also includes full program development test/debug facilities made os4000 ideal developing deploying real-time applications process control high speed time data communications within one system os4000 uses proprietary filesystem filesystem extent based variable block size — different files created different blocksizes ranging 256 bytes 16,384 bytes 256-byte multiples filesystem hierarchical components limited 8 characters codice_1 period used component separator os4000 jcl limits characters file path components upper case letters numbers file path starts context pointer name refers position filesystem followed zero catalogues equivalent unix directories ending filename disk system contains separate independent filesystem volume name disk name top level catalogue master catalogue must one disk mounted volume name codice_2 contains specific files required os4000 larger systems usually additional disks containing user files data files etc although coexist codice_2 disk space permitting users given set initial context pointers point catalogue filesystem users see filesystem hierarchies initial context pointers systems usually configured unprivileged users see users files system files except system executables held codice_4 convention area called codice_5 available users enables transfer/sharing files files os4000 filesystem typed means filesystem hold several different types file understands contents structured common logical files contain record structure split sequential random files random files records length enable seeking record numbers finally text binary files distinguished mainly prevent applications expect textual data accidentally using binary file results set logical file types identified three letters e.g logical sequential text lst logical file types lst lsb lrt lrb converse logical files physical files accessed block time known physical random binary prb files file types pst psb prt also exist theory capabilities prb generally used additionally logical indexed sequential lis filetype isam file always appears sorted key field byte stream byt filetype added rel 6.5 better support os4000 nfs server filetype cat used hold catalogues —it actually lsb file modified filesystem addition files catalogues 3 types symbolic links references ref created point another file catalogue creator ref see initial context pointer either filesystem another filesystem disk pointers odp similar references created point file catalogue seen initial context pointers creating odp privileged operation available system manager support unix style symlinks arbitrary text stored catalogue added rel 6.5 better support os4000 nfs server symlinks created visible nfs clients os4000 also provides non-hierarchical temporary filesystem supports exactly types file permanent filesystems except cat ref odp symlinks file contents stored dedicated temporary filing disk regions file metadata stored memory logged user private temporary filing name space seen logged user even another logged user username user temporary files deleted user logs implicitly system rebooted temporary filenames start percent codice_6 ampersand codice_7 limited 8 characters following shows short multi-access login session case user codice_8 logged issued codice_9 command session left timeout inactivity user logs os4000 jcl command interpreter codice_10 loaded user codice_11 process started reads commands terminal number system commands built codice_10 case command n't built executable binary files loaded codice_13 process run text jcl files opened processed directly codice_10 user normally also gets codice_15 process privileged used load trusted debugging programs real-time process control accounts half os4000 systems deployed systems steel production accounts significant proportion earlier real-time process control systems upgraded dos os4000 x.25 packet switches account significant proportion systems although earlier gec x.25 packet switches ran special operating system called nos cut operating system halfway dos os4000 civil command control systems e.g fire service control systems interfacing emergency telephone operator fire stations prestel uk public videotex systems used many countries many private viewdata systems multi-user minicomputers used many education research establishments os4000 ported gec series 63 minicomputer known os6000 required addition software nucleus emulation feature gec series 63 hardware gec computers dropped os6000 source code given daresbury laboratory main user continued keep step os4000 releases lifetime two gec series 63 systems | [
1522,
7325,
7605,
280,
785,
2818,
4759,
190,
4670,
5021,
8066,
8167,
4397,
13,
5644,
3271,
5116,
6984,
299,
3626,
7142,
5571,
2300,
5041,
7827,
4786,
578,
7550,
4244,
5232,
4336,
405,
6367,
5852,
6922,
8115,
5161,
5865,
7396,
1682,
65,
... | Test |
6,854 | 6 | OpenAFS:openafs openafs open-source implementation andrew distributed file system afs afs originally developed carnegie mellon university developed commercial product transarc corporation subsequently acquired ibm linuxworld 15 august 2000 ibm announced plans release version commercial afs product ibm public license became openafs today openafs actively developed wide range operating system families including aix mac os x darwin hp-ux irix solaris linux microsoft windows freebsd netbsd openbsd openafs foundation established may 20 2013 non-profit organization dedicated fostering stability growth openafs governance project split board elders consider issues strategic direction gatekeepers control source repository although legal entity owns openafs source code copyright many files attributed ibm source covered ipl however several files tree covered university vanity licenses applicable licenses listed file source repository called openafs/doc/license contributors last five years made significant improvements implementation afs3 protocol without breaking interoperability ibm/transarc releases since announcement written several large development projects integrated 64-bit ms-windows support ms-windows 7 support apple-mac os x v10.4-v10.9 support demand attach fileserver many development projects various stages completion following several prominent examples existing user base includes small single server cells well large multinational deployments spanning academia private research laboratories government commercial entities small snapshot deployed afs cells found reviewing contents cellservdb file distributed openafs | [
3599,
2547,
7161,
4672,
6431,
3626,
5049,
6117,
759,
5437,
4375,
6500,
6505,
5457,
4759,
460,
1534,
7976,
4406,
821,
7258,
5130,
1561,
836,
5843,
2313,
6558,
2683,
5859,
5865,
4444,
5518,
8029,
6231,
869,
2704,
1605,
174,
2710,
1624,
59... | Test |
6,855 | 1 | Metadatabase:metadatabase metadatabase database model 1 metadata management 2 global query independent databases 3 distributed data processing word metadatabase addition dictionary originally metadata common term referring simply data data tags keywords markup headers however technology concept metadata extended also include data knowledge representation information models e.g. relations entities-relationships objects application logic e.g. production rules analytic models e.g. simulation optimization mathematical algorithms case analytic models also referred modelbase classes metadata integrated modeling ontology give rise stable set meta-relations tables metadata individual models interpreted metadata entered tables models inserted retrieved updated deleted manner ordinary data ordinary relational database users also formulate global queries requests processing local databases metadatabase using globally integrated metadata metadatabase structure implemented open technology relational databases metadatabase technology developed rensselaer polytechnic institute troy new york group faculty students see references end article starting late 1980s main contribution includes extension concept metadata metadata management original approach designing database metadata applications conceptual results continue motivate new research new applications level particular design openness scalability tied particular ontology proposed requires reverse-representation application models order save meta-relations theory ontology neutral proven industrial applications however needs development establish field open technology requirement reverse-representation common global information integration technology way facilitate metadatabase approach distribute core portion local site allow peer-to-peer translation fly | [
5447,
2054,
6462,
7303
] | Test |
6,856 | 2 | IBM_System_Management_Facilities:ibm system management facilities ibm system management facility smf component ibm z/os mainframe computers providing standardised method writing records activity file data set use z/os term smf provides full instrumentation baseline activities running ibm mainframe operating system including i/o network activity software usage error conditions processor utilization etc one prominent components z/os uses smf ibm resource measurement facility rmf rmf provides performance usage instrumentation resources processor memory disk cache workload virtual storage xcf coupling facility rmf technically priced extra cost feature z/os bmc sells competing alternative cmf smf forms basis many monitoring automation utilities smf record numbered type e.g smf 120 smf 89 installations great control much little smf data collect records written software ibm products generally record type 128 higher record types subtypes example type 70 subtype 1 records written rmf record cpu activity list common smf record types major record types especially created rmf continue evolve rapid pace release z/os brings new fields different processor families coupling facility levels also change data model smf record data two ways two ways declared use one used time order fallback alternative data periodically dumped sequential files example tape drives using ifasmfdp smf dump utility ifasmfdl using log streams ifasmfdp also used split existing smf sequential files copy files two dump programs produce output involve changes smf records elaboration chain changing jcl call new dump utility | [
3,
2807,
4673,
6957,
7437,
3905
] | Test |
6,857 | 2 | 8.3_filename:8.3 filename 8.3 filename also called short filename sfn filename convention used old versions dos versions microsoft windows prior windows 95 windows nt 3.5 also used modern microsoft operating systems alternate filename long filename compatibility legacy programs filename convention limited fat file system similar 8.3 file naming schemes also existed earlier cp/m trs-80 atari data general digital equipment corporation minicomputer operating systems 8.3 filenames limited eight characters directory specifier followed optionally filename extension consisting period codice_1 three characters systems support 8.3 filenames excess characters ignored file name extension codice_1 present significance codice_3 codice_4 equivalent furthermore systems file directory names uppercase although systems use 8.3 standard usually case-insensitive hence codice_5 equivalent name codice_6 however non-8.3 operating systems almost modern operating systems accessing 8.3 file systems including dos-formatted diskettes also including modern memory cards networked file systems underlying system may alter filenames internally preserve case avoid truncating letters names example case vfat vfat variant fat extended directory format introduced windows 95 windows nt 3.5 allowed mixed-case unicode long filenames lfns addition classic 8.3 names using multiple 32-byte directory entry records long filenames way one recognised old 8.3 system software valid directory entry maintain backward-compatibility legacy applications dos windows 3.1 fat vfat filesystems 8.3 filename automatically generated every lfn file still renamed deleted opened although generated name e.g codice_7 may show little similarity original ntfs filesystems generation 8.3 filenames turned 8.3 filename obtained using kernel32.dll function getshortpathname although compulsory algorithm creating 8.3 name lfn windows uses following convention ntfs file system used windows nt family supports lfns natively 8.3 names still available legacy applications optionally disabled improve performance situations large numbers similarly named files exist folder iso 9660 file system mainly used compact discs similar limitations basic level 1 additional restriction directory names contain extensions characters notably hyphens allowed filenames level 2 allows filenames 31 characters compatible classic amigaos classic mac os filenames 2001 microsoft antitrust case names micros~1 micros~2 humorously used refer companies might exist proposed split microsoft legacy technology used wide range products devices standard interchanging information compact flash cards used cameras vfat lfn long filenames introduced windows 95/98/me retained compatibility vfat lfn used nt-based systems windows nt/2k/xp uses modified 8.3 shortname filename contains lowercase letters combination lowercase basename uppercase extension vice versa special characters fits within 8.3 limits vfat entry created windows nt later versions xp instead two bits byte 0x0c directory entry used indicate filename considered entirely partially lowercase specifically bit 4 means lowercase extension bit 3 lowercase basename allows combinations codice_33 codice_34 codice_35 operating systems support creates backward-compatibility filename mangling problem older windows versions 95 98 see all-uppercase filenames extension used therefore change capitalization file transported usb flash drive cause problems operating systems exhibit case-insensitive filename behavior dos windows current 2.6 versions linux recognize extension reading mount option shortname determines whether feature used writing directory table special type file represents directory file directory stored within represented 32-byte entry table entry records name extension attributes archive directory hidden read-only system volume date time creation address first cluster file/directory data finally size file/directory legal characters dos filenames include following excludes following ascii characters dos filenames oem character set code 0xe5 first byte see makes troubles extra-ascii characters used directory entries root directory region subdirectories following format sometimes may desirable convert long filename short filename example working command prompt simple rules followed attain correct 8.3 filename find sure sfn 8.3 names files directory use codice_49 shows short names one long names codice_50 shows short names original dir listing format windows nt-based operating systems command prompt codice_51 applets accept long filenames wildcard characters question mark asterisk '* long filenames spaces need escaped i.e enclosed single double quotes starting windows vista console commands powershell applets perform limited pattern matching allowing wildcards filename subdirectory file path silently substituting first matching directory entry example codice_52 change current directory codice_53 | [
1710,
2361,
3843,
4759,
1534,
6256,
6264,
4771,
3626,
5480,
7075,
5571,
6907,
1281,
4699,
4605,
6640,
405,
2949,
4524,
412,
6558,
4438,
4174,
1047,
7035,
4275,
2528,
7046,
444
] | Test |
6,858 | 7 | Rich_web_application:rich web application rich web application originally called rich internet application ria installable internet application web application many characteristics desktop application software concept closely related single-page application may allow user interactive features drag drop background menu wysiwyg editing etc html5 current standard delivering rich web applications supported major browsers adobe flash manipulates vector raster graphics provide animation text drawings still images supports bidirectional streaming audio video capture user input via mouse keyboard microphone camera flash contains object-oriented language called actionscript supports automation via javascript flash language jsfl flash content may displayed various computer systems devices using adobe flash player available free charge common web browsers mobile phones electronic devices using flash lite apache flex formerly adobe flex software development kit sdk development deployment cross-platform rias based adobe flash platform initially developed macromedia acquired adobe systems flex donated adobe apache software foundation 2011 java applets used create interactive visualizations present video three dimensional objects media java applets appropriate complex visualizations require significant programming effort high level language communications applet originating server javafx software platform creating delivering rias run across wide variety connected devices current release javafx 11 sept 2018 enables building applications desktop browser mobile phones comes 3d support tv set-top boxes gaming consoles blu-ray players platforms planned java fx runs plug-in java applet via webstart silverlight proposed microsoft another proprietary alternative technology widely accepted instance lacks support many mobile devices examples application video streaming events including 2008 summer olympics beijing 2010 winter olympics vancouver 2008 conventions major political parties united states silverlight also used netflix instant video streaming service silverlight longer active development supported microsoft edge microsoft recent browser rias could use xforms enhance functionality using xml xslt along xhtml css javascript also used generate richer client side ui components like data tables resorted locally client without going back server mozilla internet explorer browsers support terms rich client rich internet application introduced white paper march 2002 macromedia adobe though concept existed number years earlier names including remote scripting microsoft april 1999 x internet forrester research october 2000 rich web application rias present indexing challenges web search engines adobe flash content least partially indexable security improve application software example use sandboxes automatic updates extensions remain subject vulnerabilities access often much greater native web applications security purposes rias run client portions within special isolated area client desktop called sandbox sandbox limits visibility access file-system operating system client application server side connection approach allows client system handle local activities reformatting forth thereby lowering amount frequency client-server traffic especially versus client-server implementations built around so-called thin clients november 2011 number announcements demonstrated decline demand rich internet application architectures based plug-ins order favor html5 alternatives adobe announced flash would longer produced mobile tv refocusing efforts adobe air pundits questioned continued relevance even desktop described beginning end research motion rim announced would continue develop flash playbook decision questioned commentators rumors state microsoft abandon silverlight version 5 released combination announcements proclaiming end line browser plug-ins | [
4655,
3932,
7169,
6809,
393,
3290,
3291,
2574,
4352,
4725,
5432,
1136,
87,
1152,
7628,
5821,
5127,
3383,
6550,
8006,
3043,
3398,
4082,
6221,
4445,
520,
3057,
5887,
5542,
6986,
8085,
1276,
6991,
7015,
3495,
4565,
2812,
2451,
5984,
631,
5... | Test |
6,859 | 4 | Attic_(backup_software):attic backup software attic deduplicating backup software various unix-like operating systems attic development began 2010 accepted debian august 2013 attic available pip notably part debian ubuntu arch slackware attic offers efficient deduplicated compressed optionally encrypted authenticated backups backup includes metadata like owner/group permissions posix acls extended file attributes handles special files also like hardlinks symlinks devices files etc internally represents files archive stream metadata similar tar unlike tools git borg project created extensive documentation internal workings attic uses rolling hash implement global data deduplication compression defaults zlib encryption aes via openssl authenticated hmac 2015 attic forked borg support open faster paced development according developers many issues attic fixed fork backward compatibility original program lost non-reversible upgrade process exists borg 1.0.0 released 5 march 2016 borg 1.1.0 released 7 october 2017 2018 borg active development many contributors attic developed stable releases available various linux distributions debian ubuntu fedora opensuse others ports collection various bsd derivatives project provides pre-built binaries linux freebsd macos | [
4229,
6289,
4386,
5965,
5571,
7848,
578
] | Train |
6,860 | 2 | FreeNAS:freenas freenas free open-source network-attached storage nas software based freebsd openzfs file system licensed terms bsd license runs commodity x86-64 hardware freenas supports windows macos unix clients various virtualization hosts xenserver vmware using smb afp nfs iscsi ssh rsync ftp/tftp protocols advanced freenas features include full-disk encryption plug-in architecture third-party software freenas supports openzfs filesystem provides data integrity checking prevent data corruption enable point time snapshotting replication several levels redundancy including striping mirroring striped mirrors raid 1+0 three levels raidz freenas managed comprehensive web interface supplemented minimal shell console handles essential administrative functions web interface supports storage pool configuration user management sharing configuration system maintenance embedded system appliance freenas boots usb flash device sata dom image configured using usb flash/cd-rom bootable installer freenas operating system fully independent storage disks allowing configuration database encryption keys backed restored fresh installation os separation also allows freenas system upgrades performed web interface freenas project started october 2005 olivier cochard-labbé based m0n0wall embedded firewall freebsd 6.0 volker theile joined project july 2006 became project lead april 2008 september 2009 development team concluded project release .7 due complete rewrite order accommodate modern features plug-in architecture volker theile decided project best reimplemented using debian linux shifted development efforts interim corenas project eventually openmediavault continues project lead cochard-labbé responded community objections debian version freenas resumed activity project oversaw transfer freenas user ixsystems developers daisuke aoyama michael zoon continued developing freenas 7 nas4free project meanwhile ixsystems rewrote freenas new architecture based freebsd 8.1 releasing freenas 8 beta november 2010 plug-in architecture arrived freenas 8.2 freenas versioning synchronized freebsd clarity freenas 8.3 introduced full-disk encryption freebsd 9.1-based freenas 9.1 brought updated plug-in architecture compatible trueos warden jail management framework freenas 9.1 also first version freenas use community-supported openzfs v5000 feature flags freenas 9.2 based freebsd 9.2 included performance improvements introduced rest api remote system administration freenas 9.3 based freebsd 9.3 introduced zfs-based boot device initial setup wizard high-performance in-kernel iscsi server freenas 9.10 based freebsd 10.3-rc3 brought end freenas/freebsd synchronized naming introduced graphite monitoring support experimental support bhyve hypervisor october 2015 ten years original freenas release freenas 10 alpha released providing preview would become freenas corral ga march 15 2017 freenas corral introduced new graphical user interface command-line interface underlying middleware container management system virtual machine management system freenas corral departs freenas providing nas functionality also hyper-converged functionality thanks integrated virtual machine support however april 12 2017 ixsystems announced freenas corral would instead relegated 'technology preview citing issues general instability lack feature parity 9.10 jails iscsi etc users experiencing lower performance expected departure project lead instead decision made revert existing 9.10 code bring corral features 9.10.3 may 2017 ix systems announced freenas 11 would imminently released based 9.10 included features update freebsd operating system virtual machine management updates jails new beta user interface along lines corral based angular js 8.0 reimplementation freenas moved project m0n0bsd/m0n0wall/php-based architecture one based freebsd nanobsd embedded build system python programming language django web application framework dōjō toolkit javascript library also used lighttpd web server replaced nginx freenas 8.2 terminated successor 9.10.2 known freenas corral retained nginx web server zfs-based boot device freenas replaces django/dōjō web application framework original one freenas 11 implemented new interface using angular js features plugins shown 11.0 branch | [
1438,
4295,
7514,
732,
3636,
5760,
3986,
5065,
6477,
765,
424,
6149,
6505,
1523,
1547,
2291,
481,
2300,
1193,
4059,
8001,
6918,
6211,
4806,
5859,
4441,
5865,
6583,
8037,
3751,
875,
1254,
191,
4498,
7355,
3457,
5571,
6278,
8096,
578,
594... | Test |
6,861 | 9 | David_J._Farber:david j. farber david j. farber born april 17 1934 professor computer science noted major contributions programming languages computer networking currently distinguished professor co-director cyber civilization research center keio university japan farber graduated stevens institute technology 1956 began 11-year career bell laboratories helped design first electronic switching system ess-1 snobol programming languages subsequently held industry positions rand corporation scientific data systems followed academic positions university california irvine university delaware irvine research work focused creating world first operational distributed computer system member electrical engineering department university delaware helped conceive organize major american research networks csnet nsfnet national research education network nren helped create nsf/darpa-funded gigabit network test bed initiative served chairman gigabit test bed coordinating committee farber subsequently appointed alfred fitler moore professor telecommunication systems university pennsylvania also held appointments professor business public policy wharton school business faculty associate annenberg school communication served chief technologist us federal communications commission 2000–2001 leave university farber founding editor icannwatch serves board advisers context relevant liquid information company farber aaas fellow ieee fellow acm fellow recipient 1995 sigcomm award lifelong contributions computer communications served board directors electronic frontier foundation electronic privacy information center advisory board board trustees internet society member presidential advisory committee high performance computing communications information technology next generation internet runs large 25,000+ readership mailing list called interesting-people 2012 memory son established joseph m. farber prize stevens institute technology recognizes graduating senior majoring one disciplines college arts letters displays keen interest concern civil liberties importance preserving protecting human rights august 3 2013 farber inducted pioneers circle internet hall fame elected aaas fellow council american association advancement science 2018 | [
7383,
2251,
8161,
4435,
5836,
1243,
334
] | Validation |
6,862 | 2 | Reference_monitor:reference monitor operating systems architecture reference monitor concept defines set design requirements reference validation mechanism enforces access control policy subjects e.g. processes users ability perform operations e.g. read write objects e.g. files sockets system properties reference monitor captured acronym neat means example windows 3.x 9x operating systems built reference monitor whereas windows nt line also includes windows 2000 windows xp designed contain reference monitor although clear properties tamperproof etc ever independently verified level computer security intended provide claim reference validation mechanism satisfies reference monitor concept correctly enforce system access control policy must invoked mediate security-sensitive operations must tampered undergone complete analysis testing verify correctness abstract model reference monitor widely applied type system needs enforce access control considered express necessary sufficient properties system making security claim according ross anderson reference monitor concept introduced james anderson influential 1972 paper peter denning 2013 oral history stated james anderson credited concept paper scott graham presented 1972 conference systems evaluated b3 trusted computer system evaluation criteria tcsec must enforce reference monitor concept | [
2879,
5785,
5571,
6256,
1805
] | Test |
6,863 | 1 | PhpSQLiteAdmin:phpsqliteadmin phpsqliteadmin name two independent web applications written php managing sqlite databases phpsqliteadmin web-based client leverages php scripting sqlite file-database system provide simple way users create databases create tables query data using non-industry-standard sqlite syntax | [
3863,
6029
] | Validation |
6,864 | 4 | Tanium:tanium tanium privately held endpoint security systems management company based emeryville california founded 2007 father son david hindawi orion hindawi co-founders management company bigfix orion named ceo february 2016 david serves executive chairman | [] | Test |
6,865 | 3 | Loongson:loongson loongson family general-purpose mips64 cpus developed institute computing technology ict chinese academy sciences cas china chief architect professor formerly called godson loongson result public–private partnership blx ic design corporation founded 2002 ict jiangsu zhongyi group based beijing blx focuses designing 64-bit loongson general-purpose embedded processors together developing software tools reference platforms stmicroelectronics fabricates markets loongson chips blx fabless current loongson instruction set mips64 internal microarchitecture independently developed ict early implementations family lacked four instructions patented mips technologies avoid legal issues 2007 deal reached mips technologies ict stmicroelectronics bought mips license loongson thus processor promoted mips-based mips-compatible instead mips-like june 2009 ict licensed mips32 mips64 architectures directly mips technologies august 2011 loongson technology corp. ltd. licensed mips32 mips64 architectures mips technologies inc. continued development mips-based loongson cpu cores first revision loongson architecture loongson1 godson-232 core pure 32-bit cpu running clock speed 266 mhz fabricated 0.18 micron cmos process 8 kb data cache 8 kb instruction cache 64-bit floating-point unit capable 200 double-precision mflops intended embedded applications point sale pos systems high performance 64-bit architecture needed loongson 2 adds 64-bit ability loongson architecture initially running 500 mhz later revisions godson 2e produced run 1 ghz godson 2f released market early 2008 ran 1.2 ghz 65 nm loongson 3 godson-3 able run clock speed near 1 ghz 4 cpu cores ~15 w first 8 cores later 40 w april 2010 loongson 3a released ddr2/3 dram support 2017 loongson released latest version 3a cpu 3a3000 one domestic cpu china loongson 3a3000 commercialized recently exhibition nanjing 2017 based loongson 3a3000 motherboard developers computer quietly debut 3a3000 loongson latest cpu model 2017 using loongisa instruction set designed quad-core 64-bit clocked 1.5 ghz power consumption 30w performance frequency 1.5ghz 3a3000 single-threaded performance significantly behind intel amd products 3a3000 one-third intel i5 4460 3.2g two versions loongson-3b godson-3b first featuring 32 nm 6-core processor second version 28 nm 8-core processor version clocked 1.2 ghz 1.5 ghz loongson-3b exceptional energy efficiency terms performance per watt executing 192 gflops using 40 watts cpu core 64 kb l1 cache 128 kb l2 cache cores share common 8 mb l3 cache helps reduce cache miss rate ict launched loongson-3b-based six-core desktop solution technical specifications desktop solution uses optimized version fedora 13 lot software ported available kingsoft wps office suite manufacturer states user experience desktop solution significantly improved loongson-3a based predecessor results benchmark test conducted april 2014 available loongson 3 adds 200 new instructions loongson 2 addition specific benefit speeding intel x86 cpu emulation cost 5 total die area new instructions help emulation performance example qemu known example new instructions reduce impact executing x86/cisc-style instructions mips pipeline added improvements qemu ict loongson-3 achieves average 70 performance executing native binaries running x86 binaries nine benchmarks unlike processors intel advanced micro devices via technologies loongson directly support x86 instruction set processor main operating system linux theory os mips support also work example windows ce ported loongson-based system minimal effort 2010 lemote ported android distribution loongson platform many operating systems work loongson gnu compiler collection gcc main compiler software development loongson platform ict also ported open64 loongson ii platform open source applications linux platform ported little effort common open-source applications including openoffice.org mozilla firefox pidgin mplayer applications written java platform supported .net applications unofficial port mono common language runtime available online march 2006 €100 loongson ii computer design called longmeng dragon dream announced lemote june 2006 computex'2006 yellowsheepriver announced municator ysr-639 small form factor computer based 400 mhz loongson 2 currently loongson boxes come 667 mhz godson 2e processor 800 mhz godson 2f processor sold china cny 1599 us 200 cny 1800 respectively without monitor mouse keyboard two manufacturers announced loongson 2f products sale outside china loongson insiders revealed new model based loongson 3a quad-core laptop developed expected launch august 2011 similar design macbook pro apple inc. carry linux operating system default september 2011 lemote announced yeeloong-8133 13.3 laptop featuring 900 mhz quad-core loongson-3a/2gq cpu 26 december 2007 china revealed first loongson based supercomputer performance 1 tflops peak performance 350 gflops measured linpack hefei designated kd-50-i supercomputer designed joint team led chen guoliang computer science technology department university science technology china ict secondary contractor kd-50-i first chinese built supercomputer utilize domestic chinese cpus total 336 loongson-2f cpus nodes interconnected ethernet size computer roughly equivalent household refrigerator cost less rmb800,000 approximately 120,000 80,000 20 april 2010 ustc announced successful development loongson 3a based kd-60-1 new supercomputer cluster standard blade servers total 80 quad-core loongson processors providing theoretical peak performance 1 tflops reduces power consumption 56 compared kd-50-i system similar performance 26 december 2012 ustc announced successful development loongson 3b based kd-90-1 new supercomputer cluster standard blade servers total 10 octo-core loongson processors providing theoretical peak performance 1 tflops reduces power consumption 62 compared kd-60 system similar performance high-performance dawning 6000 projected speed one quadrillion operations per second incorporate loongson processor core dawning 6000 currently jointly developed institute computing technology chinese academy sciences dawning information industry company li guojie chairman dawning information industry company director academician institute computing technology said research development dawning 6000 expected completed two years topstar also released pair mini-atx based motherboards teb-6040m teb-5040 development first loongson chip started 2001 25 june 2008 hu weiwu chief designer loongson processors gave keynote speech isca 2008 held beijing topic speech research development godson processors 2010 january jiangsu province plans buy 1.5 million loongson pcs | [
2448,
2903,
5540,
5804,
6074,
551,
4847,
5371,
5208,
291,
7528,
5917,
1335,
4234,
650,
2744,
3014,
5740,
5571,
6355,
7453,
1012,
578,
7189,
224,
5055,
2765,
1023,
1867,
7484,
1227,
1977,
343,
4365,
4368,
4370,
1237,
3156,
4372,
7498,
74... | Test |
6,866 | 6 | Disc_spanning:disc spanning disc spanning feature cd dvd burning software automatically spreads large amount data across many data discs data set size exceeds storage capacity individual blank disc advantage user need split files directories two blank disc sized pieces hand software may may support slicing single large file order span disc spanners divide numerous files smaller one blank disc capacity across many discs disc spanning works well cd media many applications spanning dvd media fails often lack reliable dvd data disc spanning odd disc spanning used extensively older 3.5 5.25 floppy discs users assume every operating system perform disc spanning media built function incorrect disc spanning schemes include small program reassemble data set structure source machine program could written first disc every disc set use disc spanning cases make files unreadable file-system therefore bounded use program later restore data many users n't want bound solutions use simple disc spanning instead simple disc spanning solution groups files media grouped based size one drawback system files bigger target media burnt drive simple powerful simple calculation would many cd/dvd/bd/hd dvds bunch files need simple grouping displayed like disc1 -- 99 4,479mib br directory br -- dir1 br -- file1 br br disc2 -- 98 4,468mib br directory br -- dir2 br -- file2 br br disc3 -- 45 2,130mib br -- dir3 br etc ... br | [] | Test |
6,867 | 3 | Boulder_Dash:boulder dash boulder dash video game released 1984 first star software atari 8-bit computers numerous versions sequels series numerous interactive platforms including apple ii msx zx spectrum commodore 64 colecovision nes bbc micro acorn electron ibm pc amstrad cpc amiga mac os platforms also influenced games rocks-and-diamonds genre repton addition rather direct clones emerald mine original boulder dash created canadian developers peter liepa chris gray october 28 1983 acquired first star software owns rights game intellectual property including registered trademark boulder dash game protagonist called rockford must dig caves collecting gems diamonds reach exit within time limit avoiding various types dangerous creatures well obstacles like falling rocks constant danger crushed trapped avalanche killed underground explosion january 1 2018 first star software name website owned bbg entertainment gmbh also purchased intellectual property rights pertaining games including boulder dash ii computing said bright colorful animation coupled breezy story line make game momentary diversion compute favorably reviewed boulder dash construction kit noting sample game much difficult original boulder dash mean machines gave game boy port boulder dash score 90 praising one finest video games ever written describing game one buy soon possible noting faithfulness original commodore 64 version publication reviewed nes version favourably stating extremely impressive title one greatest games ever written given 92 rating zx spectrum version placed ninth sinclair top 100 speccy games time ever journalist stuart campbell ign reviewed virtual console release commodore 64 version although graphics sound found dated enjoyed game stating still feels fresh 1984 concluded stating though n't look like much boulder dash rocks | [
3324
] | Test |
6,868 | 4 | Imperva:imperva imperva cyber security software services company provides protection enterprise data application software company headquartered redwood shores california imperva originally named webcohort founded 2002 shlomo kramer amichai shulman mickey boodaei following year company shipped first product securesphere web application database protection web application firewall 2004 company changed name imperva 2011 imperva went public listed new york stock exchange nyse impv 2014 company acquired remaining shares incapsula cloud security gateway startup named skyfence real-time mainframe security auditing agents tomium software 2016 imperva published free scanner designed detect devices infected vulnerable mirai botnet february 2017 imperva sold skyfence forcepoint 40 million february 2017 imperva purchased camouflage data masking company august 2017 imperva named chris hylen former ceo citrix getgo new president ceo imperva former ceo anthony bettencourt resigned chairman board directors february 2018 august 2018 imperva acquired prevoty runtime application self-protection rasp security company also 2018 imperva identified bug popular web browser google chrome allowing attackers steal information via html tags audio video files 2019 imperva acquired private equity firm thoma bravo | [
2206,
1691,
230,
3756,
7522,
2733,
6043,
1805,
2693
] | Train |
6,869 | 4 | James_Hall_III:james hall iii james w. hall iii born 1958 former united states army warrant officer signals intelligence analyst germany sold eavesdropping code secrets east germany soviet union 1983 1988 hall convicted espionage july 20 1989 fined 50,000 given dishonorable discharge serving 40-year sentence activities united states disciplinary barracks fort leavenworth kansas released september 2011 hall assigned nsa field station berlin teufelsberg one premier listening posts cold war 1982 1985 spied east germany soviet union 1983 1988 hall betrayed hundreds military secrets includes project trojan worldwide electronic network ability pinpoint armored vehicles missiles aircraft recording signal emissions wartime complete national sigint requirements list nsrl 4258-page document nsa activities government requirements sigint capabilities country hall sometimes spent two hours workday reproducing classified documents provide soviets east germans concerned putting regular duty time consistently worked late complete regular assignments used shopping bags smuggle originals documents photocopied frankfurt flat help east berlin associate using illegal income hall paid cash brand new volvo new truck also made large payment home took flying lessons said given military colleagues least six conflicting stories explain lavish life style 1986 hall stationed fort monmouth new jersey returning germany passed promotion sergeant first class year hall also applying appointment warrant officer part routine background investigation associated warrant appointment one supervisors major hall time staff sergeant commented investigator found strange hall could drive car volvo major could n't afford major went explain asked hall apparent disparity hall responded wealthy aunt died left large trust received 30,000 annually major found story plausible reiterated investigators visit investigators thanked major information told already knew trust hall co-workers fully taken duplicity unusual activities never drew much attention returning germany us traveled vienna austria meet soviet handler co-workers wondered would re-enlist become warrant officer several times conveying dissatisfaction army life course warrant officer rank allowed greater access classified material 1977–1981 tour detachment schneeberg intelligence gathering outpost vii corps 326th asa army security agency company west german-czechoslovakian border cold war hall generally good working relationship peers considered peers average analyst would sometimes erupt become upset trivial day-to-day problems however part considered sociable colleague also quickly picked working knowledge german language james also met future wife worked local restaurant bischofsgruen popular tourist town majority detachment soldiers lived hall eventually arrested december 21 1988 savannah georgia bragging undercover fbi agent period six years sold top secret intelligence data east germany soviet union time hall believed speaking soviet contact conversation claimed motivated money told fbi agent posing soviet intelligence officer n't terribly short money decided n't ever want worry next dollar coming 'm anti-american wave flag much anybody else case hall apparently began based tip manfred severin code-named canna clay stasi instructor acted translator courier james hall rejected german staatschutz cia army foreign counterintelligence fca eventually sponsored big tip james hall james hall apprehended severin exfiltrated west family arrest hall said many indicators visible around involved questionable activity hall activities inflicted grave damage u.s. signals intelligence considered perpetrator one costly damaging breaches security long cold war hall confessed giving handlers information us military liaison mission usmlm tank photography new year eve 1984 march 24 1985 inspection tour soviet military facilities ludwigslust german democratic republic us army major arthur d. nicholson jr. unarmed member usmlm shot death soviet sentry jailhouse interview first ever author kristie macrakis designated treasonous bastard cold war spy fbi also arrested hüseyin yıldırım turk served conduit hall east german intelligence officers hall received 100,000 payments reunification germany july 24 1992 almost documents hall copied handed stasi 13,088 pages total given back nsa federal commissioner stasi records joachim gauck later president germany ordered federal ministry interior us government pressure without consulting informing german parliamentary intelligence oversight committee prerequisite giving files away required law hundred pages retained kept top secret gauck well director agency hansjörg geiger later claimed remember ordered return documents agents place us government military worked mole either kgb russian foreign intelligence service svr include | [
8071,
3642
] | Test |
6,870 | 4 | Jericho_Forum:jericho forum jericho forum international group working define promote de-perimeterisation initiated david lacey royal mail grew loose affiliation interested corporate cisos chief information security officers discussing topic summer 2003 initial meeting hosted cisco officially founded january 2004 declared success merged open group industry consortium security forum 2014 created founding members claimed one else appropriately discussing problems surrounding de-perimeterisation felt need create forum define solve consistently issues one earlier outputs group position paper entitled jericho forum commandments set principles describe best survive de-perimeterised world jericho forum consisted user members vendor members originally user members allowed stand election december 2008 relaxed allowing either vendor user members eligible election day-to-day management provided open group jericho forum foundations uk nearly initial members worked corporates global responsibilities involvement grew europe north america asia pacific initial focus defining problem de-perimeterisation forum moved onto focussing defining solution delivered publication collaboration oriented architecture coa paper coa framework paper next focus jericho forum securely collaborating clouds involves applying coa concepts emerging cloud computing paradigm basic premise collaborative approach essential gain value cloud final major piece jericho forum work 2009 around identity culminating 2011 publication identity entitlement access management commandments final months jericho forum contributed thinking debate around smart data handed security forum within open group continue jericho forum declared success sunsetted london conference opengroup 29 october 2013 video jericho forum work identity carried global identity foundation not-for-profit organisation working define components global digital identity ecosystem identity commandments directly translating principles behind identity 3.0 | [
6941,
6625,
4783,
6346
] | Validation |
6,871 | 5 | Simple_Sensor_Interface_protocol:simple sensor interface protocol simple sensor interface ssi protocol simple communications protocol designed data transfer computers user terminals smart sensors ssi protocol application layer protocol osi model ssi protocol developed jointly nokia vaisala suunto ionific mermit university oulu currently ssi developed within mimosa project part european union framework programmes research technological development ssi protocol used point-to-point communications uart networking nanoip applications ssi also provides polling sensors streaming sensor data rfid sensor tags ssi specifies memory map sensor data criteria ssi protocol development sample implementation ssi protocol msp430 microcontrollers published open source august 2006 nokia ssi message consists 2-byte header n -byte payload header consists one byte address wildcard 0x3f ascii one byte message/command type different possible values message/command type presented ssi v1.2 command base group commands used find configure sensor units utilizing ssi-protocol group commands used read sensor data infrequently data streaming purposes defined commands point-to-point messaging ssi done ssi/uart ssi uart message consists 3-byte uart header ssi message payload optional cyclic redundancy check checksum use checksum defined ssi message/command type lower case commands indicating use crc header consists start byte 0xfe 2-byte total length message 2-byte bitwise negation length help identify frame start ssi networking variable environment done using nanoip typical case using ssi individual message important nanoudp simplified udp defined nanoip used message format individual messages important nanotcp used provides flow control retransmission cost message size increase network traffic nanoudp message consists 5-byte nanoudp header n -byte message payload optional 2-byte crc checksum header consists one protocol byte 2-byte message length total length including header crc 1-byte source port 1-byte destination port number destination port number 0x28 ssi messages | [
4469,
6966,
709,
4580,
2281,
4676,
3775,
3525,
2644,
1543,
3777,
7170,
7173,
1364,
7637,
2119,
6908,
5492,
3383,
3207,
2219,
3797,
3799,
5142,
7916,
2043,
3314,
3819,
3821,
7217,
7765,
5880,
4101,
3597,
1709
] | Test |
6,872 | 3 | K1810VM86:k1810vm86 k1810vm86 soviet 16-bit microprocessor clone intel 8086 cpu binary pin compatible developed 1982 1985 original k1810vm86 supported clock frequency 5 mhz 8 mhz allowed later k1810vm86m к1810вм86m corresponding intel 8086-2 k1810vm86 manufactured plastic 40-pin dual in-line package kr1810vm86 кр1810вм86 40-pin ceramic dual in-line package km1810vm86 км1810вм86 commercial version m1810vm86 м1810вм86 military version clone related intel 8088 8-bit bus manufactured k1810vm88 also plastic ceramic packages k1810vm86 manufactured n-mos process family consists following chips brevity table lists chip variants plastic dip prefix кр listed separately variants ceramic dip prefix км commercial version prefix м military version additionally many devices k580 series could used k1810 series well unlike earlier kr580vm80a popular soviet union little used elsewhere k1810vm86 widely used throughout eastern bloc due one first 16-bit microprocessors available among one x86 instruction set allowing run ms-dos examples personal computers built based k1810vm86 8-bit bus variant k1810vm88 cmos versions equivalent intel 80c86 named kr1834vm86 кр1834вм86 developed kiev 1989 1990 manufactured minsk kr1835vm86 кр1835вм86 original kr1810vm86 still shown price list 2 february 2018 kvazar plant kiev together various support chips k580 k1810 series newer cmos versions appear longer production clone intel 80c286 manufactured name kr1847vm286 кр1847вм286 apparently see widespread use processors x86 instruction set designed soviet union much later 1875vd1t 1875вд1т equivalent intel 80c186 1875vd2t 1875вд2т equivalent intel 80386extb | [
7812,
4657,
3741,
1761,
6380,
1237,
5261,
352,
4507,
4767,
2036
] | Validation |
6,873 | 4 | Marc_Maiffret:marc maiffret marc maiffret chief technology officer beyondtrust security compliance management company maiffret joined beyondtrust way acquisition eeye digital security co-founded 1998 along firas bushnaq maiffret created one first vulnerability management web application firewall products date deployed worldwide numerous product awards maiffret credited discovering first major vulnerability discoveries microsoft software leads beyondtrust ’ advanced research labs responsible identifying new trends enterprise security benefit beyondtrust product roadmap maiffret left eeye three-year period served chief security architect fireeye returned eeye july 2010 brief time away eeye maiffret also founded invenio security eventually merged veteran consulting firm digitrust group digitrust maiffret managed company professional services division including network security consulting managed security services maiffret also responsible helping expand firm ’ internal research development efforts maiffret known running eeye top security research team nearly 10 years present well discovering critical microsoft security vulnerabilities code red maiffret accepted three invitations testify united states congress matters national cybersecurity critical security threats posed public private infrastructures named one people magazine magazine ’ 30 people 30 featured cover stories details los angeles times entrepreneur magazine usa today addition numerous television appearances maiffret featured mtv ’ true life 'm hacker october 1999 marc guest speaker episode 91 security leo laporte steve gibson influential industry marc spoken variety conferences including issa los angeles infosec 2011 featured several publications including cnn fox news security week sc magazine pc world computer world marc 'chameleon hacking group 'rhino9 marc also known 'sn1per hacking group no|d august 22 2013 yahoo news reported maiffret prompting hackers support raising 10,000 reward khalil shreateh august 20 maiffret stated already raised 9,000 efforts including 2,000 contributed hackers alike denounced facebook actions maiffret said sitting palestine research five-year-old laptop looks like half broken something might help big way | [
7729,
2724,
7911,
3875,
3486
] | Test |
6,874 | 3 | Qualcomm:qualcomm qualcomm incorporated american multinational semiconductor telecommunications equipment company designs markets wireless telecommunications products services derives revenue chipmaking bulk profit patent licensing businesses company headquarter located san diego california united states 224 worldwide locations parent company qualcomm incorporated qualcomm number wholly owned subsidiaries qualcomm cdma technologies qct sells qualcomm ’ products services including chipsets qualcomm technology licensing qtl responsible patent licensing business qualcomm technologies inc. qti operates nearly qualcomm r activities qualcomm created july 1 1985 seven former linkabit employees led dr. irwin jacobs company named qualcomm “ quality communications. ” started contract research development center largely government defense projects qualcomm merged omninet 1988 raised 3.5 million funding order produce omnitracs satellite communications system trucking companies qualcomm grew eight employees 1986 620 employees 1991 due demand omnitracs 1989 qualcomm 32 million revenues 50 percent omnitracs contract schneider national omnitracs profits helped fund qualcomm research development code-division multiple access cdma technologies cell phone networks qualcomm operating loss 1990s due investment cdma research obtain funding company filed initial public offering september 1991 raising 68 million additional 486 million raised 1995 sale 11.5 million shares second funding round done raise money mass manufacturing cdma-based phones base-stations equipment us-based cellular networks announced would adopt cdma standard company 383 million annual revenue 1995 814 million 1996 1991 qualcomm acquired eudora email client software pc could used omnitracs system acquisition associated widely used email client company little-known time 1998 qualcomm restructured leading 700-employee layoff cell-phone manufacturing business also spun-off order focus higher-margin patents business following year qualcomm fastest growing stock market 2,621 percent growth one year 2000 qualcomm grown 6,300 employees 3.2 billion revenues 670 million profit 39 percent sales cdma technology followed licensing 22 wireless 22 products 17 around time qualcomm established offices europe asia pacific latin america 2001 65 percent qualcomm revenues originated outside united states 35 percent coming south korea 2005 paul e. jacobs son qualcomm founder dr. irwin jacobs appointed qualcomm new ceo whereas irwin jacobs focused cdma patents paul jacobs refocused much qualcomm new research development projects related internet things qualcomm announced steven mollenkopf would succeed paul jacobs ceo december 2013 mollenkopf said would expand qualcomm focus wireless technology cars wearable devices new markets european commission fined qualcomm €997 million abuse dominant market position january 24 2018 march 16 2018 qualcomm removed executive chairman paul jacobs broached long-shot bid buyout earlier week 2018 qualcomm filed lawsuit intel several meet-and-confers exchanges written correspondence may 18 intel appeared willing cooperate offering 'limited supplemental production technical materials relating relevant components designed 2018 iphone models exchange qualcomm agreement limited production would satisfy certain requests document subpoena us federal court filing states court us march 15 2019 ruled apple must indemnify qualcomm infringing three patents related mobile technologies jury ruled apple pay 31 million chip maker 1.41 per iphone used company ’ technology without authorization fiscal year 2018 qualcomm reported loss us 4.86 billion annual revenue us 22.7 billion increase 2 previous fiscal cycle qualcomm shares traded 51 75 per share market capitalization end fiscal 2018 valued us 105 billion company ranked 133rd fortune 500 list largest united states corporations revenue qualcomm pioneered commercialization cdmaone is-95 standard wireless cellular communications following cdma2000 early standard third-generation 3g mobile today company leading patent holder advanced 3g mobile technologies including cdma2000 1xev-do evolutions wcdma higher-speed variant known hspa evolutions td-scdma well patents 4g license streams patents inventions related products major component qualcomm business june 2011 qualcomm announced would release set application programming interfaces geared give web-based applications deeper links hardware beginning 1991 qualcomm participated development globalstar satellite system along loral space communications uses low earth orbit leo satellite constellation consisting 44 active satellites system used voice telephony via hand-held satellite phones asset tracking data transfer using mobile satellite modems system designed normal is-95 system used satellite bent pipe repeater transfer cellular signals handset terrestrial base station unlike iridium system routes phone calls satellites globalstar satellite must always able see handset base station establish connection therefore coverage earth poles satellite orbits also coverage locations large globalstar base stations view locations south atlantic example globalstar hardware manufactured qualcomm like satellite phone networks globalstar went bankrupt 1999 bought group investors currently running system january 2017 apple announced 1 billion lawsuit qualcomm overcharging chips failing pay 1 billion rebates qualcomm however rejected accusations calling claims baseless week apple lawsuit qualcomm shares dropped federal trade commission accused company demanding excessive royalties technologies essential industry standards qualcomm sued group shareholders wake aforementioned ftc ruling apple lawsuit january 4 2019 ftc trial began judge lucy koh united states district court northern district california january 24 2018 european commission announced €997 million fine 1.2 billion 4.9 2017 turnover qualcomm violating antitrust laws means deals apple january 14 2019 apple coo jeff williams said apple wanted use qualcomm modems iphone xs xr qualcomm refused sell apple sued licensing practices leading apple using intel modems instead april 16 2019 opening arguments begun suit two companies settled apple pay unspecified amount enter six-year patent licensing agreement multi-year agreement qualcomm provide hardware company intel concurrently announced would longer develop 5g modems mobile devices later announced july 2019 would sell majority smartphone modem business apple 1 billion april 2006 dispute reliance communications qualcomm royalty fees cost qualcomm approximately 11.7b market capitalization july 2007 reliance qualcomm decided settle matter agreed expand use cdma technology india june 2007 u.s. international trade commission blocked import new cell phone models based particular qualcomm microchips found qualcomm microchips infringe patents owned broadcom broadcom also initiated patent litigation u.s. courts issue issue software designed extend battery life chips users make out-of-network calls october itc administrative judge made initial ruling qualcomm violated broadcom patent covering feature commission later affirmed decision sprint nextel corp. using software patch qualcomm get around u.s. government agency ban new phones qualcomm chips august 2007 judge rudi brewster held qualcomm engaged litigation misconduct withholding relevant documents lawsuit brought broadcom qualcomm employees lied involvement july 2009 south korea antitrust watchdog fined qualcomm record won260bn 207m unfair business practices related chipset sales sparking strong protests company fair trade commission accused qualcomm abusing dominant position korean market cdma mobile phone chips charging higher royalties handset makers bought modem chips competitors offering rebates customers bought products mainly us group regulator said statement 2009 qualcomm broadcom entered settlement multi-year patent agreement ending litigation companies 2012 federal probe launched company ’ compliance foreign corrupt practices act bars companies well individuals bribing foreign officials gain business 2014 china anti-monopoly regulator announced qualcomm suspected overcharging abusing market position february 2015 china moved fine qualcomm record 975 million tactics government claimed hurt consumers july 16 2015 european commission announced opened two antitrust investigations qualcomm behavior field baseband chipsets consumer devices july 2016 group women filed class-action gender discrimination lawsuit qualcomm alleging firm discriminated women science technology engineering mathematics areas class 3,400 employees suit settled august 2017 firm agreed pay 19.5 million plaintiff law firm said company also institute significant changes policies practices help eliminate gender disparities foster equal employment opportunity going forward march 2017 south korea found qualcomm prevented samsung selling chips phone makers current umts air interfaces part based qualcomm patents royalties patents represent significant part qualcomm revenue followed series patent-related lawsuits antitrust complaints spearheaded broadcom us 2006 broadcom started series patent-related lawsuits antitrust complaints qualcomm get broadcom regarded fair terms access w-cdma technologies broadcom soon joined nokia others complaints also filed european commission 2007 european commission launched inquiry qualcomm possible abusing dominant position market third-generation phones complaints first lodged 2005 leading handset manufacturers ericsson nokia nec panasonic texas instruments october 2008 nokia announced make one-time payment 2.29 billion us qualcomm part patent agreement company chinese tdscdma 3g technology developed primarily avoid qualcomm licensing fees although qualcomm claims chinese technology still infringes many qualcomm patents qchat push-to-talk ptt technology qchat software application developed qualcomm internet services qis division qualcomm part qualcomm wireless internet group qis offers set software products content enablement services support accelerate growth wireless data market qualcomm developed qchat provide reliable method instant connection two-way communication users different locations operating within type network architecture prior existence cellular personal communications services networks type communication limited private land mobile radio system lmr technology used public safety utility service agencies lmr limitations specifically usage restricted geographic coverage area use disparate frequency bands qchat application developed brew platform ptt communication technology 3g networks qchat handsets server software allow users connect instantaneously qchat users anywhere world push button addition qchat enables one-to-one private one-to-many group calls 3g networks qchat uses standard voice internet protocol voip technologies voip voice delivery mechanism uses internet protocol manage delivery voice information voice information sent digital form ip-based data networks including cdma discrete packets rather traditional circuit-switched protocols used public switched telephone network pstn qchat users 3g wireless devices connect worldwide either private group calls push button qchat uses voice internet protocol voip technologies allow subscribers communicate using ptt button handset instead making standard cellular call qchat calls created combining separate point-to-point connections ip endpoint process managed qchat applications server deployed carrier ip-based wide area network wan initiate call user presses ptt button receives immediate indication whether call recipient available caller begin speaking immediately recipient unavailable caller simply hear negative response tone instead busy signal voicemail october 16 2006 sprint nextel announced agreement qualcomm use qchat provide high performance push-to-talk services customers nationwide sprint pcs network using cdma2000 1xev-do revision technology qchat able inter-operate iden push-to-talk handsets nextel national network sprint phones supporting qchat technology released starting april 2008 trial business customers kansas colorado sprint announced nextel direct connect devices powered qchat available 40 markets june 2008 ending production new qchat devices november 2009 supported models included august 2016 computer security company check point found several serious security problems qualcomm chips bug called quadrooter ability let hackers read information android phones even worse hackers full access affected user installs app exploits one vulnerabilities according check point affects 900 million android users affected phones include recent android phones check point published scan tool android users blackberry developing repair tool qualcomm released fixes four issues three included android updates top google phones time publication bug | [
7154,
6077,
712,
6427,
5029,
3956,
5030,
4317,
6435,
5740,
740,
7554,
7189,
1484,
1134,
446,
4749,
7956,
451,
1159,
5459,
463,
7975,
6179,
3009,
5822,
1183,
5486,
4783,
6910,
136,
1581,
6219,
7669,
1592,
1977,
4820,
1234,
6950,
3756,
66... | Validation |
6,875 | 9 | Space-cadet_keyboard:space-cadet keyboard space-cadet keyboard keyboard designed john l. kulp used lisp machines massachusetts institute technology mit inspired several still-current jargon terms field computer science influenced design emacs inspired knight keyboard developed knight tv system used mit incompatible timesharing system symbolics-labeled version shown used lm-2 symbolics repackaged version mit cadr later symbolics systems used greatly simplified keyboard symbolics keyboard retained basic layout commonly used function modifier keys space-cadet keyboard space-cadet keyboard equipped seven modifier keys four keys bucky bits three shift keys called labeled top introduced earlier knight keyboard introduced keyboard group row thus allowing easy pressing several modifier keys via chording example could pressed fingers one hand pressing another key hand many keys three symbols accessible via shift keys letter symbol top greek letter front example key l two-way arrow ↔ top greek letter lambda λ front pressing key right hand playing appropriate chord left hand shift keys user could get following results might addition typed combination keys keyboard possible type 8,000 different characters allowed user type complicated mathematical text also thousands single-character commands disposal many users willing memorise command meanings many characters reduced typing time attitude shaped interface emacs compare use key vi due convenient position key adm-3a terminal users however thought many bucky bits overkill objected design grounds keyboard require three four hands operate result emacs making frequent use multiple modifiers easy space-cadet keyboard substantially harder use modern keyboards whose layout generally follows model ibm pc keyboard modifier keys grouped together thus harder press together also reason emacs uses m- prefix describing key presses m- stood space-cadet keyboard emacs ported pcs key used place keyboard included key limited application support also included four roman numeral keys allowed easy interaction lists four fewer choices | [
6269,
785
] | Test |
6,876 | 9 | GNU_Common_Lisp:gnu common lisp gnu common lisp gcl gnu project ansi common lisp compiler evolutionary development kyoto common lisp produces native object code first generating c code calling c compiler gcl implementation choice several large projects including mathematical tools maxima axiom hol88 acl2 gcl runs eleven different architectures linux freebsd solaris mac os x microsoft windows gcl remains active development stable releases 2014-10-28 prerelease development followed using git revision control system | [
7878,
1445,
6796,
6087,
2915,
2559,
5734,
1478,
4332,
4704,
5757,
6116,
7559,
3981,
1116,
6471,
2599,
2600,
5077,
2249,
1889,
1890,
5787,
1523,
4759,
6888,
3370,
1557,
6191,
5494,
5501,
4070,
6210,
144,
7298,
5515,
8025,
3749,
5883,
4837,... | Test |
6,877 | 9 | Andrew_Appel:andrew appel andrew wilson appel born 1960 eugene higgins professor computer science princeton university new jersey especially well-known compiler books modern compiler implementation ml series well compiling continuations also major contributor standard ml new jersey compiler along david macqueen john h. reppy matthias blume others one authors rog-o-matic andrew appel son mathematician kenneth appel proved four-color theorem 1976 appel gained a.b summa cum laude physics princeton university 1981 ph.d. computer science carnegie-mellon university 1985 became acm fellow 1998 due research programming languages compilers 1981 appel developed better approach n-body problem linearithmic instead quadratic time july 2005 july 2006 visiting researcher institut national de recherche en informatique et en automatique inria rocquencourt france sabbatical princeton university andrew appel campaigns issues related interaction law computer technology testified penalty phase microsoft antitrust case 2002 opposed introduction computerized voting machines deemed untrustworthy 2007 received attention purchased number voting machines purpose investigating security | [
1361,
5986,
4039
] | Test |
6,878 | 1 | Oracle_Enterprise_Manager:oracle enterprise manager oracle enterprise manager oem em set web-based tools aimed managing software hardware produced oracle corporation well non-oracle entities oracle enterprise manager includes three releases oracle enterprise manager database control oldest arguably best-known release aims manage oracle databases originated java client able configure manage databases oracle application server also web-interface manage application server managing lots databases application servers according oracle corporation preferably grid solution one could use oracle enterprise manager grid control manage multiple instances oracle deployment platforms recent edition also allows management monitoring platforms microsoft .net microsoft sql server netapp filers bea weblogic others partners organizations build extensions oracle enterprise manager make available enterprise manager users via oracle hosted web site called oracle enterprise manager extensibility exchange system monitoring features include monitoring functionality supports detection notification impending problems monitors oracle database instances oracle real application clusters oracle application server farms clusters oem grid control comes set performance health metrics allow monitoring technology components applications application servers databases well back-end components rely hosts operating systems storage architecture oem grid control three distinct components oma runs target host collects information hardware operating system applications run target oms runs one two servers collects data generated omas oms pulls information omas aggregates collections repository oms also acts user-interface — generating web-pages database administrators view status systems services omr comprises instance oracle database stores data collected oms installers make omr highly available fault-tolerant running oracle rac instance across multiple nodes plug-ins omas customise manipulate data presented oem extending data omas collect administrators customize analysis data management packs look specific collections data display system performance release oem allows design configuration custom plug-ins monitor application desired omas collect data using custom-built plug-in transmit results xml format back oms stores analyzes data desired oracle enterprise manager continues expand monitoring scope offering management plug-ins non-oracle components oracle-developed developed partnership third-party vendors example plug-ins veritas storage foundation vmware vsphere emc clariion available key features oem grid control oracle release since 13c oracle enterprise manager performs much activity intelligent agents oracle corporation refers oracle management agents run autonomous proxy processes managed node perform execution monitoring tasks oracle enterprise manager communicating using hypertext transfer protocol http https default upon installation oma enables several packs change management performance tuning diagnostics configuration management without regard customer licensed users need de-select unlicensed packs installing agent target database oem uses default codice_1 schema oracle database super-administrator account/repository utility programs codice_2 codice_3 carry actual functions oem also provides command-line alternative emcli em command line interface verbs provide functionality ui-based em | [
7788,
2961,
4159,
7213,
6184,
7368,
3172,
7715,
6345,
6386,
1223,
3383
] | Test |
6,879 | 4 | Tunneling_protocol:tunneling protocol computer networks tunneling protocol communications protocol allows movement data one network another involves allowing private network communications sent across public network internet process called encapsulation tunneling involves repackaging traffic data different form perhaps encryption standard hide nature traffic run tunnel tunneling protocol works using data portion packet payload carry packets actually provide service tunneling uses layered protocol model osi tcp/ip protocol suite usually violates layering using payload carry service normally provided network typically delivery protocol operates equal higher level layered model payload protocol tunneling protocol may example allow foreign protocol run network support particular protocol running ipv6 ipv4 another important use provide services impractical unsafe offered using underlying network services providing corporate network address remote user whose physical network address part corporate network users also use tunneling sneak firewall using protocol firewall would normally block wrapped inside protocol firewall block http firewall policy specifically exclude kind wrapping trick function get around intended firewall policy set interlocked firewall policies another http-based tunneling method uses http connect method/command client issues http connect command http proxy proxy makes tcp connection particular server port relays data server port client connection creates security hole connect-capable http proxies commonly restrict access connect method proxy allows connections specific ports 443 https example network layer network layer generic routing encapsulation gre protocol running ip ip protocol number 47 often serves carry ip packets rfc 1918 private addresses internet using delivery packets public ip addresses case delivery payload protocols payload addresses incompatible delivery network also possible establish connection using data link layer layer 2 tunneling protocol l2tp allows transmission frames two nodes tunnel encrypted default relies tcp/ip protocol chosen determine level security ssh uses port 22 enable data encryption payloads transmitted public network internet connection thereby providing vpn functionality ipsec end-to-end transport mode also operate tunneling mode trusted security gateway understand particular protocol stack imposed tunneling network engineers must understand payload delivery protocol sets secure shell ssh tunnel consists encrypted tunnel created ssh protocol connection users may set ssh tunnels transfer unencrypted traffic network encrypted channel example microsoft windows machines share files using server message block smb protocol non-encrypted protocol one mount microsoft windows file-system remotely internet someone snooping connection could see transferred files mount windows file-system securely one establish ssh tunnel routes smb traffic remote fileserver encrypted channel even though smb protocol contains encryption encrypted ssh channel travels offers security ssh connection established tunnel starts ssh listening port remote local host connections forwarded specified address port originating opposing remote local previously host tunneling tcp- encapsulating payload ppp tcp-based connection ssh port forwarding known tcp-over-tcp induce dramatic loss transmission performance problem known tcp meltdown virtual private network software may instead use protocol simpler tcp tunnel connection however often problem using openssh port forwarding many use cases entail tcp-over-tcp tunneling meltdown avoided openssh client processes local client-side tcp connection order get actual payload sent sends payload directly tunnel tcp connection server side openssh server similarly unwraps payload order wrap routing final destination naturally wrapping unwrapping also occurs reverse direction bidirectional tunnel ssh tunnels provide means bypass firewalls prohibit certain internet services long site allows outgoing connections example organization may prohibit user accessing internet web pages port 80 directly without passing organization proxy filter provides organization means monitoring controlling user sees web users may wish web traffic monitored blocked organization proxy filter users connect external ssh server create ssh tunnel forward given port local machine port 80 remote web server access remote web server users would point browser local port nowiki http //localhost/ /nowiki ssh clients support dynamic port forwarding allows user create socks 4/5 proxy case users configure applications use local socks proxy server gives flexibility creating ssh tunnel single port previously described socks free user limitations connecting predefined remote port server application n't support socks proxifier used redirect application local socks proxy server proxifiers proxycap support ssh directly thus avoiding need ssh client recent versions openssh even allowed create layer 2 layer 3 tunnels ends enabled tunneling capabilities creates codice_1 layer 3 default codice_2 layer 2 virtual interfaces ends connection allows normal network management routing used used routers traffic entire subnetwork tunneled pair codice_2 virtual interfaces function like ethernet cable connecting ends connection join kernel bridges | [
7148,
709,
4294,
4676,
4677,
7170,
4683,
6432,
1462,
2566,
5039,
6446,
2219,
3640,
4706,
4709,
3312,
7214,
7217,
2612,
3337,
4014,
1900,
7598,
456,
2281,
6521,
106,
1175,
2644,
6531,
2650,
5125,
121,
7637,
4414,
5485,
5488,
1559,
6908,
... | Test |
6,880 | 6 | Live_File_System:live file system live file system term microsoft uses describe packet writing method creating discs windows vista later allows files added incrementally media discs use udf file system live file system option used default autoplay formatting/erasing cd/dvd -r -rw older windows versions support reading latest udf versions users create dvd/cds windows vista using udf 2.50 may readable systems including windows xp older pre-mac os 10.5 apple systems unless third-party udf reader driver installed ensure compatibility disks created windows vista udf 2.01 lower selected | [
4759,
5090,
3598
] | Test |
6,881 | 5 | Phase-fired_controller:phase-fired controller phase-fired control pfc also called phase cutting phase angle control method power limiting applied ac voltages works modulating thyristor scr triac thyratron gated diode-like devices conduction predetermined phase applied waveform phase-fired control pfc often used control amount voltage current power power supply feeds load create average value output supply dc output time base importance deciding pulse supply value pulsed continuous pfc differs pulse-width modulation pwm addresses supplies output modulated waveform sinusoidal ac waveform national grid outputs becomes important supply pulse correct position modulation cycle known value achieved example controller could turn peak waveform base cycle time base taken consideration phase-fired controllers take name fact trigger pulse output certain phase input modulation cycle essence pfc controller synchronise modulation present input phase-fired controllers use thyristors solid state switching devices control elements thyristor-based controllers may utilise gate turn-off gto thyristors allowing controller decide switch output turn rather wait waveform return zero phase-fired controller like buck topology switched-mode power supply able deliver output maximum equal present input minus losses occurring control elements provided modulation cycle predictable repetitive national grid ac mains obtain output lower input phase-fired control simply switches given phase angle input modulation cycle triggering device conduction phase angle greater 0 degrees point modulation cycle starts fraction total energy within cycle present output achieve boost -like effect pfc designs must derated maximum present input higher nominal output requirements supply first turned operating nominal conditions controller continually delivering less 100 input boost required controller delivers percentage closer 100 maximum input available derating mains powered phase-fired controllers important often used control resistive loads heating elements time resistance heating elements increase account phase-fired control must able provide degree extra voltage draw heating current element way achieving purposely design supply require less 100 input modulation cycle elements first put place progressively opening supply towards delivering 100 input modulation cycle elements age common application dimmer switches domestic lighting control industrial applications previously extremely expensive heavy multi-tapped transformers used supplies elements corresponding winding tap connected element produce desired temperature limited temperature resolution number tap combinations available often find way controllers designed equipment electric ovens furnaces modern usually high power equipment transformer replaced phase-fired controllers connecting load directly mains resulting substantially cheaper lighter system however method usually limited use equipment would unrealistic without removal mains transformer means load electrical continuity input industrial ovens furnaces input often national grid ac electrically referenced ground controller output referenced ground user need contact earth one output terminals risk receiving electrical shock many high-power items equipment running three-phase 415 v high current inputs enclosure framework present earthed grounded serious risk must carefully assessed first patent phase-fired controllers derives 1912 however realization first possible 1920s mercury-arc valve rectifiers control grids became available however method voltage regulation common time limitations mercury arc valves became widespread invention solid-state thyristors end 1950s burst-fired controllers | [] | Test |
6,882 | 9 | Syntax_(programming_languages):syntax programming languages computer science syntax computer language set rules defines combinations symbols considered correctly structured document fragment language applies programming languages document represents source code markup languages document represents data syntax language defines surface form text-based computer languages based sequences characters visual programming languages based spatial layout connections symbols may textual graphical documents syntactically invalid said syntax error.when designing syntax language designer starts writing examples legal illegal strings trying figure general rules examples syntax therefore refers form contrasted semantics – meaning processing computer languages semantic processing generally comes syntactic processing however cases semantic processing necessary complete syntactic analysis done together concurrently compiler syntactic analysis comprises frontend semantic analysis comprises backend middle end phase distinguished computer language syntax generally distinguished three levels distinguishing way yields modularity allowing level described processed separately often independently first lexer turns linear sequence characters linear sequence tokens known lexical analysis lexing second parser turns linear sequence tokens hierarchical syntax tree known parsing narrowly speaking thirdly contextual analysis resolves names checks types modularity sometimes possible many real-world languages earlier step depends later step – example lexer hack c tokenization depends context even cases syntactical analysis often seen approximating ideal model parsing stage divided two parts parse tree concrete syntax tree determined grammar generally far detailed practical use abstract syntax tree ast simplifies usable form ast contextual analysis steps considered form semantic analysis adding meaning interpretation syntax alternatively informal manual implementations syntactical rules would difficult awkward describe implement formally levels generally correspond levels chomsky hierarchy words regular language specified lexical grammar type-3 grammar generally given regular expressions phrases context-free language cfl generally deterministic context-free language dcfl specified phrase structure grammar type-2 grammar generally given production rules backus–naur form bnf phrase grammars often specified much constrained grammars full context-free grammars order make easier parse lr parser parse dcfl linear time simple lalr parser even simpler parser efficient parse grammars whose production rules constrained principle contextual structure described context-sensitive grammar automatically analyzed means attribute grammars though general step done manually via name resolution rules type checking implemented via symbol table stores names types scope tools written automatically generate lexer lexical specification written regular expressions parser phrase grammar written bnf allows one use declarative programming rather need procedural functional programming notable example lex-yacc pair automatically produce concrete syntax tree parser writer must manually write code describing converted abstract syntax tree contextual analysis also generally implemented manually despite existence automatic tools parsing often implemented manually various reasons – perhaps phrase structure context-free alternative implementation improves performance error-reporting allows grammar changed easily parsers often written functional languages haskell scripting languages python perl c c++ example codice_1 syntactically valid lisp program assuming 'add function exists else name resolution fails adding 1 1 however following invalid note lexer unable identify first error – knows producing token left_paren remainder program invalid since word rule begins second error detected parsing stage parser identified list production rule due token match thus give error message general may ambiguous type errors undeclared variable errors sometimes considered syntax errors detected compile-time usually case compiling strongly-typed languages though common classify kinds error semantic errors instead example python code contains type error adds string literal integer literal type errors kind detected compile-time detected parsing phrase analysis compiler uses separate rules allow integerliteral integerliteral stringliteral integerliteral though likely compiler use parsing rule allows expressions form literaloridentifier literaloridentifier error detected contextual analysis type checking occurs cases validation done compiler errors detected runtime dynamically typed language type determined runtime many type errors detected runtime example python code syntactically valid phrase level correctness types b determined runtime variables types python values whereas disagreement whether type error detected compiler called syntax error rather static semantic error type errors detected program execution time always regarded semantic rather syntax errors syntax textual programming languages usually defined using combination regular expressions lexical structure backus–naur form grammatical structure inductively specify syntactic categories nonterminals terminal symbols syntactic categories defined rules called productions specify values belong particular syntactic category terminal symbols concrete characters strings characters example keywords define let void syntactically valid programs constructed language different equivalent grammars equivalent regular expressions lexical levels different phrase rules generate language using broader category grammars lr grammars allow shorter simpler grammars compared restricted categories grammar may require longer grammars rules different equivalent phrase grammars yield different parse trees though underlying language set valid documents simple grammar defined using notation regular expressions extended backus–naur form describes syntax s-expressions data syntax programming language lisp defines productions syntactic categories expression atom number symbol list grammar specifies following decimal digits upper- lower-case characters parentheses terminal symbols following examples well-formed token sequences grammar 'codice_2 'codice_3 'codice_4' grammar needed specify programming language classified position chomsky hierarchy phrase grammar programming languages specified using type-2 grammar i.e. context-free grammars though overall syntax context-sensitive due variable declarations nested scopes hence type-1 however exceptions languages phrase grammar type-0 turing-complete languages like perl lisp specification implementation language allows constructs execute parsing phase furthermore languages constructs allow programmer alter behavior parser combination effectively blurs distinction parsing execution makes syntax analysis undecidable problem languages meaning parsing phase may finish example perl possible execute code parsing using codice_5 statement perl function prototypes may alter syntactic interpretation possibly even syntactic validity remaining code colloquially referred perl parse perl code must executed parsing modify grammar strongly even perl parse perl undecidable similarly lisp macros introduced codice_6 syntax also execute parsing meaning lisp compiler must entire lisp run-time system present contrast c macros merely string replacements require code execution syntax language describes form valid program provide information meaning program results executing program meaning given combination symbols handled semantics either formal hard-coded reference implementation syntactically correct programs semantically correct many syntactically correct programs nonetheless ill-formed per language rules may depending language specification soundness implementation result error translation execution cases programs may exhibit undefined behavior even program well-defined within language may still meaning intended person wrote using natural language example may possible assign meaning grammatically correct sentence sentence may false following c language fragment syntactically correct performs operation semantically defined p null pointer operations p- real p- im meaning simpler example syntactically valid semantically defined uses uninitialized variable even though compilers programming languages e.g. java c would detect uninitialized variable errors kind regarded semantic errors rather syntax errors quickly compare syntax various programming languages take look list hello world program examples | [
3931,
2451,
5983,
4573,
1345,
7246,
4853,
878,
993,
5288,
5731,
1361,
1365,
564,
2740,
3188,
3784,
3368,
304,
831,
7375,
666,
4611,
5056,
5498,
6118,
4070,
7277,
7382,
592,
5506,
5326,
3898,
6471,
154,
336,
8027,
5171,
251,
4003,
5965,
... | Train |
6,883 | 2 | Gamin:gamin gamin monitoring system files directories independently implements subset fam file alteration monitor running service allows detection modifications file directory gam_server functions daemon gamin word gamin french also female form gamine refers boy gamin project built earlier project called marmot french means child brat linux gamin uses inotify dnotify monitor filesystem activity freebsd gamin uses kqueue/kevent native freebsd kernel event notification mechanism case kqueue one major drawback compared inotify inotify filename-based monitoring facility kqueue uses file descriptors identification monitored files freebsd gam_server open file monitored directory issue monitoring directories many files stored system could easily reach kernel limits maximum file descriptor count kern.maxfiles kern.maxfilesperproc | [
1710,
7959,
2091,
7159,
2728,
4771,
1267,
4685,
6011,
5571,
578,
499,
2131,
3152,
1434
] | Validation |
6,884 | 2 | Knopperdisk:knopperdisk knopperdisk operating system specifically designed usb pen drive floppy disks knopperdisk fairly minimal text system used rescue disk although usb pen drive version software packages installed used different purposes despite similarity name knoppix based gentoo linux | [
5200,
1629,
3444,
7251,
474,
7075,
5571,
1941,
314,
2758,
1663,
2864,
6209,
6761,
2063,
343,
4824,
5523,
7587,
5259,
1893,
5530,
5704,
6317,
7954,
6244
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.