node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
6,885
2
Windows_Imaging_Format:windows imaging format windows imaging format wim file-based disk image format developed microsoft help deploy windows vista subsequent versions windows operating system family well windows fundamentals legacy pcs like disk image formats wim file contains set files associated filesystem metadata however unlike sector-based formats iso vhd wim file-based fundamental unit information wim file primary advantages file-based hardware independence single-instance storage file referenced multiple times filesystem tree since files stored inside single wim file overhead opening closing many individual files reduced cost reading writing many thousands individual files local disk negated hardware software-based disk caching well sequential reading writing data wim files contain multiple disk images referenced either numerical index unique name due use single-instance storage successive disk image common previous images added wim file less new data added wim also split spanned multiple parts .swm extension wim images made bootable windows boot loader supports booting windows within wim file windows setup dvd windows vista later use wim files case boot.wim contains bootable version windows pe installation performed setup files held install.wim imagex command-line tool used create edit deploy windows disk images windows imaging format distributed part free windows automated installation kit waik starting windows vista windows setup uses waik api install windows first distributed prototype imagex build 6.0.4007.0 main.030212-2037 allowed microsoft oem partners experiment imaging technology developed parallel longhorn alpha prototypes first introduced milestone 4 longhorn project used later builds longhorn build 6.0.5384.4 added significant advantages previous versions like read-only read/write folder mounting capabilities splitting multiple image files swm wim filter driver latest lzx compression algorithms used since pre-rc release candidates windows vista deployment image service management tool dism tool introduced windows 7 windows server 2008 r2 perform servicing tasks windows installation image online image i.e one user running offline image within folder wim file features include mounting unmounting images querying installed device drivers offline image adding device driver offline image possible repair dism image using either windows installation cd windows update windows server 2012 windows 8 dism incorporated majority imagex functions imagex still needed image capture however dism deprecated imagex windows 8 since april 30 2012 open source library handling wim format available library used unix-like systems well windows thanks project gnu/linux distributions imagex clone called wimlib-imagex allows mounting wim images managing read/write like file system wim images basically using lzx compression algorithm accessed using file archivers like 7-zip operating systems might support format still possible convert .wim images commonly used iso image using windows assessment deployment kit windows
[ 7879, 3937, 3263, 378, 2198, 6096, 1475, 7553, 7195, 5410, 7564, 2953, 5069, 422, 6844, 2245, 7584, 435, 5442, 4377, 5090, 3340, 7602, 6164, 458, 4759, 1534, 7619, 2999, 5475, 6528, 2290, 4774, 1181, 3711, 5134, 7272, 1571, 5850, 140, 6...
Validation
6,886
9
Multiple_dispatch:multiple dispatch multiple dispatch multimethods feature programming languages function method dynamically dispatched based run time dynamic type general case attribute one arguments generalization single dispatch polymorphism function method call dynamically dispatched based derived type object method called multiple dispatch routes dynamic dispatch implementing function method using combined characteristics one arguments developers computer software typically organize source code named blocks variously called subroutines procedures subprograms functions methods code function executed calling – executing piece code references name transfers control temporarily called function function execution completed control typically transferred back instruction caller follows reference function names usually selected descriptive function purpose sometimes desirable give several functions name often perform conceptually similar tasks operate different types input data cases name reference function call site sufficient identifying block code executed instead number type arguments function call also used select among several function implementations conventional i.e. single-dispatch object-oriented programming languages invoking method sending message smalltalk calling member function c++ one arguments treated specially used determine potentially many methods name applied many languages special argument indicated syntactically example number programming languages put special argument dot making method call codice_1 codice_2 would produce roar whereas codice_3 would produce cheep contrast languages multiple dispatch selected method simply one whose arguments match number type function call special argument owns function/method carried particular call common lisp object system clos early well-known example multiple dispatch working languages discriminate data types compile time selecting among alternatives occur act creating alternative functions compile time selection usually referred overloading function programming languages defer data type identification run time i.e. late binding selection among alternative functions must occur based dynamically determined types function arguments functions alternative implementations selected manner referred generally multimethods run time cost associated dynamically dispatching function calls languages distinction overloading multimethods blurred compiler determining whether compile time selection applied given function call whether slower run time dispatch needed estimate often multiple dispatch used practice muschevici et al studied programs use dynamic dispatch analyzed nine applications mostly compilers written six different languages common lisp object system dylan cecil multijava diesel nice results show 13–32 generic functions use dynamic type one argument 2.7–6.5 use dynamic type multiple arguments remaining 65–93 generic functions one concrete method overrider thus considered use dynamic types arguments study reports 2–20 generic functions two 3–6 three concrete function implementations numbers decrease rapidly functions concrete overriders multiple dispatch used much heavily julia multiple dispatch central design concept origin language collecting statistics muschevici average number methods per generic function found julia standard library uses double amount overloading languages analyzed muschevici 10 times case binary operators data papers summarized following table dispatch ratio codice_4 average number methods per generic function choice ratio codice_5 mean square number methods better measure frequency functions large number methods degree specialization dos average number type-specialized arguments per method i.e. number arguments dispatched theory multiple dispatching languages first developed castagna et al. defining model overloaded functions late binding yielded first formalization problem covariance contravariance object-oriented languages solution problem binary methods distinguishing multiple single dispatch may made clearer example imagine game among user-visible objects spaceships asteroids two objects collide program may need different things according hit language multiple dispatch common lisp might look like common lisp example shown similarly methods explicit testing dynamic casting used presence multiple dispatch traditional idea methods defined classes contained objects becomes less appealing—each collide-with method attached two different classes one hence special syntax method invocation generally disappears method invocation looks exactly like ordinary function invocation methods grouped classes generic functions julia built-in multiple dispatch central language design julia version example might look like collide_with x :asteroid :asteroid ... deal asteroid hitting asteroid collide_with x :asteroid :spaceship ... deal asteroid hitting spaceship collide_with x :spaceship :asteroid ... deal spaceship hitting asteroid collide_with x :spaceship :spaceship ... deal spaceship hitting spaceship perl 6 like past versions uses proven ideas languages type systems shown offer compelling advantages compiler-side code analysis powerful user-side semantics via multiple dispatch multimethods multisubs since operators subroutines also multiple dispatched operators along usual type constraints also constraints allow making specialized subroutines subset mass real 0 ^..^ inf role stellar-object class asteroid stellar-object class spaceship stellar-object str destroyed obliterated destroyed mangled str damaged « damaged 'collided 'was damaged » multi sub infix « » stellar-object stellar-object b a.mass b.mass proto sub collide stellar-object stellar-object multi sub collide b b multi sub collide b b multi sub collide b multi sub collide spaceship spaceship b == b multi sub collide asteroid mass asteroid mass b spaceship enterprise .= new mass 1 :name 'the enterprise collide asteroid.new mass .1 enterprise collide enterprise spaceship.new mass .1 collide enterprise asteroid.new mass 1 collide enterprise spaceship.new mass 1 collide asteroid.new mass 10 asteroid.new mass 5 languages support multiple dispatch language definition syntactic level python often possible add multiple dispatch using library extension example module multimethods.py provides clos-style multimethods python without changing underlying syntax keywords language multimethods import dispatch game_objects import asteroid spaceship game_behaviors import asfunc ssfunc safunc collide dispatch collide.add_rule asteroid spaceship asfunc collide.add_rule spaceship spaceship ssfunc collide.add_rule spaceship asteroid safunc def aafunc b collide.add_rule asteroid asteroid aafunc collide thing1 thing2 functionally similar clos example syntax conventional python using python 2.4 decorators guido van rossum produced sample implementation multimethods simplified syntax multimethod asteroid asteroid def collide b multimethod asteroid spaceship def collide b goes define multimethod decorator peak-rules package provides multiple dispatch syntax similar example later replaced pyprotocols reg library also supports multiple predicate dispatch c dynamic dispatch must implemented manually form often enum used identify subtype object dynamic dispatch done looking value function pointer branch table simple example c typedef void *collisioncase void void collision_aa void /* handle asteroid-asteroid collision */ void collision_as void /* handle asteroid-spaceship collision */ void collision_sa void /* handle spaceship-asteroid collision */ void collision_ss void /* handle spaceship-spaceship collision*/ typedef enum thing collisioncase collisioncases num_thing_types num_thing_types void collide thing thing b int main void c object system library c support dynamic dispatch similar clos fully extensible need manual handling methods dynamic message methods dispatched dispatcher cos faster objective-c example cos // classes defclass asteroid // data members endclass defclass spaceship // data members endclass // generics defgeneric _bool collide_with _1 _2 // multimethods defmethod _bool collide_with asteroid asteroid endmethod defmethod _bool collide_with asteroid spaceship endmethod defmethod _bool collide_with spaceship asteroid endmethod defmethod _bool collide_with spaceship spaceship endmethod // example use int main void c++ natively supports single dispatch though adding multi-dispatch considered methods working around limit analogous use either visitor pattern dynamic cast library pointer-to-method lookup table class thing class asteroid public thing class spaceship public thing thing :collisionhandlermap thing :collisioncases const std :uint32_t asteroid :cid typeid asteroid .hash_code const std :uint32_t spaceship :cid typeid spaceship .hash_code void asteroid :initcases void spaceship :initcases int main yomm2 library provides fast orthogonal implementation open multimethods syntax declaring open methods inspired proposal native c++ implementation library requires user registers classes used virtual arguments sub-classes require modifications existing code methods implemented ordinary inline c++ functions overloaded passed pointer limit number virtual arguments arbitrarily mixed non-virtual arguments library uses combination techniques compressed dispatch tables perfect integer hash implement method calls constant time mitigating memory usage dispatching call open method single virtual argument takes 15-30 time calling ordinary virtual member function modern optimizing compiler used asteroids example implemented follows using yorel :yomm2 :virtual_ class thing class asteroid public thing class spaceship public thing register_class thing register_class spaceship thing register_class asteroid thing declare_method void collidewith virtual_ thing virtual_ thing define_method void collidewith thing left thing right define_method void collidewith asteroid left asteroid right define_method void collidewith asteroid left spaceship right define_method void collidewith spaceship left asteroid right define_method void collidewith spaceship left spaceship right int main stroustrup mentions design evolution c++ liked concept multimethods considered implementing c++ claims unable find efficient sample implementation comparable virtual functions resolve possible type ambiguity problems states although feature would still nice approximately implemented using double dispatch type based lookup table outlined c/c++ example low priority feature future language revisions many object-oriented programming languages natively supports single dispatch however possible emulate open multimethods library function d. openmethods library example // declaration matrix plus virtual matrix virtual matrix // override two densematrix objects method matrix _plus densematrix densematrix b // override two diagonalmatrix objects method matrix _plus diagonalmatrix diagonalmatrix b language single dispatch java multiple dispatch emulated multiple levels single dispatch interface collideable class asteroid implements collideable class spaceship implements collideable run time codice_6 checks one levels also used also multi-parameter type classes haskell scala used emulate multiple dispatch
[ 5983, 1445, 6888, 6428, 6982, 7071, 8082, 2740, 8097, 4878, 7370, 4705, 7557, 4070, 1676, 7573, 8122, 1407, 7853, 8025, 7936, 7032, 4543, 1889, 2156, 4999, 5965, 7219, 1989, 2530, 2619, 1435 ]
Test
6,887
7
Open_Grid_Services_Infrastructure:open grid services infrastructure open grid services infrastructure ogsi published global grid forum ggf proposed recommendation june 2003 intended provide infrastructure layer open grid services architecture ogsa ogsi takes statelessness issues along others account essentially extending web services accommodate grid computing resources transient stateful web services groups started integrate approaches capturing state web services resource framework wsrf release gt4 open source tool kit migrating back pure web services implementation rather ogsi via integration wsrf ogsi former set extensions web services provide stateful interactions -- would say point obsolete jay unger said model used globus toolkit 3.0 replaced wsrf ws-security broader set web services standards ogsa focuses specific service definition areas execution components execution modeling grid data components information virtualization still important role play evolution standards open source tool kits like globus
[ 7930, 4159, 110, 5539 ]
Test
6,888
9
Common_Lisp_Object_System:common lisp object system common lisp object system clos facility object-oriented programming part ansi common lisp clos powerful dynamic object system differs radically oop facilities found static languages c++ java clos inspired earlier lisp object systems mit flavors commonloops although general either originally proposed add-on clos adopted part ansi standard common lisp adapted lisp dialects eulisp emacs lisp basic building blocks clos classes methods instances classes generic functions clos provides macros define codice_1 codice_2 codice_3 instances created function codice_4 classes multiple superclasses list slots member variables c++/java parlance special metaclass slots allocated class instances class share slot instance slot name value slot accessed name using function codice_5 additionally special generic functions defined write read values slots slot clos class must unique name clos multiple dispatch system means methods specialized upon required arguments oo languages single-dispatch meaning methods specialized first argument another unusual feature methods belong classes classes provide namespace generic functions methods methods defined separately classes special access e.g self protected class slots methods clos grouped generic functions generic function object callable like function associates collection methods shared name argument structure specialized different arguments since common lisp provides non-clos classes structures built-in data types numbers strings characters symbols ... clos dispatch works also non-clos classes clos also supports dispatch individual objects eql specializers clos default support dispatch common lisp data types example dispatch work fully specialized array types types introduced codice_6 however common lisp implementations provide metaobject protocol allows generic functions provide application specific specialization dispatch rules dispatch clos also different oo languages dispatch mechanism works runtime adding removing methods thus may lead changed effective methods even generic function called arguments runtime changing method combination also may lead different effective methods example like oo systems dynamic languages clos enforce encapsulation slot accessed using codice_5 function via optionally auto-generated accessor methods access via codice_5 know name slot cl programmers use language package facility declare functions data structures intended export apart normal primary methods also codice_9 codice_10 codice_11 auxiliary methods former two invoked prior primary method particular order based class hierarchy codice_11 method control whether primary method executed additionally programmer specify whether possible primary methods along class hierarchy called one providing closest match standard method-combination provides primary around methods explained method-combinations method types new simple complex method-combinations method types defined clos allows multiple inheritance default order methods executed multiple inheritance correct programmer may resolve diamond inheritance problems specifying order method combinations clos dynamic meaning contents also structure objects modified runtime clos supports changing class definitions on-the-fly even instances class question already exist well changing class membership given instance codice_13 operator clos also allows one add redefine remove methods runtime circle-ellipse problem readily solved clos oop design patterns either disappear qualitatively simpler clos prototype language classes must defined objects instantiated members class outside ansi common lisp standard widely implemented extension clos called metaobject protocol mop mop defines standard interface underpinnings clos implementation treating classes slot-descriptions generic-functions methods instances metaclasses allows definition new metaclasses modification clos behavior flexibility clos mop prefigures aspect-oriented programming later developed engineers gregor kiczales mop defines behavior whole object system set protocols defined terms clos thus possible create new object-systems extending changing provided clos functionality book art metaobject protocol describes use implementation clos mop various common lisp implementations slightly different support meta-object protocol closer project aims provide missing features flavors successor new flavors object system mit lisp machine large parts lisp machine operating systems many applications use flavors new flavors flavors introduced multiple inheritance mixins among features flavors mostly obsolete though implementations common lisp exist flavors using message passing paradigm new flavors introduced generic functions commonloops successor loops xerox interlisp-d commonloops implemented common lisp portable implementation called portable commonloops pcl first implementation clos pcl widely ported still provides base clos implementation several common lisp implementations pcl implemented mostly portable common lisp system dependent parts power expressivity clos well historical availability tinyclos simplified portable clos implementation written gregor kiczales use scheme clos-like mop-based object systems become de facto norm lisp dialect implementations well finding way languages oop facilities
[ 7878, 1445, 5019, 1820, 6796, 6087, 2915, 5734, 1102, 1478, 4332, 2218, 4704, 4705, 5757, 6116, 7557, 1116, 6471, 7573, 2600, 5077, 1885, 2249, 1889, 1890, 7219, 1908, 795, 6876, 6886, 3370, 1557, 6191, 5494, 5501, 6210, 144, 4074, 4085, ...
Test
6,889
8
Win–loss_analytics:win–loss analytics win–loss analytics involves identifying analyzing reasons visitor website n't persuaded engage desired action conversion information allows web teams improve website navigation content identify individuals likely convert improve marketing efforts determining one person engaged desired action another long topic interest sales measurement conversion always possible sales data contrast marketing mostly concerned targeting masses results marketing traditionally difficult accurately measure internet much easier marketers collect data analysis evaluation order understand demonstrate effectiveness ineffectiveness efforts make changes improve thus yielding best result specific marketing campaign win-loss analytics web analytics tools existed since early days internet ubiquitous tools provide bird eye view website traffic information gathered allows webmasters make informed decisions making changes order improve website win–loss analytics tools track individual perspectives visitor uncovering visitor products qualified well persuaded n't convert win loss programs typically focus different elements buying process including gathering buyer feedback solution sold whether product service buyer perception effectiveness sales representative sales team buyer perceptions selling vendor overall firm reputation long-term financial viability price categories broken greater detail refined feedback example questions product service might include intuitiveness user interface effectiveness specific features functionality
[ 4600 ]
Validation
6,890
0
EXtended_WordNet:extended wordnet extended wordnet project university texas dallas funded national science foundation aims improve wordnet semantically parsing glosses thus making information contained definitions available automatic knowledge processing systems freely available bsd style license although updated since november 2004 recent version based wordnet 2.0 still remains useful resource database available set four xml files one verbs adverbs nouns adjectives following information extracted glosses example following information available synset excellent first-class fantabulous gloss word sense disambiguation parse tree logic form gloss first tagged using brill tagger glosses parsed using charniak parser in-house collins style parser parsed gloss assigned level quality page currently available
[ 733 ]
Test
6,891
9
GFA_BASIC:gfa basic gfa basic dialect basic programming language frank ostrowski name derived company gfa systemtechnik gmbh distributed software mid-1980s 1990s enjoyed popularity advanced basic dialect mostly superseded several programming languages official support ended early 2000s gfa basic developed frank ostrowski gfa systemtechnik gmbh later gfa software german company kiel düsseldorf gfa acronym gesellschaft für automatisierung company automation gave name software first gfa basic version released 1986 mid late 1980s became popular atari st home computer range since atari st basic shipped primitive later ports commodore amiga dos windows marketed version 2.0 popular release gfa basic offered many advanced features compared alternatives gfa basic 3.0 included improvements like support user-defined structures agglomerated data types final released version 3.6 around 2002 gfa software ceased gfa basic activities shut mailinglist website 2005 due missing official support availability gfa basic user community took support installed communication infrastructure version 2.0 popular release gfa basic modern programming language time line numbers used one line equivalent one command greatly simplify maintenance long listings ide even allowed code folding reasonable range structured programming commands — procedures local variables parameter passing value reference loop constructs etc modularization rudimentary making gfa basic 2.0 best suited small medium-sized projects gfa basic interpreter compact reasonably fast shipped runtime could distributed freely one programs compiler made available execution speed could increased approximately factor 2 gfa basic allowed extreme optimisations execution speed supporting direct assembler-level calls even ability embed sections assembler code directly within basic source code gfa basic integrated neatly gem tos atari st operating system providing menus dialog boxes mouse control see wimp interface although source code usually stored tokenized version save room disk pieces code could also saved ascii form made possible set reusable libraries tokenized source files benefit ways — instance gfa basic allowed users include binary data basic code via inline statement could even integrated gfa assembler allow users develop machine code programs inside inline statements order accelerate particular areas program also meant basic interpreter later compiler n't need tokenise program loaded would significant load-time overhead larger gfa basic programs written editions gfa manual printed black ink red paper attempt thwart photocopying bootlegging effectiveness tactic questionable manual returned usual black-on-white format complaints colour blind users proliferation re-typed copies internet gfa basic microsoft windows included thorough implementation windows api calls although product number technical advantages popular products combination easy language robust architecture fast compiled reliable code n't achieve great success windows market software professionals wanted high-performance code tended stay technical languages regard basics inferior professionals n't problem basic number well-established software tool vendors microsoft borland actively promoting new visual programming systems visual basic allowed users create windows dialog boxes populated standard components text buttons frame outlines help drag-and-drop interface object-oriented editing one advantages gfa basic windows compiler sold separately could create stand-alone .exe files also included relatively easy option creating dynamic link library .dll files windows allowed user write test routines within gfa basic export functions windows .dll file access pre-compiled functions within tools programs visual basic 3.0 unable produce compiled code feature allowed gfa basic used number-crunching add-on product visual basic writing high-speed routines applications database sorting media signal processing would impractical then-current version visual basic gfa basic company recognition product recognition factors companies microsoft borland united states market simple text-based code creation system lacked exciting new visual user interfaces better-known competitors although gfa basic windows developed include support visual basic components use gfa technical visual basic without large marketing budget clear reason journalists write gfa basic windows remained comparatively obscure product éric chahi wrote game editor gfa basic create game another world including scene design game scripting game engine polygon rendering music done assembler editor used make ports game including consoles collector edition windows released 2006 dashboard sustainability coded mostly gfa basic source 500kb plus 100kb assembly mainly accessing 32-bit windows functions
[ 3931, 5367, 1255, 4759, 12, 2463, 8183, 4139, 5651, 2925, 7448, 5926, 5129, 5571, 7906, 5137, 5234, 2941, 3303, 666, 6380, 1304, 61, 6394, 4003, 7864, 1789, 5877, 1604, 4012, 1989, 4915, 4745, 1064 ]
Test
6,892
2
Device_mapper:device mapper device mapper framework provided linux kernel mapping physical block devices onto higher-level virtual block devices forms foundation logical volume manager lvm software raids dm-crypt disk encryption offers additional features file system snapshots device mapper works passing data virtual block device provided device mapper another block device data also modified transition performed example case device mapper providing disk encryption simulation unreliable hardware behavior article focuses device mapper implementation linux kernel device mapper functionality also available netbsd dragonfly bsd applications like lvm2 enterprise volume management system evms need create new mapped devices talk device mapper via codice_1 shared library turn issues ioctls codice_2 device node configuration device mapper also examined configured interactivelyor shell scriptsby using utility two userspace components source code maintained alongside lvm2 source functions provided device mapper include linear striped error mappings well crypt multipath targets example two disks may concatenated one logical volume pair linear mappings one disk another example crypt target encrypts data passing specified device using linux kernel crypto api following mapping targets available following linux kernel features projects built top device mapper
[ 1438, 3256, 2182, 3613, 4670, 5021, 13, 7528, 3271, 7532, 2559, 3626, 5041, 5744, 6443, 7550, 405, 2942, 7555, 6117, 4341, 5762, 412, 415, 65, 3666, 5783, 2970, 5440, 5088, 6500, 785, 2266, 788, 7956, 1522, 5453, 7605, 5803, 4759, 5460,...
Validation
6,893
7
Shared_disk_architecture:shared disk architecture shared disk architecture sd distributed computing architecture disks accessible cluster nodes contrasts shared nothing architecture nodes sole access distinct disks multiple processors access disks directly via intercommunication network every processor local memory shared disk two advantages shared memory firstly processor memory memory bus bottleneck secondly system offers simple way provide degree fault tolerance
[ 3396, 6817 ]
Train
6,894
4
Trusted_third_party:trusted third party cryptography trusted third party ttp entity facilitates interactions two parties trust third party third party reviews critical transaction communications parties based ease creating fraudulent digital content ttp models relying parties use trust secure interactions ttps common number commercial transactions cryptographic digital transactions well cryptographic protocols example certificate authority ca would issue digital identity certificate one two parties next example ca becomes trusted-third-party certificates issuance likewise transactions need third party recordation would also need third-party repository service kind another 'trusted means system need trusted act interests option either involuntarily act interest 'trusted also means way verify system operating interests hence need trust corollary system verified operate interests would need trust shown operate interests one would use suppose alice bob wish communicate securely – may choose use cryptography without ever met bob alice may need obtain key use encrypt messages case ttp third party may previously seen bob person otherwise willing vouch key typically identity certificate belongs person indicated certificate case bob discussions third person often called trent trent gives alice uses send secure messages bob alice trust key bob trusts trent discussions simply assumed valid reasons course issue alice bob able properly identify trent trent someone impersonating trent arrange trustable third parties type unsolved problem long motives greed politics revenge etc. perform supervise work done entity provide potential loopholes necessary trust may leak problem perhaps unsolvable one ancient notorious large impersonal corporations make promises accuracy attestations correctness claimed public-key-to-user correspondence e.g. certificate authority part public key infrastructure changes little many environments strength trust weak weakest link infrastructure trusted ca breached whole chain trust broken 2011 incident ca diginotar broke trust dutch governments pki textbook example weaknesses system effects bruce schneier pointed 2013 mass surveillance disclosures third party fact ever trusted pgp cryptosystem includes variant ttp form web trust pgp users digitally sign identity certificates instructed confident person public key belong together key signing party one way combining get-together certificate signing nonetheless doubt caution remain sensible users careless signing others certificates trusting humans organizational creations risky example financial matters bonding companies yet find way avoid losses real world outside cryptography law many places makes provision trusted third parties upon whose claims one may rely instance notary public acts trusted third party authenticating acknowledging signatures documents ttp role cryptography much least principle certificate authority partially fills notary function attesting identity key owner whether party mentally aware apparent free duress certificate authority attest date signature
[ 907, 4945, 363, 5149, 2251, 7567, 6795, 6758, 4261, 354, 5773 ]
Test
6,895
4
IObit_Malware_Fighter:iobit malware fighter iobit malware fighter introduced 2004 anti-malware anti-virus program microsoft windows operating system windows xp later designed remove protect malware including trojans rootkits ransomware iobit malware fighter freeware version run alongside user existing anti-virus solution paid edition product comes anti-virus protection version 6 released 2018 product includes bitdefender engine commercial version along anti-malware engine new features latest release include improved user interface safe box feature protect specific folders unauthorized access mbr guard protects malicious attacks goldeneye/petya cryptocurrency mining scripts 2010 first beta iobit malware fighter 1.0 released public 2013 iobit malware fighter 2 released version iobit debuted cloud security component user upload file cloud determine whether malicious 2015 version 3 released 2016 version 4 added bitdefender anti-virus engine commercial edition 2017 version 5 released among new features anti-ransomware component version 6 released may 2018
[ 73, 4759, 5571, 1376, 7087, 6823 ]
Test
6,896
2
Xpeak:xpeak xpeak standard device management based xml platform agnostic initially focused financial applications restricted serves purpose apis like cen/xfs j/xfs restricted one operating system language since works client/server model using xml way homogenise communication application device services flexibility allows different parts whole business implemented different languages application various devices implemented java c++ still others device firmware designed based experiences cen/xfs j/xfs javapos instead using standards organization uses open source model develop architecture tools used project like base complete open source software solution named xpeaker way updated quickly openly users using internet means communication rather meetings requiring physical presence xpeak follows open source model participation project totally free moderated r open source foundation participated equal parts sun microsystems intecna initial code contribution responsibility cashware one leading companies devices connectivity use standards cen/xfs j/xfs xpeaker collection software projects integrally developed cashware philosophy open source commercialized dual license xpeaker public license commercial licence xpeaker includes following elements eclipse plugin permits made high level api access xpeak services xpeaking permits access said services different programming languages java c c++ c pascal
[ 3912 ]
Test
6,897
9
ARITH-MATIC:arith-matic arith-matic extension grace hopper a-2 programming language developed around 1955 arith-matic originally known a-3 renamed marketing department remington rand univac
[ 3166 ]
Test
6,898
9
WSFN_(programming_language):wsfn programming language wsfn stands nothing interpreted programming language controlling robots created li-chen wang designed small possible tiny language similar wang earlier effort palo alto tiny basic wsfn first published dr. dobb journal september 1977 language consists primarily single-letter commands tell robot move certain directions commands perform tests basic mathematical operations grouped named macros produce complex programs original version also included code simulated robot cursor vdm-1 display graphically cromemco dazzler display today known turtle graphics extended wsfn implementation created atari 8-bit family home computers written harry stewart published atari program exchange 1981 addition supporting turtle graphics adds number commands control graphics sound capabilities platform offered beginner language emphasis graphics wsfn consists number single-letter commands control movement turtle commands repeated prefixing number instance codice_1 moves turtle forward one step codice_2 moves 25 steps codice_3 codice_4 make turtle turn one unit right left respectively also reset point codice_5orth step sizes turn units defined robot hardware set one pixel 45 degrees turtle graphics versions missing robot versions computer versions codice_6 returns turtle home center screen codice_7 clears previous drawing thus one draw square string instructions set drawing color black clears screen fills current color sets color white homes turtle resets turtle point north draws series four lines 25 steps long rotating 90 degrees one result white square lower-left corner center screen lists commands surrounded parentheses create macros instance square drawn placing code draw one side square inside parentheses calling four times macros called within macros instance code draws series eight squares offset 45 degrees rotating around center screen macros assigned name using codice_8efine command extended wsfn used codice_9 instead code defines macro named x clear screen reset drawing another z draws square uses draw rotating square example wsfn rudimentary math capabilities consisting single accumulator codice_10 incremented decremented codice_11 codice_12 letter codice_10 placed anywhere number could appear one make series squares grow larger incrementing accumulator 5 times step side-effect syntax codice_14 would set accumulator zero performs decrement instruction number likewise codice_15 doubles value accumulator program control equally rudimentary consisting number commands handled if/then/else structures basic form codice_16est command follows one two paths accumulator greater equal zero instance command causes turtle turn 90 degrees left accumulator non-zero 45 right zero variations codice_16 branching construct include codice_18 randomly jumps first second branch 50 time codice_19ensor tests contact sensor robot triggered extended wsfn modified codice_19 return color front turtle allowing hit detection previous drawing added codice_21dge test jumps right side macro turtle hit edge drawing area original wsfn lacks equivalent codice_21 instead wraps drawing area turtle re-appears opposite side screen extended wsfn supports style playfield wrapping option uses one-letter commands recursive syntax wsfn code exceedingly cryptic example wsfn program draw sierpiński curves note definition macro includes calls within key aspect wsfn concept language highly recursive nature makes programming self-similar patterns like fractals easy accomplish lines code key concept extended wsfn keyboard always active even macros running allows keyboard input interrupt running programs using technique one make macros moving turtle certain ways assign letters keyboard perform movements pressing different keys succession aided adding codice_23ait command places give user time respond drawing takes place original dr. dobbs article extended wsfn manual
[ 6778, 5367, 708 ]
Test
6,899
4
Opal_Storage_Specification:opal storage specification opal storage specification set specifications features data storage devices disk drives enhance security example defines way encrypting stored data unauthorized person gains possession device see data specification self-encrypting drives sed specification published trusted computing group storage workgroup opal ssc security subsystem class implementation profile storage devices built opal ssc encompasses functions radboud university researchers indicated november 2018 hardware encryption including opal implementations security vulnerabilities
[ 496, 3764, 1698, 5440, 6305, 972, 6043, 2979, 88 ]
Test
6,900
9
Richard_Bird_(computer_scientist):richard bird computer scientist richard simpson bird born 1943 london supernumerary fellow computation lincoln college oxford england former director oxford university computing laboratory oxford university department computer science bird research interests lie algorithm design functional programming known regular contributor journal functional programming author introduction functional programming using haskell books name associated bird-meertens formalism calculus deriving programs specifications functional programming style previously bird university reading
[ 154, 2740, 1243 ]
Test
6,901
2
Secure_operating_system:secure operating system secure operating system may refer
[ 6725 ]
Test
6,902
2
Musix_GNU+Linux:musix gnu+linux musix gnu+linux live cd dvd linux distribution ia-32 processor family based debian contains collection software audio production graphic design video editing general purpose applications initiator co-director project marcos germán guglielmetti musix gnu+linux one gnu/linux distributions recognized free software foundation primarily available sites distributing free software excluding non-free information practical use musix developed team argentina spain mexico brazil main language used development discussion documentation spanish however musix community users speak spanish portuguese english musix 0.x 1.0 rx versions released 2005 2008 musix 1.0 r6 last stable release dvd musix 1.0 r2r5 last stable release cd live-cd system 1350 software packages runs directly cd/dvd without need install anything pc installed pc relatively easily desired minutes like knoppix kanotix live-dvd 1.0 r3 test5 2279 software packages programs include rosegarden ardour musicians inkscape vectorial design gimp manipulation images cinelerra video editing blender 3d animation desktop light 18 mb ram x.org based icewm/rox-filer unique feature multiple pinboards ordered general purpose apps help office root/admin midi internet graphics audio pinboards arrays desktop backgrounds icons small version kde desktop installed default live-cd version live-dvd full kde version supporting several languages musix 2.0 developed using live-helper scripts debian-live project first alpha version musix 2.0 released 2009-03-25 including two realtime-patched linux-libre kernels 2009-05-17 first beta version musix 2.0 released final musix gnu+linux 2.0 version cd dvd usb launched november 2009 daniel vidal suso comesaña carlos sanchiavedraz joseangon musix developers version presented palau firal de congressos de tarragona españa suso comesaña quite similar linux-version developed brazilian music teacher gilberto andré borges named adriane musixbr version fork derived knoppix 6.1 adriane
[ 5200, 3174, 1629, 7161, 3444, 7251, 6984, 474, 2559, 7075, 2026, 1941, 314, 5232, 2758, 1663, 2864, 6209, 6761, 5605, 2063, 343, 4824, 5523, 7587, 5259, 1893, 5530, 5704, 6317, 3751, 7954, 6244, 788 ]
Test
6,903
2
Microsoft_Push_Notification_Service:microsoft push notification service microsoft push notification service commonly referred mpns mobile service developed microsoft allows developers send push data servers windows phone applications mpns natively supported applications target windows phone 8 operating system microsoft announced windows notification service windows 8 windows phone 8.1 2011 effectively replacing mpns service mpns used applications installed windows phone 8.1 source code migrated microsoft silverlight application modified target windows phone 8.1 already registered use mpns upgrade mpns natively designed use windows phone 8 applications implement service allows developers send toast notifications well update tile image flip notification text application windows metro start screen tile accomplished developers sending post messages mpns server network request relevant content user typically must allow data notifications received application register mpns notification data mpns implemented send notification data using encrypted channel developer purchases ssl certificate third-party provider uploads private key certificate data microsoft developer portal account otherwise mpns implemented send notification data using unencrypted channel applications utilize unencrypted channels rate size limitations notification requests content updated displayed device limits lifted purchasing ssl certificate switching utilize mpns encryption mpns consists servers internal interfaces maintain store channel uri identifiers device information authenticate post requests received developer servers enqueue deliver requested data mobile devices application registers data notifications receives unique channel uri identifiers mpns network identifier used application developer third-party server reference device particular data delivery request sent mobile device receives channel uri identifier sent developer server stored server sends post message mpns network data delivery channel uri identifier included within message payload along data deliver parameter options specified mpns network authenticate identifier enqueue data delivery mobile device
[ 8085, 6580, 5571 ]
Validation
6,904
4
JASBUG:jasbug jasbug security bug disclosed february 2015 affecting core components microsoft windows operating system vulnerability dated back 2000 affected supported editions windows server 2003 windows vista windows server 2008 windows 7 windows server 2008 r2 windows 8 windows server 2012 windows rt windows 8.1 windows server 2012 r2 windows rt 8.1 vulnerability allows hackers remotely take control windows devices connect active directory domain jasbug registered common vulnerabilities exposures system industrial control systems cyber emergency response team part department homeland security issued ics-alert-15-041-01 warning control systems owners expedite applying critical jasbug fixes microsoft released two patches ms15-011 ms15-014 address jasbug day vulnerability disclosed fixes took microsoft year develop deploy due complexity jasbug vulnerability time disclosure 300 million computers believed vulnerable exploit jasbug disclosed public microsoft part patch tuesday february 10th 2015 vulnerability initially reported microsoft january 2014 jeff schmidt founder jas global advisors microsoft publicly announced security vulnerability garnered name jasbug reference role jas global advisors played discovering exploit 2014 jas global advisors working engagement internet corporation assigned names numbers icann organization governing standards internet research potential technical issues surrounding rollout new generic top level domains gtlds internet working research jas global advisors business partner simmachines uncovered vulnerability applying big data analytical techniques large technical data sets jasbug principally affects business government users home users less likely affected jasbug use domain-configured computers white house cybersecurity advisor michael daniel spoke importance addressing jasbug meeting information security privacy advisory board national institute standards technology office management budget department homeland security immediately took steps fix vulnerability federal networks suzanne e. spaulding serving secretary national protection programs directorate nppd department homeland security mentioned jasbug february 2015 house representatives hearing touched potential effect dhs funding hiatus aftermath jasbug various government agencies updated technical specifications mitigate exploit risks example united states department veteran affairs decided may 2015 unapprove use windows server 2003 based jasbug risks according microsoft exploit takes advantage group policy receives applies policy data domain-joined system connects domain controller one likely exploitation flaw involves deceiving user domain-configured system network controlled hacker despite potential effect indication jasbug vulnerability ever used cyberhackers access corporate government computers jasbug affects windows vista windows server 2008 windows 7 windows server 2008 r2 windows 8 windows 8.1 windows server 2012 windows server 2012 r2 windows rt windows rt 8.1 windows server 2003 also affected jasbug patch platform microsoft indicated feasible build fix version jasbug also affects windows xp windows 2000 patch made available operating systems longer supported microsoft unlike high-profile vulnerabilities like heartbleed shellshock gotofail poodle jasbug design problem implementation problem making type vulnerability unusual much difficult fix fix required microsoft re-engineer core components operating system add several new features including additional hardening group policy feature organizations use centrally manage windows systems applications user settings active directory environments microsoft able fix jasbug flaw windows server 2003 systems noting architecture properly support fix provided update exist windows server 2003 systems making infeasible build fix windows server 2003 unpatched unpatchable platforms may vulnerable jasbug security firms like symantec recommend organizations use intrusion prevention systems ips monitor network activity possible malicious jasbug traffic
[ 704, 3932, 2912, 376, 3277, 2923, 2587, 3323, 5779, 7600, 4025, 1528, 4759, 2991, 1173, 6526, 6541, 6194, 2678, 3726, 3038, 3047, 6569, 2693, 862, 7307, 6589, 5187, 1996, 7328, 208, 2021, 5922, 6628, 924, 4531, 600, 1307, 2800, 6323, 77...
Train
6,905
5
Archie_(search_engine):archie search engine archie tool indexing ftp archives allowing people find specific files considered first internet search engine original implementation written 1990 alan emtage postgraduate student mcgill university montreal bill heelan studied concordia university montreal worked mcgill university time archie service began project students volunteer staff mcgill university school computer science 1987 peter deutsch systems manager school emtage heelan asked connect school computer science internet earliest versions archie written alan emtage simply contacted list ftp archives regular basis contacting roughly month waste many resources remote servers requested listing listings stored local files searched using unix grep command name derives word archive without v. alan emtage said contrary popular belief association archie comics despised despite early internet search technologies jughead veronica named characters comics anarchie one earliest graphical ftp clients named ability perform archie searches archie developed tool mass discovery concept simple developers populated engine servers databases anonymous ftp host directories used find specific file titles since list plugged searchable database websites bill heelan peter deutsch wrote script allowing people log search collected information using telnet protocol host archie.mcgill.ca 132.206.2.3 later efficient front- back-ends developed system spread local tool network-wide resource popular service available multiple sites around internet collected data would exchanged neighbouring archie servers servers could accessed multiple ways using local client archie xarchie telnetting server directly sending queries electronic mail later via world wide web interface zenith fame archie search engine accounted 50 montreal internet traffic 1992 emtage along peter deutsch financial help mcgill university formed bunyip information systems world first company expressly founded dedicated providing internet information services licensed commercial version archie search engine used millions people worldwide bill heelan followed bunyip soon together bibi ali sandro mazzucato part so-called archie group group significantly updated archie database indexed web-pages work search engine ceased late 1990s legacy archie server still maintained active historic purposes poland university warsaw interdisciplinary centre mathematical computational modelling
[ 4989, 2205, 7765, 84, 2261, 2804 ]
Test
6,906
7
StorSimple:storsimple storsimple privately held company based santa clara california marketing cloud storage storsimple funded venture capital index ventures redpoint ventures ignition partners mayfield fund total 31.5 million founded 2009 former cisco systems brocade communications systems executives ursheet parikh guru pangal storsimple marketed cloud storage gateway computer appliance called cloud-integrated storage cis approach claimed integrate primary storage data deduplication automated tiered storage data across local cloud storage data compression encryption significantly faster data backup disaster recovery times storsimple certified microsoft windows server 2008 vmware integrated cloud storage amazon google microsoft rackspace 2012 storsimple considered forefront genre appliance iscsi interface using 10 gigabit ethernet used serial ata disks well solid-state drives april 2012 storsimple announced replacement 2u 5010 2.5tb raw capacity 7010 5tb raw models 5020 2tb raw capacity 7020 4tb 5520 10tb 4u 7520 20tb october 16 2012 microsoft agreed acquire storsimple finalized november 15 acquisition microsoft integrated storsimple azure product suite refreshed hardware launching 8100 8600 on-premise fixed-configuration storage arrays 2014 8100 offered 10tb 40tb locally depending data compression data de-duplication 200tb maximum capacity inclusive azure cloud storage 8600 offered 40tb 100tb locally 500tb inclusive cloud storage like predecessors appliances combined solid state standard disk drives virtualised version platform running virtual machine azure cloud initially marketed 1100 re-branded 8010 2015 replaced 8020 offering 64tb maximum compared predecessor ’ 30tb
[ 4295, 2988, 7613, 632, 1634, 3091, 6262, 4594, 6806, 3627, 5927, 2212, 4783, 5135, 2666, 1757, 3028, 7838, 842, 5064, 330, 2961, 7037, 2700, 1514, 5889 ]
Validation
6,907
2
86-DOS:86-dos 86-dos discontinued operating system developed marketed seattle computer products scp intel 8086-based computer kit initially known qdos quick dirty operating system name changed 86-dos scp started licensing operating system 1980 86-dos command structure application programming interface imitated digital research cp/m operating system made easy port programs latter system licensed purchased microsoft developed ms-dos pc dos 86-dos created sales seattle computer products 8086 computer kit demonstrated june 1979 shipped november languishing due absence operating system software scp could sell board microsoft standalone disk basic-86 microsoft developed prototype scp hardware scp wanted offer 8086-version cp/m digital research announced release date uncertain first time digital research lagged behind hardware developments two years earlier slow adapt cp/m new floppy disk formats hard disk drives april 1980 scp assigned 24-year-old tim paterson develop substitute cp/m-86 using cp/m-80 manual reference paterson modeled 86-dos architecture interfaces adapted meet requirements intel 8086 16-bit processor easy partially automated source-level translatability many existing 8-bit cp/m programs porting either dos cp/m-86 equally difficult eased fact intel already published method could used automatically translate software intel 8080 processor cp/m designed new 8086 instruction set time made number changes enhancements address saw cp/m shortcomings cp/m cached file system information memory speed required user force update disk removing user forgot disk would become corrupt paterson took safer slower approach updating disk operation cp/m pip command copied files supported several special file names referred hardware devices printers communication ports paterson built names operating system device files program could use gave copying program intuitive name copy rather implementing cp/m file system drew microsoft standalone disk basic-86 file allocation table fat file system mid-1980 scp advertised 86-dos priced 95 owners 1290 8086 board 195 others touted software ability read zilog z80 source code cp/m disk translate 8086 source code promised minor hand correction optimization needed produce 8086 binaries october 1980 ibm developing would become original ibm personal computer cp/m far popular operating system use time ibm felt needed cp/m order compete ibm representatives visited digital research discussed licensing digital research licensing representative dorothy kildall née mcewen hesitated sign ibm non-disclosure agreement although nda later accepted digital research would accept ibm proposal 250,000 exchange many copies ibm could sell insisting usual royalty-based plan later discussions ibm bill gates gates mentioned existence 86-dos ibm representative jack sams told get license microsoft purchased non-exclusive license 86-dos seattle computer products december 1980 25,000 may 1981 hired tim paterson port system ibm pc used slower less expensive intel 8088 processor specific family peripherals ibm watched developments daily submitting 300 change requests accepted product wrote user manual july 1981 month pc release microsoft purchased rights 86-dos scp 50,000 met ibm main criteria looked like cp/m easy adapt existing 8-bit cp/m programs run notably thanks trans command would translate source files 8080 8086 machine instructions microsoft licensed 86-dos ibm became pc dos 1.0 license also permitted microsoft sell dos companies deal spectacularly successful scp later claimed court microsoft concealed relationship ibm order purchase operating system cheaply scp ultimately received 1 million settlement payment digital research founder gary kildall examined pc dos found duplicated cp/m programming interface wanted sue ibm time claimed pc dos product however digital research attorney believe relevant law clear enough sue nonetheless kildall confronted ibm persuaded offer cp/m-86 pc exchange release liability controversy continued surround similarity two systems perhaps sensational claim came jerry pournelle said kildall personally demonstrated dos contained cp/m code entering command dos displayed kildall name pournelle never revealed command nobody come forward corroborate story 2004 book kildall says used encrypted message demonstrate manufacturers copied cp/m say found message dos instead kildall memoir source book pointed well-known interface similarity paterson insists 86-dos software original work denied referring otherwise using cp/m code writing 2004 book appeared sued authors publishers defamation court ruled summary judgment defamation occurred book claims opinions based research provably false following list commands supported 86-dos 1982 ibm asked microsoft release version dos compatible hard disk drive pc dos 2.0 almost complete rewrite dos march 1983 little 86-dos remained enduring element 86-dos primitive line editor edlin remained editor supplied microsoft versions dos june 1991 release ms-dos 5.0 included text-based user interface editor called ms-dos editor based qbasic edlin still used contemporary machines since emulated dos environment windows 10 32 bit seattle computer products 86-dos supported fat12 filesystem range 8-inch 5.25-inch floppy disk drives s-100 floppy disk controller hardware manufactured cromemco tarbell electronics north star computers western digital fd1771-based cromemco tarbell boards supported one-sided single-density soft-sectored drives tarbell double-density board utilizing fd1791 supported well later scp offered advanced floppy disk controllers like disk master series 86-dos take advantage fat id byte bios parameter block bpb later dos versions distinguish different media formats instead different drive letters hard-coded time compilation associated different physical floppy drives sides densities meant depending type disk addressed certain drive letter recognized correctly concept later emulated flexibility driver.sys dos 3.x later versions two logical format variants 86-dos 12-bit fat format existed — original format 16-byte directory entries later format since 86-dos 0.42 32-byte directory entries second one logically compatible fat12 format known since release ms-dos pc dos ms-dos still mount volumes absence bpb falls back retrieve fat id fat entry design fat file system clust 0cluster 0 choose among hard-coded disk geometry profiles formats volume formatted ms-dos would otherwise supported systems typically also formats id located first byte logical sector 1 — volume second sector physical cylinder-head-sector chs address 0/0/2 logical block addressing lba address 1 — since ms-dos assumes single reserved sector boot sector 86-dos reserved sectors area significantly larger whole tracks therefore prototypical fat id located elsewhere disk making impossible ms-dos retrieve even would hard-coded disk profile associated would take larger reserved sectors region 86-dos account cp/m 2 floppy media readable rdcpm 86-dos offer specific support fixed disks third-party solutions form hard disk controllers corresponding i/o system extensions 86-dos available companies like tallgrass technologies making hard disks accessible similar superfloppies within size limits fat12 file system various oem versions ms-dos 1.2x 2.x supported number similar 8.0 fat12 floppy disk formats well although identical supported 86-dos disk formats supported one last versions developed tim paterson microsoft ms-dos 1.25 march 1982 scp gazelle computer scp controller cromemco 16fdc controller default version supported ms-dos-compatible variants 8.0 formats single reserved sector could built provide two extra drive letters read write floppies previous scp 86-dos 8.0 disk formats since 0.42 well 1984 seattle computer products released oem version ms-dos 2.0 scp s-100 computer scp-500 disk master floppy controller added support 5.25 dd/1s 180 kb dd/2s 360 kb fat12 formats supported older formats well although possibly parameters modified compared ms-dos 1.25
[ 4291, 1442, 7161, 4670, 5021, 13, 6088, 3271, 3626, 5041, 7550, 405, 65, 5783, 5784, 6857, 5088, 6500, 785, 2266, 788, 1522, 7605, 4759, 5108, 4397, 5116, 2300, 126, 6907, 4786, 6922, 5161, 5865, 861, 3748, 3751, 1992, 2717, 7325, 190, ...
Validation
6,908
5
Simple_Mail_Transfer_Protocol:simple mail transfer protocol simple mail transfer protocol smtp communication protocol electronic mail transmission internet standard smtp first defined 1982 updated 2008 extended smtp additions protocol variety widespread use today mail servers message transfer agents use smtp send receive mail messages proprietary systems microsoft exchange ibm notes webmail systems outlook.com gmail yahoo mail may use non-standard protocols internally use smtp sending receiving email outside systems smtp servers commonly use transmission control protocol port number 25 user-level email clients typically use smtp sending messages mail server relaying typically submit outgoing email mail server port 587 465 per rfc 8314 retrieving messages imap pop3 standard proprietary servers also often implement proprietary protocols e.g. exchange activesync various forms one-to-one electronic messaging used 1960s users communicated using systems developed specific mainframe computers computers interconnected especially u.s. government arpanet standards developed permit exchange messages different operating systems smtp grew standards developed 1970s smtp traces roots two implementations described 1971 mail box protocol whose implementation disputed discussed rfcs sndmsg program according ray tomlinson bbn invented tenex computers send mail messages across arpanet fewer 50 hosts connected arpanet time implementations include ftp mail mail protocol 1973 development work continued throughout 1970s arpanet transitioned modern internet around 1980 jon postel proposed mail transfer protocol 1980 began remove mail reliance ftp smtp published november 1981 also postel smtp standard developed around time usenet one-to-many communication network similarities smtp became widely used early 1980s time complement unix unix copy program uucp mail better suited handling email transfers machines intermittently connected smtp hand works best sending receiving machines connected network time use store forward mechanism examples push technology though usenet newsgroups still propagated uucp servers uucp mail transport virtually disappeared along bang paths used message routing headers sendmail released 4.1cbsd right one first mail transfer agents implement smtp time bsd unix became popular operating system internet sendmail became common mta mail transfer agent popular smtp server programs include postfix qmail novell groupwise exim novell netmail microsoft exchange server oracle communications messaging server message submission smtp-auth introduced 1998 1999 describing new trends email delivery originally smtp servers typically internal organization receiving mail organization outside relaying messages organization outside time went smtp servers mail transfer agents practice expanding roles become message submission agents mail user agents relaying mail outside organization e.g company executive wishes send email trip using corporate smtp server issue consequence rapid expansion popularity world wide web meant smtp include specific rules methods relaying mail authenticating users prevent abuses relaying unsolicited email spam work message submission originally started popular mail servers would often rewrite mail attempt fix problems example adding domain name unqualified address behavior helpful message fixed initial submission dangerous harmful message originated elsewhere relayed cleanly separating mail submission relay seen way permit encourage rewriting submissions prohibiting rewriting relay spam became prevalent also seen way provide authorization mail sent organization well traceability separation relay submission quickly became foundation modern email security practices protocol started purely ascii text-based deal well binary files characters many non-english languages standards multipurpose internet mail extensions mime developed encode binary files transfer smtp mail transfer agents mtas developed sendmail also tended implemented 8-bit-clean alternate send eight strategy could used transmit arbitrary text data 8-bit ascii-like character encoding via smtp mojibake still problem due differing character set mappings vendors although email addresses still allowed ascii 8-bit-clean mtas today tend support 8bitmime extension permitting binary files transmitted almost easily plain text recently smtputf8 extension created support utf-8 text allowing international content addresses non-latin scripts like cyrillic chinese many people contributed core smtp specifications among jon postel eric allman dave crocker ned freed randall gellens john klensin keith moore email submitted mail client mail user agent mua mail server mail submission agent msa using smtp tcp port 587 mailbox providers still allow submission traditional port 25 msa delivers mail mail transfer agent mail transfer agent mta often two agents instances software launched different options machine local processing done either single machine split among multiple machines mail agent processes one machine share files processing multiple machines transfer messages using smtp machine configured use next machine smart host process mta smtp server right boundary mta uses domain name system dns look mail exchanger record mx record recipient domain part email address right mx record contains name target host based target host factors mta selects exchange server see article mx record mta connects exchange server smtp client message transfer occur single connection two mtas series hops intermediary systems receiving smtp server may ultimate destination intermediate relay stores forwards message gateway may forward message using protocol smtp hop formal handoff responsibility message whereby receiving server must either deliver message properly report failure final hop accepts incoming message hands mail delivery agent mda local delivery mda saves messages relevant mailbox format sending reception done using one multiple computers diagram mda depicted one box near mail exchanger box mda may deliver messages directly storage forward network using smtp protocol local mail transfer protocol lmtp derivative smtp designed purpose delivered local mail server mail stored batch retrieval authenticated mail clients muas mail retrieved end-user applications called email clients using internet message access protocol imap protocol facilitates access mail manages stored mail post office protocol pop typically uses traditional mbox mail file format proprietary system microsoft exchange/outlook lotus notes/domino webmail clients may use either method retrieval protocol often formal standard smtp defines message transport message content thus defines mail envelope parameters envelope sender header except trace information body message std 10 define smtp envelope std 11 define message header body formally referred internet message format smtp connection-oriented text-based protocol mail sender communicates mail receiver issuing command strings supplying necessary data reliable ordered data stream channel typically transmission control protocol tcp connection smtp session consists commands originated smtp client initiating agent sender transmitter corresponding responses smtp server listening agent receiver session opened session parameters exchanged session may include zero smtp transactions smtp transaction consists three command/reply sequences besides intermediate reply data server reply either positive 2xx reply codes negative negative replies permanent 5xx codes transient 4xx codes reject permanent failure client send bounce message server received drop positive response followed message discard rather delivery initiating host smtp client either end-user email client functionally identified mail user agent mua relay server mail transfer agent mta smtp server acting smtp client relevant session order relay mail fully capable smtp servers maintain queues messages retrying message transmissions resulted transient failures mua knows outgoing mail smtp server configuration relay server typically determines server connect looking mx mail exchange dns resource record recipient domain name mx record found conformant relaying server instead looks record relay servers also configured use smart host relay server initiates tcp connection server well-known port smtp port 25 connecting msa port 587 main difference mta msa connecting msa requires smtp authentication smtp delivery protocol normal use mail pushed destination mail server next-hop mail server arrives mail routed based destination server individual user addressed protocols post office protocol pop internet message access protocol imap specifically designed use individual users retrieving messages managing mail boxes permit intermittently-connected mail server pull messages remote server demand smtp feature initiate mail queue processing remote server see remote message queue starting pop imap unsuitable protocols relaying mail intermittently-connected machines designed operate final delivery information critical correct operation mail relay mail envelope removed remote message queue starting feature smtp permits remote host start processing mail queue server may receive messages destined sending turn command feature however deemed insecure extended etrn command operates securely using authentication method based domain name system information email client needs know ip address initial smtp server given part configuration usually given dns name server deliver outgoing messages behalf user server administrators need impose control clients use server enables deal abuse example spam two solutions common use system isp smtp server allow access users outside isp network precisely server may allow access users ip address provided isp equivalent requiring connected internet using isp mobile user may often network normal isp find sending email fails configured smtp server choice longer accessible system several variations example organisation smtp server may provide service users network enforcing firewalling block access users wider internet server may perform range checks client ip address methods typically used corporations institutions universities provided smtp server outbound mail use internally within organisation however bodies use client authentication methods described user mobile may use different isps connect internet kind usage restriction onerous altering configured outbound email smtp server address impractical highly desirable able use email client configuration information need change modern smtp servers typically require authentication clients credentials allowing access rather restricting access location described earlier flexible system friendly mobile users allows fixed choice configured outbound smtp server smtp authentication often abbreviated smtp auth extension smtp order log using authentication mechanism server accessible wider internet enforce kinds access restrictions known open relay generally considered bad practice worthy blacklisting communication mail servers generally uses standard tcp port 25 designated smtp mail clients however generally n't use instead using specific submission ports mail services generally accept email submission clients one port 2525 others may used individual providers never officially supported internet service providers block outgoing port 25 traffic customers anti-spam measure reason businesses typically configure firewall allow outgoing port 25 traffic designated mail servers typical example sending message via smtp two mailboxes alice theboss located mail domain example.com localhost.com reproduced following session exchange example conversation parts prefixed c server client respectively labels part exchange message sender smtp client establishes reliable communications channel message receiver smtp server session opened greeting server usually containing fully qualified domain name fqdn case smtp.example.com client initiates dialog responding codice_1 command identifying command parameter fqdn address literal none available client notifies receiver originating email address message codice_2 command also return bounce address case message delivered example email message sent two mailboxes smtp server one recipient listed cc header fields corresponding smtp command codice_3 successful reception execution command acknowledged server result code response message e.g. 250 ok transmission body mail message initiated codice_4 command transmitted verbatim line line terminated end-of-data sequence sequence consists new-line cr lf single full stop period followed another new-line since message body contain line period part text client sends two periods every time line starts period correspondingly server replaces every sequence two periods beginning line single one escaping method called dot-stuffing server positive reply end-of-data exemplified implies server taken responsibility delivering message message doubled communication failure time e.g due power shortage sender received 250 reply must assume message delivered hand receiver decided accept message must assume message delivered thus time span agents active copies message try deliver probability communication failure occurs exactly step directly proportional amount filtering server performs message body often anti-spam purposes limiting timeout specified 10 minutes codice_5 command ends session email recipients located elsewhere client would codice_5 connect appropriate smtp server subsequent recipients current destination queued information client sends codice_1 codice_2 commands added seen example code additional header fields message receiving server adds codice_9 codice_10 header field respectively clients implemented close connection message accepted codice_11 last two lines may actually omitted causes error server trying send codice_12 reply original smtp protocol supported unauthenticated unencrypted ascii text communications susceptible man middle attacks spoofing spamming requiring encode binary data transmission number optional extensions specify various mechanisms address problems clients learn server supported options using codice_13 greeting exemplified instead original codice_1 example clients fall back codice_1 server support smtp extensions modern clients may use esmtp extension keyword codice_16 query server maximum message size accepted older clients servers may try transfer excessively sized messages rejected consuming network resources including connect time network links paid minute users manually determine advance maximum size accepted esmtp servers client replaces codice_1 command codice_13 command thus smtp2.example.com declares accept fixed maximum message size larger 14,680,064 octets 8-bit bytes simplest case esmtp server declares maximum codice_16 immediately receiving codice_13 according however numeric parameter codice_16 extension codice_13 response optional clients may instead issuing codice_2 command include numeric estimate size message transferring server refuse receipt overly-large messages original smtp supports transport textual data therefore binary data needs encoded text transfer decoded leading increased size transit 8bitmime command developed alleviate limitation standardized 1994 obsoleted 2011 corresponding new std 71 facilitates transparent exchange e-mail messages containing octets outside seven-bit ascii character set prior availability 8bitmime implementations mail user agents employed several techniques cope seven-bit limitation binary-to-text encodings including ones provided mime utf-7 however workarounds inflates required amount data transmission non-ascii text non-esmtp servers allowed sending 8-bit characters risky send data server whose 8-bit capabilities unknown on-demand mail relay odmr smtp extension standardized allows intermittently-connected smtp server receive email queued connected original smtp supports email addresses composed ascii characters inconvenient users whose native script latin based use diacritic ascii character set limitation alleviated via extensions enabling utf-8 address names introduced experimental codice_24 command later superseded introduced codice_25 command extensions provide support multi-byte non-ascii characters email addresses diacritics language characters greek chinese current support limited strong interest broad adoption related rfcs countries like china large user base latin ascii foreign script mail delivery occur plain text encrypted connections however communicating parties might know advance party ability use secure channel smtp authentication often abbreviated smtp auth describes mechanism client log using authentication mechanism supported server mainly used submission servers authentication mandatory multiple rfcs exist provide different variations mechanism update smtp extensions describe starttls command enables server tell client supports encrypted communications client request upgrade secure channel starttls effective passive observation attacks since starttls negotiation happens plain text active attacker trivially remove starttls command attack sometimes called striptls client would think server send starttls header support starttls server would think client respond starttls header thus support starttls note starttls also defined imap pop3 rfcs protocols serve different purposes smtp used communication message transfer agents imap pop3 end clients message transfer agents electronic frontier foundation maintains starttls everywhere list similarly https everywhere list allows relying parties discover others supporting secure communication without prior communication newer 2018 called smtp mta strict transport security mta-sts aims addresses problem active adversary defining protocol mail servers declare ability use secure channels specific files server specific dns txt records relying party would regularly check existence record cache amount time specified record never communicate insecure channels record expires note mta-sts records apply smtp traffic mail servers communications end client mail server protected http strict transport security https april 2019 google mail announced support mta-sts number protocols allows secure delivery messages fail due misconfigurations deliberate active interference leading undelivered messages delivery unencrypted unauthenticated channels smtp tls reporting describes reporting mechanism format sharing statistics specific information potential failures recipient domains recipient domains use information detect potential attacks diagnose unintentional misconfigurations april 2019 google mail announced support smtp tls reporting original design smtp facility authenticate senders check servers authorized send behalf result email spoofing possible commonly used email spam phishing occasional proposals made modify smtp extensively replace completely one example internet mail 2000 neither made much headway face network effect huge installed base classic smtp instead mail servers use range techniques including domainkeys identified mail sender policy framework dmarc dnsbls greylisting reject quarantine suspicious emails
[ 7148, 7878, 709, 7154, 5722, 6419, 4676, 4677, 3952, 7168, 7170, 5733, 4316, 4683, 6432, 1834, 1462, 7533, 26, 5039, 2568, 4693, 735, 1475, 3969, 6446, 3638, 2219, 403, 743, 2578, 3640, 2944, 4709, 7916, 7561, 46, 6465, 3312, 7925, 4352...
Test
6,909
2
List_of_typefaces_included_with_macOS:list typefaces included macos list fonts contains every font shipped mac os x 10.0 macos 10.14 including shipped language-specific updates apple primarily korean chinese fonts fonts shipped mac os x 10.5 please see apple documentation following system fonts added yosemite least following system fonts added el capitan least following system fonts added sierra high sierra added several system fonts additional weights existing system fonts new fonts provided mojave number fonts also provided imovie ilife idvd apple applications hidden folders sole use applications reason fonts hidden unknown licensing issues suggested cause however may easily installed use applications copying library directories installing third-party font notable hidden fonts macos include bank gothic bodoni century gothic century schoolbook garamond several cuts lucida monotype twentieth century
[ 8051, 5011, 2627, 7609, 3940, 7335, 713, 6342, 1171, 5109, 2284, 997, 1178, 117, 569, 1187, 4690, 6188, 734, 7000, 1562, 6548, 7274, 502, 6557, 6295, 6832, 4258, 2679, 4975, 3989, 2597, 2329, 2145, 3050, 3322, 2880, 1502, 163, 3151, 658...
Validation
6,910
3
Qualcomm_Snapdragon:qualcomm snapdragon snapdragon suite system chip soc semiconductor products mobile devices designed marketed qualcomm technologies inc snapdragon central processing unit cpu uses arm risc instruction set single soc may include multiple cpu cores adreno graphics processing unit gpu snapdragon wireless modem hexagon digital signal processor dsp qualcomm spectra image signal processor isp software hardware support smartphone global positioning system gps camera video audio gesture recognition ai acceleration snapdragon semiconductors embedded devices various systems including android windows phone netbooks also used cars wearable devices devices addition processors snapdragon line includes modems wi-fi chips mobile charging products first snapdragon product made available consumer device manufacturers qsd8250 released december 2007 included first 1 ghz processor mobile phones qualcomm introduced krait microarchitecture second generation snapdragon socs 2011 allowing processor core adjust speed based device needs 2013 consumer electronics show qualcomm introduced first snapdragon 800 series renamed prior models 200 400 600 series several new iterations introduced since snapdragon 805 810 615 410 qualcomm re-branded modem products snapdragon name december 2014. asus hp lenovo begun selling laptops snapdragon-based cpus running windows 10 name always connected pcs marking entry pc market qualcomm arm architecture qualcomm announced developing scorpion central processing unit cpu november 2007 snapdragon system chip soc announced november 2006 included scorpion processor well semiconductors also included qualcomm first custom hexagon digital signal processor dsp according qualcomm spokesperson named snapdragon snap dragon sounded fast fierce following month qualcomm acquired airgo networks undisclosed amount said airgo 802.11a/b/g 802.11n wi-fi technology would integrated snapdragon product suite early versions scorpion processor core design similar cortex-a8 first snapdragon shipments qsd8250 november 2007 according cnet snapdragon claim fame first 1 ghz mobile processor smartphones time using 500 mhz processors first generation snapdragon products supported 720p resolution 3d graphics 12-megapixel camera november 2008 15 device manufacturers decided embed snapdragon semiconductors consumer electronics products november 2008 qualcomm announced would also compete intel netbook processor market dual-core snapdragon system-on-chips planned late 2009 demonstrated snapdragon processor consumed less power intel chips announced around time claimed would also cost less released month qualcomm introduced snapdragon-based prototype netbook called kayak used 1.5 ghz processors intended developing markets may 2009 java se ported optimized snapdragon november 2009 computex taipei show qualcomm announced qsd8650a addition snapdragon product suite based 45 nanometer manufacturing processes featured 1.2 ghz processor lower power consumption prior models late 2009 smartphone manufacturers announced would using snapdragon socs acer liquid metal htc hd2 toshiba tg01 sony ericsson xperia x10 lenovo announced first netbook product using snapdragon socs december according pc world mobile devices using snapdragon better battery life smaller size using socs june 2010 snapdragon chips embedded 20 available consumer devices incorporated 120 product designs development apple dominant market position smartphones time incorporate snapdragon products success snapdragon therefore relied competing android phones google nexus one htc incredible challenging apple market position android devices end taking market share iphone predominantly used snapdragon unconfirmed widely circulated report speculating apple going start using snapdragon socs verizon-based iphones 2012 apple still using ax semiconductor designs support windows phone 7 operating systems added snapdragon october 2010 2011 snapdragon embedded hewlett packard webos devices 50 market share 7.9 billion smartphone processor market 2012 snapdragon s4 krait core taken dominant share android system-on-chips like nvidia tegra texas instruments omap caused latter exit market july 2014 market share android phones grown 84.6 percent qualcomm snapdragon chips embedded 41 smartphones however september 2013 debut apple 64-bit a7 chip iphone 5s forced qualcomm release competing 64-bit product despite capable performance snapdragon 800/801/805 since existing krait cores 32-bit first 64-bit socs snapdragon 808 810 rushed market using generic cortex-a57 cortex-a53 cores suffered overheating problems throttling particularly 810 led samsung stop using snapdragon galaxy s6 flagship phone galaxy note 5 phablet snapdragon chips also used android-based smartwatches snapdragon products also used virtual reality products vehicles like maserati quattroporte cadillac xts applications june 2010 qualcomm began sampling third generation snapdragon products two dual-core 1.2 ghz system chips soc called mobile station modem msm 8260 8660 8260 gsm umts hspa+ networks 8660 cdma2000 evdo networks november qualcomm announced msm8960 lte networks early 2011 qualcomm announced new processor architecture called krait used arm v7 instruction set based qualcomm processor design processors called s4 feature named asynchronous symmetrical multi-processing asmp meaning processor core adjusted clock speed voltage based device activity order optimize battery usage prior models renamed s1 s2 s3 distinguish generation s4-based generation snapdragon socs began shipping product manufacturers msm8960 february 2012 benchmark tests anandtech msm8960 better performance processor tested overall system benchmark 8960 obtained score 907 compared 528 658 galaxy nexus htc rezound respectively quadrant benchmark test assesses raw processing power dual-core krait processor score 4,952 whereas quad-core tegra 3 4,000 quad-core version apq8064 made available july 2012 first snapdragon soc use qualcomm adreno 320 graphics processing unit gpu adoption snapdragon contributed qualcomm transition wireless modem company one also produces wider range hardware software mobile devices july 2011 qualcomm acquired certain assets gesturetek order incorporate gesture recognition intellectual property snapdragon socs mid-2012 qualcomm announced snapdragon software development kit sdk android devices uplinq developer conference sdk includes tools facial recognition gesture recognition noise cancellation audio recording november qualcomm acquired assets epos development order integrate stylus gesture recognition technology snapdragon products also collaborated microsoft optimize windows phone 8 snapdragon semiconductors 2012 snapdragon s4 krait core taken dominant share android system-on-chips like nvidia tegra texas instruments omap caused latter exit market july 2014 market share android phones grown 84.6 percent qualcomm snapdragon chips powered 41 smartphones however september 2013 debut apple 64-bit a7 chip iphone 5s forced qualcomm rush competing 64-bit solution despite capable performance snapdragon 800/801/805 since existing krait cores 32-bit first 64-bit socs snapdragon 808 810 rushed market using generic cortex-a57 cortex-a53 cores suffered overheating problems throttling particularly 810 led samsung ditching snapdragon galaxy s6 flagship phone entry-level 200 series expanded six new processors using 28 nanometer manufacturing dual quad-core options june 2013 entry-level snapdragon 210 intended low-cost phones announced september 2014 qualcomm first attempt 64-bit system chip created new in-house architecture later models showed better thermal performance especially compared snapdragon models launched 2015 like snapdragon 820 early 2016 qualcomm launched snapdragon 820 arm 64-bit quad-core processor using in-house designed kryo cores qualcomm launched updated snapdragon 821 later year higher clock speeds slightly better performance snapdragon 820 family uses samsung 14-nanometer finfet process qualcomm also released qualcomm snapdragon neural processing engine sdk first ai acceleration smartphones qualcomm announced octa-core snapdragon 835 soc november 17 2016 released following year used kryo 280 cores built using samsung 10-nanometer finfet process initial launch due samsung role manufacturing chip mobile division also acquired initial inventory chip means phone maker able manufacture products containing snapdragon 835 samsung released flagship device year galaxy s8 computex 2017 may qualcomm microsoft announced plans launch snapdragon-based laptops running windows 10 partnered hp lenovo asus release slim portables 2-in-1 devices powered snapdragon 835 december 2017 qualcomm announced octa-core snapdragon 845 uses 10-nanometer manufacturing process earlier snapdragon 835 introduced new processor architecture kryo 385 designed better battery life photography use artificial intelligence apps early 2018 qualcomm introduced 7 series sits 6 8 series terms pricing performance 700 launched octa-core models snapdragon 710 712 using kryo 360 processor architecture built 10-nanometer manufacturing process following year 2019 qualcomm released new variants mobile processors snapdragon 855 replacing 845 snapdragon 855 competes high end system chip solutions like apple a12 kirin 980 snapdragon 855 features kryo 485 cores built tsmc 7-nanometer process along snapdragon 730 730g replacing 710 712 newer 730 730g feature kryo 460 cores built samsung 8-nanometer process snapdragon system chip products typically include graphics processing unit gpu global positioning system gps cellular modem integrated single package software included operates graphics video picture-taking 19 different snapdragon processors 400 600 800 product families spanning low high-end respectively well wi-fi mobile charging products components include adreno graphics processing qualcomm hexagon dsp processors using qualcomm s4 processor architecture addition smartphones 400 series used smart watches 602a intended electronics cars current snapdragon naming scheme implemented snapdragon 800 family announced 2013 consumer electronics show prior models renamed 200 400 600 series new snapdragon 600 also released mid-year embedded new android devices 400 family entry-level 600 mass-market mid-range 800 family high-end flagship phones snapdragon 805 released november 410 intended low-cost phones developing nations announced following month january 2014 qualcomm introduced modified version snapdragon 600 called 602a intended in-car infotainment screens backup cameras driver assistance products quad-core snapdragon 610 eight-core 615 announced february 2014 snapdragon 808 810 announced april 2014 snapdragon 835 announced november 2017 first qualcomm soc built 10 nm architecture qualcomm new flagship chip 2018 845 announced december 2017 according qualcomm 845 25-30 faster 835 february 2015 qualcomm re-branded stand-alone modem products snapdragon name distinguished socs using x designation x7 x12 modem first snapdragon modem 5g networks x50 announced late 2016 followed 2gbs x24 modem 7 nanometer manufacturing process announced february 2018 according cnet phones growing us market share ranked highly cnet reviews due responsiveness snapdragon socs also used windows phones phones entering market mid-2013 lg g2 first phone market using snapdragon 800 august 2013 2017 660 630 replaced 653 626 mid-range models several chips 400 product family revved february 2017 qualcomm introduced snapdragon x20 intended 5g cell phone networks two new chips 802.11ax commercial wi-fi networks followed addition 636 600 product family october qualcomm said would 40 percent faster 630 august 2018 snapdragon 632 439 429 released new soc aimed mid-range devices moto g6 play huawei honor 7a nokia 5 december 2018 qualcomm announced 8cx snapdragon tech summit 2018 8cx qualcomm first soc specifically designed always connected pc acpc platform unlike qualcomm past acpc socs respective mobile socs higher tdp qualcomm also showcased snapdragon x50 5g modem snapdragon 855 qtm052 mmwave antenna module february 2019 qualcomm announced snapdragon x55 5g modem qtm525 mmwave antenna module qet6100 envelope tracker new qat3555 antenna impedance tuner benchmark tests snapdragon 800 processor pc magazine found processing power comparable similar products nvidia benchmarks snapdragon 805 found adreno 420 gpu resulted 40 percent improvement graphics processing adreno 330 snapdragon 800 though slight differences processor benchmarks benchmarks snapdragon 801 inside htc one found bump around benchmark improvements 800 2015 samsung decision use snapdragon 810 galaxy s6 significant detrimental impact snapdragon revenues reputation benchmark tests ars technica confirmed rumors 810 under-performed lower-end models overheating issues qualcomm spokesperson said tests done early versions 810 n't ready commercial use updated version released found moderately improve thermal throttling gpu clock speeds memory latency memory bandwidth tested commercial product xiaomi mi note pro additionally 820/821 835 845 performed substantially better qualcomm led industry sustained gpu performance perf/w release 820 release apple a12
[ 2538, 5718, 3263, 6082, 6421, 7890, 6427, 722, 2926, 5740, 1473, 5750, 5752, 5405, 5055, 5406, 1864, 3996, 67, 446, 451, 2983, 6874, 6165, 463, 804, 1167, 5472, 469, 4041, 5473, 1544, 3008, 3365, 6910, 6547, 5845, 7654, 134, 136, 6919, ...
Test
6,911
9
Partial_application:partial application computer science partial application partial function application refers process fixing number arguments function producing another function smaller arity given function formula_1 might fix 'bind first argument producing function type formula_2 evaluation function might represented formula_3 note result partial function application case function takes two arguments partial application sometimes incorrectly called currying related distinct concept intuitively partial function application says fix first arguments function get function remaining arguments example function div x x div parameter x fixed 1 another function div div 1 1/y function inv returns multiplicative inverse argument defined inv 1/ practical motivation partial application often functions obtained supplying arguments function useful example many languages function operator similar codice_1 partial application makes easy define functions example creating function represents addition operator 1 bound first argument languages ml haskell functions defined curried form default supplying fewer total number arguments referred partial application languages first-class functions one define codice_2 codice_3 codice_4 perform currying partial application explicitly might incur greater run-time overhead due creation additional closures haskell use efficient techniques scala implements optional partial application placeholder e.g returns incrementing function scala also support multiple parameter lists currying e.g clojure implements partial application using codice_5 function defined core library c++ standard library provides codice_6 return function object result partial application given arguments given function java codice_7 partially applies function first argument perl 6 codice_8 method creates new function fewer parameters python standard library module codice_9 includes codice_5 function allowing positional named argument bindings returning new function xquery argument placeholder codice_11 used non-fixed argument partial function application simply-typed lambda calculus function product types λ partial application currying uncurrying defined note codice_2 codice_4 codice_2
[ 2740, 4743, 5164, 5965, 8122, 1348, 7391, 4039, 7416, 2619 ]
Test
6,912
9
AMPL:ampl mathematical programming language ampl algebraic modeling language describe solve high-complexity problems large-scale mathematical computing i.e. large-scale optimization scheduling-type problems developed robert fourer david gay brian kernighan bell laboratories ampl supports dozens solvers open source commercial software including cbc cplex fortmp gurobi minos ipopt snopt knitro lgo problems passed solvers nl files ampl used 100 corporate clients government agencies academic institutions one advantage ampl similarity syntax mathematical notation optimization problems allows concise readable definition problems domain optimization many modern solvers available neos server formerly hosted argonne national laboratory currently hosted university wisconsin madison accept ampl input according neos statistics ampl popular format representing mathematical programming problems ampl features mix declarative imperative programming styles formulating optimization models occurs via declarative language elements sets scalar multidimensional parameters decision variables objectives constraints allow concise description problems domain mathematical optimization procedures control flow statements available ampl support re-use simplify construction large-scale optimization problems ampl allows separation model data ampl supports wide range problem types among ampl invokes solver separate process advantages interaction solver done well-defined nl interface ampl available many popular 32- 64-bit operating systems including linux mac os x unix windows translator proprietary software maintained ampl optimization llc however several online services exist providing free modeling solving facilities using ampl free student version limited functionality free full-featured version academic courses also available ampl used within microsoft excel via solverstudio excel add-in ampl solver library asl allows reading nl files provides automatic differentiation open-source used many solvers implement ampl connection table present significant steps ampl history transportation problem george dantzig used provide sample ampl model problem finds least cost shipping schedule meets requirements markets supplies factories partial list solvers supported ampl
[ 6507, 361, 4759, 4302, 7428, 6527, 5300, 5571, 5659, 2847, 578, 4705, 4067, 2866, 2054, 6566, 3915, 5621, 1435 ]
Test
6,913
7
Service-oriented_middleware:service-oriented middleware service-oriented middleware som aids distributed object middleware dom systems concept services service context number objects behavior objects use predefined interface make service available systems/services som defines communication protocols services provides location- migration-transparent access services thus supporting simple integration services beyond platform boundaries one example som sun oracle jini system called apache river project architectures belonging field web services also belong category middleware
[]
Test
6,914
3
Quarth:quarth besides arcade version also ports game msx2 built-in scc chip famicom game boy—home releases used quarth name worldwide exception game boy color release europe konami gb collection vol 2 game renamed generic title block game unknown reasons quarth released konami net i-mode service block quarth updated block quarth dx 2001 released without dx suffix 2005 made globally available konami net licensing many i-mode services offered mobile operators europe example available o2 uk o2 ireland telefónica spain 2005 konami also included game nintendo ds title emulated version game released 2006 playstation 2 japan part oretachi geasen zoku sono -series quarth combination tetris -style gameplay fixed shooter space invaders tradition player focus falling blocks action geometrical rather arranging blocks together make row disappearing blocks spaceship positioned bottom screen shoots blocks upwards make falling block pattern squares rectangles blocks arranged properly shape destroyed player awarded points based shape size blocks continue drop top screen various incomplete shapes level progresses blocks drop greater speed frequency also various power-ups could located increase ship speed among bonuses game continues blocks reach dotted line bottom screen whereupon player ship quarthed crushed flat like arcade games game featured multi-player mode arcade demonstrated via split screen player 1 left player 2 right game boy multiplayer required game boy link cable player able view fields game boys msx2 famicom versions two different 2-player modes mode players worked together game mode b arcade split-screen game generally acclaimed many online reviewers though nintendo life gave 6/10
[ 7583 ]
Validation
6,915
2
Abnormal_end:abnormal end abend also ab normal end abend abnormal termination software program crash usage derives error message ibm os/360 ibm zos operating systems usually capitalized may appear abend common abend 0c7 data exception abend 0cb division zero abends could soft allowing automatic recovery hard terminating activity errors crashes novell netware network operating system usually called abends communities netware administrators sprung around internet abend.org term jocularly claimed derived german word abend meaning evening
[ 625, 5962, 1815, 4415, 4009, 2459, 5441, 4013, 2442, 1176 ]
Test
6,916
2
Android_Beam:android beam android beam feature android mobile operating system allows data transferred via near field communication nfc allows rapid short-range exchange web bookmarks contact info directions youtube videos data android beam introduced 2011 android version 4.0 ice cream sandwich improved google acquired bump 2017 computerworld included android beam list once-trumpeted features quietly faded away observing despite admirable marketing effort beam never quite worked particularly well numerous systems sharing stuff proved simpler reliable android beam discontinued android q present second android q beta google pixel 3 android beam activated placing devices back back content shared displayed screen content able sent screen shrink display tap beam top tapping screen sends content one device sound play devices near able beam data sent confirmation tone play negative tone play failed content shrink screen indicating beaming complete sharing one direction device sending content get content receiving device activate android beam devices must support nfc near field communication enabled addition passing lock-screen logging android 4.1 jelly bean devices use android beam send photos videos bluetooth android beam uses nfc enable bluetooth devices instantly pair disable bluetooth complete automatically devices works android devices version 4.1 beaming specific content app allowed control content sent adding android beam support app specify data beaming app open receiving device receiving device app open application page play store beam refers extension android beam samsung first used galaxy iii phones uses near-field communication establish wi-fi direct connection two devices data transfer instead bluetooth connection results faster transfer speeds devices feature beam beam limited devices beam support wi-fi direct nfc htc one samsung galaxy iii external links google play story nfc basics
[ 4116, 5386, 6697, 734 ]
Validation
6,917
4
Bup:bup bup backup system written python uses several formats git capable handling large files like operating system images block-based deduplication optional par2-based error correction bup development began 2010 accepted debian year bup uses git packfile format writing packfiles directly avoiding garbage collection bup available source notably part following distributions
[ 1616, 6289, 4386, 5965, 5571, 578, 1435 ]
Validation
6,918
2
Junos_OS:junos os junos os formally juniper network operating system freebsd-based operating system used juniper networks hardware routers operating system used juniper routing switching security devices juniper offers software development kit sdk partners customers allow additional customization biggest competitor junos cisco systems ios junos os formerly branded juniper junos commonly referred simply junos though general brand name juniper networks including product lines junos fusion key benefits junos os include junos provides single code base across juniper platforms juniper issued new release junos every 90 days since 1998 junos supports variety routing protocols introduction srx j-series past version 9.3 platforms also supports flow mode includes stateful firewalling nat ipsec flexible routing policy language used controlling route advertisements path selection junos generally adheres industry standards routing mpls operating system supports high availability mechanisms standard unix graceful restart junos operating system primarily based linux freebsd linux running bare metal freebsd running qemu virtual machine freebsd unix implementation customers access unix shell execute normal unix commands junos runs juniper hardware systems juniper acquired netscreen integrated screenos security functions junos network operating system junos cli text-based command interface configuring troubleshooting monitoring juniper device network traffic associated supports two types command modes functions operational mode include control cli environment monitoring hardware status display information network data passes though hardware configuration mode used configuring juniper router switch security device adding deleting modifying statements configuration hierarchy juniper developer network jdn juniper networks provides junos sdk customers 3rd-party developers want develop applications junos-powered devices juniper networks routers switches service gateway systems provides set tools application programming interfaces apis including interfaces junos routing firewall filter ui traffic services functions juniper networks also employs junos sdk internally develop parts junos many junos applications openflow junos traffic services 2016 juniper maintains market share ethernet switching 16.9 market share enterprise routing 16.1 juniper generated 2,353 million revenue routing 858 million switching 318 million security 2016 juniper revenue stems americas 2,969 million europe middle east africa 1,238 million asia 783 million combining rest annual revenue 2016
[ 7514, 6794, 4670, 6085, 738, 3636, 4336, 6456, 2583, 5760, 5065, 6477, 424, 3664, 771, 6489, 6860, 7950, 443, 6505, 7605, 1524, 5110, 2644, 1547, 481, 4783, 1193, 4059, 7275, 8001, 6918, 7289, 4441, 861, 6583, 7312, 875, 2001, 191, 1261...
Test
6,919
3
EFM32:efm32 efm32 gecko mcus family energy-friendly mixed-signal 32-bit microcontroller integrated circuits energy micro silicon labs based arm cortex-m cpus including cortex-m0+ cortex-m3 cortex-m4 efm32 microcontrollers majority functionality available deep sleep modes sub-microamp current consumption enabling energy efficient autonomous behavior cpu sleeping efm32 combines quick wakeups efficient processing reduce impact cpu code needs executed good example deep sleep peripheral efm32 low energy sensor interface lesense capable duty-cycling inductive capacitive resistive sensors autonomously operating deep sleep mode another important aspect gecko mcus peripherals direct connection allowing communicate without cpu wake intervention interconnect known peripheral reflex system prs significant functionality available lower stop shutoff energy modes stop mode includes analog comparators watchdog timers pulse counters ic links external interrupts shutoff mode 20–100 na current consumption depending product applications access gpio reset real-time counter rtc retention memory efm32 family consists number sub-families ranging efm32 zero gecko based arm cortex-m0+ higher performing efm32 giant gecko wonder gecko based cortex-m3 cortex-m4 respectively efm32 technology also foundation efr32 wireless geckos portfolio sub-ghz 2.4 ghz wireless system chip soc devices product families important advantage efm32 mcu portfolio energy efficiency energy efficiency stems autonomous operations deep sleep modes low active sleep currents fast wakeup times together characteristics reduce integrated energy power time lifetime application efm32 devices also constructed reduce development cycles variety products smart metering industrial applications pin/software compatible scalable across wide application requirements compatible multiple development platforms additionally mcu architecture common fundamental piece wireless gecko portfolio efr32 software hardware pin/package compatibility efm32 products offer simplified pathway wireless applications efm32 mcu family critical features useful iot applications major architectural features low-energy modes design peripheral reflex system prs gives developers peripheral interconnect system eight triggers handle task execution without cpu intervention low level mcu broken eight categories core memory clock management energy management serial interfaces i/o ports timers triggers analog interfaces security modules terms core cpu efm32 mcus integrate arm cortex-m series technology spanning cortex-m0+ cortex-m4 enable gecko mcu operation take advantage ultralow power architecture applications operate main input clock rate 4 mhz 48 mhz reduce need external electronic components efm32 integrates low frequency ultralow frequency clocks well mcus also integrate internal voltage regulators simplified compact system designs addition cpu clock rate flexibility specific applications efm32 portfolio offers broad range memory resource options application storage flash application execution ram needs rtos implementation devices include internal flash memory low 4 kb high 1024 kb ram low 2 kb high 128 kb enable applications sense control communicate single low-power microcontroller efm32 mcus contain complete analog digital interfaces serial digital interfaces include usart low energy uart i2c usb timer triggers block mcu includes cryotimer low energy pulse counter pcnt backup real-time-counter rtc analog modules include adcs dacs operational amplifiers analog comparators applications demand heightened security protections efm32 mcus offer various hardware crypto engines cyclic redundancy check crc general i/o mcus feature 93 gpio pins several variants feature lcd controllers quickly design develop build test efm32 applications developers various resources available free integrated development environment ide performance analysis tools configuration tools utilities flexible compilers development platforms software stacks reference code design examples app notes training videos whitepapers silicon labs simplicity studio free eclipse-based development platform graphical configuration tools energy-profiling tools wireless network analysis tools demos software examples documentation technical support community forums also includes flexible compiler tool options including gcc arm keil iar embedded workbench third-party tools two popular development tools within simplicity studio ide advanced energy monitor aem network debugger called “ packet trace ” advanced energy monitor efm32 tool allows developers energy profiling application running also allows direct code correlation optimize hardware design software network debugger tool allows developers using wireless gecko mcus trace network traffic packets throughout nodes network efm32 supported multiple third-party real-time operating system rtos software libraries drivers stacks rtos solutions enabled efm32s micro-controller operating systems uc/os micrium freertos gnu chopstx embos segger mbed os arm october 2016 silicon labs acquired micrium addition iot-critical middleware stacks tcp/ip micrium provides certified commercial-grade rtos enables embedded iot designs handle task management real time important mcu applications even essential wireless applications example projects found micrium website efm32 starter kits available evaluation purposes gain familiarity portfolio starter kit contains sensors peripherals help illustrate device capabilities well serve starting point application development using simplicity studio software also grants access kit information ability program starter kit demos code examples starter kits contain eeprom board ids enable automated setup kit connected simplicity studio ide efm32 kits arm mbed-enabled kits support arm mbed right box supported simplicity studio development tools community forums featuring giant gecko mcu 1024 kb flash 93 gpio efm32 giant gecko starter kit shown one latest starter kit offerings efm32 family efm32 starter kits include efm32 designed achieve high degree autonomous operation low-energy modes multiple ultralow energy modes available turning energy usage significantly reducing power consumption achieve power energy-efficiency features efm32 products utilize ultralow active idle power fast wakeup processing times important ability intelligently interact peripherals sensors autonomously without waking cpu consuming power active run mode efm32 consumes 114 µa/mhz running real-life code 32 mhz 3v supply also mode process time matters one main benefits 32-bit mcu working power consumption however maximum clock speed silicon labs carefully designs efm32s optimize performance low power together designing maximum clock speed 48 mhz mcus faster clocks 100 mhz+ range inevitably consume power active mode beyond energy savings run mode efm32 ideal low duty cycle applications take advantage operating lower energy states lower energy states outlined section em1 sleep em2 deep sleep em3 stop em4 shutoff autonomous peripherals peripheral reflex system lesense core technologies come play lower energy modes autonomous peripheral feature ensures peripheral devices operate without waking cpu also extensive direct memory address dma support 16 channels depending efm32 peripheral reflex system boosts capability autonomous peripherals allowing flexible configuration create complex powerful interconnections bypass cpu lesense unique efm32 feature allows mcu monitor 16 sensors deep sleep mode efm32 resistive sensing capacitive sensing inductive sensing mode needed efm32 wake deep sleep engage cpu less two microseconds adc sensing applications temperature demonstration wonder gecko mcu standard temperature thermistor setting adc sample thermistor every second 1 hz rate equates 1.3 ua average current real world would equate 220 ma-hr cr2032 coin cell battery lasting close 20 years application could implemented lesense preset thresholds instead using regular time interval adc samples case lesense irregular triggers threshold trigger rate 1 hz would still produce average current 1.5 ua equates 16.85-year battery life low-energy pulse counter metrology using low energy pulse counter efm32 could also used pulsed sensing applications example magnetic hall effect sensor efm32 convert rotational position quantified speed flow rate common situation water heat flow metering efm32 used stop mode em3 count pulses calculate flow operating power consumption state could low 650 na 3vdc significant positive implications battery-operated meters efm32 microcontroller family one two products energy micro efr4d draco soc radios gecko mbed compiler available https //developer.mbed.org/compiler/ nav
[ 7960, 4846, 7519, 6082, 804, 5208, 469, 4041, 3182, 3365, 6720, 2926, 2024, 7730, 1556, 7905, 5307, 7990, 6910, 5752, 4061, 4336, 5845, 5055, 6371, 7654, 1864, 4166, 6378, 5323, 1772, 3397, 6753, 1779, 4537, 950, 1977, 5079, 2155, 4197, ...
Train
6,920
4
User_activity_monitoring:user activity monitoring field information security user activity monitoring uam monitoring recording user actions uam captures user actions including use applications windows opened system commands executed checkboxes clicked text entered/edited urls visited nearly every on-screen event protect data ensuring employees contractors staying within assigned tasks posing risk organization user activity monitoring software deliver video-like playback user activity process videos user activity logs keep step-by-step records user actions searched analyzed investigate out-of-scope activities need uam rose due increase security incidents directly indirectly involve user credentials exposing company information sensitive files 2014 761 data breaches united states resulting 83 million exposed customer employee records 76 breaches resulting weak exploited user credentials uam become significant component infrastructure main populations users uam aims mitigate risks contractors used organizations complete information technology operational tasks remote vendors access company data risks even malicious intent external user like contractor major security liability 70 regular business users admitted access data necessary generalized accounts give regular business users access classified company data makes insider threats reality business uses generalized accounts administrator accounts heavily monitored due high profile nature access however current log tools generate “ log fatigue ” admin accounts log fatigue overwhelming sensation trying handle vast amount logs account result many user actions harmful user actions easily overlooked thousands user actions compiled every day according verizon data breach incident report “ first step protecting data knowing access it. ” today ’ environment “ lack oversight control among employees access confidential sensitive information. ” apparent gap one many factors resulted major number security issues companies companies use uam usually separate necessary aspects uam three major components visual forensics involves creating visual summary potentially hazardous user activity user action logged recorded user session completed uam created written record visual record whether screen-captures video exactly user done written record differs siem logging tool captures data user-level system level –providing plain english logs rather syslogs originally created debugging purposes textual logs paired corresponding screen-captures video summaries using corresponding logs images visual forensics component uam allows organizations search exact user actions case security incident case security threat i.e data breach visual forensics used show exactly user everything leading incident visual forensics also used provide evidence law enforcement investigate intrusion user activity alerting serves purpose notifying whoever operates uam solution mishap misstep concerning company information real-time alerting enables console administrator notified moment error intrusion occurs alerts aggregated user provide user risk profile threat ranking alerting customizable based combinations users actions time location access method alerts triggered simply opening application entering certain keyword web address alerts also customized based user actions within application deleting creating user executing specific commands user behavior analytics add additional layer protection help security professionals keep eye weakest link chain monitoring user behavior help dedicated software analyzes exactly user session security professionals attach risk factor specific users and/or groups immediately alerted red flag warning high-risk user something interpreted high-risk action exporting confidential customer information performing large database queries scope role accessing resources ’ accessing forth uam collects user data recording activity every user applications web pages internal systems databases uam spans access levels access strategies rdp ssh telnet ica direct console login etc.… uam solutions pair citrix vmware environments uam solutions transcribe documented activities user activity logs uam logs match video-playbacks concurrent actions examples items logged names applications run titles pages opened urls text typed edited copied/pasted commands scripts uam uses screen-recording technology captures individual user actions video-like playback saved accompanied user activity log playbacks differ traditional video playback screen scraping compiling sequential screen shots video like replay user activity logs combined video-like playback provides searchable summary user actions enables companies read also view exactly particular user company systems companies employees raised issue user privacy aspect uam believe employees resist idea actions monitored even done security purposes reality uam strategies address concerns possible monitor every single user action purpose uam systems snoop employee browsing history uam solutions use policy-based activity recording enables console administrator program exactly ’ monitored many regulations require certain level uam others require logs activity audit purposes uam meets variety regulatory compliance requirements hipaa iso 27001 sox pci etc.… uam typically implemented purpose audits compliance serve way companies make audits easier efficient audit information request information user activity met uam unlike normal log siem tools uam help speed audit process building controls necessary navigate increasingly complex regulatory environment ability replay user actions provides support determining impact regulated information security incident response uam two deployment models appliance-based monitoring approaches use dedicated hardware conduct monitoring looking network traffic software-based monitoring approaches use software agents installed nodes accessed users commonly software requires installation agent systems servers desktops vdi servers terminal servers across users want monitor agents capture user activity reports information back central console storage analysis solutions may quickly deployed phased manner targeting high-risk users systems sensitive information first allowing organization get running quickly expand new user populations business requires
[ 860, 1273, 7151, 2054, 3997, 3756 ]
Test
6,921
2
Redox_(operating_system):redox operating system redox unix-like microkernel operating system written programming language rust language strong focus safety stability high performance redox aims secure usable free redox inspired prior kernels operating systems minix plan 9 bsd similar gnu bsd ecosystem memory-safe language modern technology free open-source software distributed mit license redox operating system designed highly secure reflected several design decisions redox full-featured operating system providing packages memory allocator file system display manager core utilities etc together make functional operating system redox relies ecosystem software written rust members project redox supports command-line interface cli programs including redox supports graphical user interface gui programs including redox created jeremy soller first published 20 april 2015 github since developed actively contributions 40 developers second anniversary redox appearing github version 0.2.0 released
[ 2540, 1522, 3509, 5275, 4670, 5021, 4399, 6984, 7823, 5571, 3544, 7554, 6367, 1959, 3559, 5506, 7848, 4175, 6385, 336, 1975, 7581, 3751, 7775, 6505 ]
Test
6,922
3
Computer_architecture:computer architecture computer engineering computer architecture set rules methods describe functionality organization implementation computer systems definitions architecture define describing capabilities programming model computer particular implementation definitions computer architecture involves instruction set architecture design microarchitecture design logic design implementation first documented computer architecture correspondence charles babbage ada lovelace describing analytical engine building computer z1 1936 konrad zuse described two patent applications future projects machine instructions could stored storage used data i.e stored-program concept two early important examples term “ architecture ” computer literature traced work lyle r. johnson frederick p. brooks jr. members machine organization department ibm ’ main research center 1959 johnson opportunity write proprietary research communication stretch ibm-developed supercomputer los alamos national laboratory time known los alamos scientific laboratory describe level detail discussing luxuriously embellished computer noted description formats instruction types hardware parameters speed enhancements level “ system architecture ” – term seemed useful “ machine organization. ” subsequently brooks stretch designer started chapter 2 book planning computer system project stretch ed w. buchholz 1962 writing brooks went help develop ibm system/360 called ibm zseries line computers “ architecture ” became noun defining “ user needs know ” later computer users came use term many less-explicit ways earliest computer architectures designed paper directly built final hardware form later computer architecture prototypes physically built form transistor–transistor logic ttl computer—such prototypes 6800 pa-risc—tested tweaked committing final hardware form 1990s new computer architectures typically built tested tweaked—inside computer architecture computer architecture simulator inside fpga soft microprocessor both—before committing final hardware form discipline computer architecture three main subcategories types computer architecture following types used bigger companies like intel count 1 computer architecture purpose design computer maximizes performance keeping power consumption check costs low relative amount expected performance also reliable many aspects considered includes instruction set design functional organization logic design implementation implementation involves integrated circuit design packaging power cooling optimization design requires familiarity compilers operating systems logic design packaging instruction set architecture isa interface computer software hardware also viewed programmer view machine computers understand high-level programming languages java c++ programming languages used processor understands instructions encoded numerical fashion usually binary numbers software tools compilers translate high level languages instructions processor understand besides instructions isa defines items computer available program—e.g data types registers addressing modes memory instructions locate available items register indexes names memory addressing modes isa computer usually described small instruction manual describes instructions encoded also may define short vaguely mnemonic names instructions names recognized software development tool called assembler assembler computer program translates human-readable form isa computer-readable form disassemblers also widely available usually debuggers software programs isolate correct malfunctions binary computer programs isas vary quality completeness good isa compromises programmer convenience easy code understand size code much code required specific action cost computer interpret instructions complexity means hardware needed decode execute instructions speed computer complex decoding hardware comes longer decode time memory organization defines instructions interact memory memory interacts design emulation software emulators run programs written proposed instruction set modern emulators measure size cost speed determine particular isa meeting goals computer organization helps optimize performance-based products example software engineers need know processing power processors may need optimize software order gain performance lowest price require quite detailed analysis computer organization example sd card designers might need arrange card data processed fastest possible way computer organization also helps plan selection processor particular project multimedia projects may need rapid data access virtual machines may need fast interrupts sometimes certain tasks need additional components well example computer capable running virtual machine needs virtual memory hardware memory different virtual computers kept separated computer organization features also affect power consumption processor cost instruction set micro-architecture designed practical machine must developed design process called implementation implementation usually considered architectural design rather hardware design engineering implementation broken several steps cpus entire implementation process organized differently often referred cpu design exact form computer system depends constraints goals computer architectures usually trade standards power versus performance cost memory capacity latency latency amount time takes information one node travel source throughput sometimes considerations features size weight reliability expandability also factors common scheme depth power analysis figures keep power consumption low maintaining adequate performance modern computer performance often described ipc instructions per cycle measures efficiency architecture clock frequency since faster rate make faster computer useful measurement older computers ipc counts low 0.1 instructions per cycle simple modern processors easily reach near 1 superscalar processors may reach three five ipc executing several instructions per clock cycle counting machine language instructions would misleading varying amounts work different isas instruction standard measurements count isa actual machine language instructions unit measurement usually based speed vax computer architecture many people used measure computer speed clock rate usually mhz ghz refers cycles per second main clock cpu however metric somewhat misleading machine higher clock rate may necessarily greater performance result manufacturers moved away clock speed measure performance factors influence speed mix functional units bus speeds available memory type order instructions programs two main types speed latency throughput latency time start process completion throughput amount work done per unit time interrupt latency guaranteed maximum response time system electronic event like disk drive finishes moving data performance affected wide range design choices — example pipelining processor usually makes latency worse makes throughput better computers control machinery usually need low interrupt latencies computers operate real-time environment fail operation completed specified amount time example computer-controlled anti-lock brakes must begin braking within predictable short time brake pedal sensed else failure brake occur benchmarking takes factors account measuring time computer takes run series test programs although benchmarking shows strengths n't choose computer often measured machines split different measures example one system might handle scientific applications quickly another might render video games smoothly furthermore designers may target add special features products hardware software permit specific benchmark execute quickly n't offer similar advantages general tasks power efficiency another important measurement modern computers higher power efficiency often traded lower speed higher cost typical measurement referring power consumption computer architecture mips/w millions instructions per second per watt modern circuits less power required per transistor number transistors per chip grows transistor put new chip requires power supply requires new pathways built power however number transistors per chip starting increase slower rate therefore power efficiency starting become important important fitting transistors single chip recent processor designs shown emphasis put focus power efficiency rather cramming many transistors single chip possible world embedded computers power efficiency long important goal next throughput latency increases clock frequency grown slowly past years compared power reduction improvements driven end moore law demand longer battery life reductions size mobile technology change focus higher clock rates power consumption miniaturization shown significant reductions power consumption much 50 reported intel release haswell microarchitecture dropped power consumption benchmark 30-40 watts 10-20 watts comparing processing speed increase 3 ghz 4 ghz 2002 2006 seen focus research development shifting away clock frequency moving towards consuming less power taking less space
[ 4297, 1447, 13, 14, 5737, 1478, 1481, 4347, 65, 4362, 4368, 84, 90, 1522, 7242, 4397, 1556, 126, 4423, 1568, 1570, 1574, 5854, 5865, 154, 156, 7314, 1607, 5893, 4469, 4472, 7331, 7333, 4479, 190, 4482, 204, 1648, 216, 3120, 5939, 5947...
Test
6,923
7
MeshBox:meshbox meshbox item computer hardware used provide large scale wireless broadband networks manufactured locustworld devices designed co-operate meshboxes within range passing internet service one box next air reaches final destination coverage area mesh typically measured square miles square kilometres originally released bootable cd-rom called meshap based openap open source software system implemented system image fit within small 32mb compactflash card system functions expanded beyond creating wireless networks provide set-top box services mp3 audio video streaming connection remote windows terminal servers pcs web browsing connection peer-to-peer networks instant messaging file exchange
[ 6335, 1984, 7169 ]
Validation
6,924
9
Marc_Auslander:marc auslander marc alan auslander american computer scientist known contributions pl/8 compiler spent entire career ibm thomas j. watson research center yorktown heights ny auslander received bachelor arts degree mathematics princeton university 1963 joined ibm year 1991 named ibm fellow retired 2004 continues affiliated ibm fellow emeritus 1996 auslander elected national academy engineering contributions reduced instruction set computing risc systems 1999 named acm fellow ieee fellow contributions risc 1970 1972 auslander served chairman acm sigops authored 19 scientific papers holds 14 u.s. patents
[]
Train
6,925
0
Distributional_semantics:distributional semantics distributional semantics research area develops studies theories methods quantifying categorizing semantic similarities linguistic items based distributional properties large samples language data basic idea distributional semantics summed so-called distributional hypothesis linguistic items similar distributions similar meanings distributional hypothesis linguistics derived semantic theory language usage i.e words used occur contexts tend purport similar meanings underlying idea word characterized company keeps popularized firth distributional hypothesis basis statistical semantics although distributional hypothesis originated linguistics receiving attention cognitive science especially regarding context word use recent years distributional hypothesis provided basis theory similarity-based generalization language learning idea children figure use words 've rarely encountered generalizing use distributions similar words distributional hypothesis suggests semantically similar two words distributionally similar turn thus tend occur similar linguistic contexts whether suggestion holds significant implications data-sparsity problem computational modeling question children able learn language rapidly given relatively impoverished input also known problem poverty stimulus distributional semantics favor use linear algebra computational tool representational framework basic approach collect distributional information high-dimensional vectors define distributional/semantic similarity terms vector similarity different kinds similarities extracted depending type distributional information used collect vectors topical similarities extracted populating vectors information text regions linguistic items occur paradigmatic similarities extracted populating vectors information linguistic items items co-occur note latter type vectors also used extract syntagmatic similarities looking individual vector components basic idea correlation distributional semantic similarity operationalized many different ways rich variety computational models implementing distributional semantics including latent semantic analysis lsa hyperspace analogue language hal syntax- dependency-based models random indexing semantic folding various variants topic model distributional semantic models differ primarily respect following parameters distributional semantic models use linguistic items context also referred word space vector space models compositional distributional semantic models extension distributional semantic models characterize semantics entire phrases sentences achieved composing distributional representations words sentences contain different approaches composition explored discussion established workshops semeval simpler non-compositional models fail capture semantics larger linguistic units ignore grammatical structure logical words crucial understanding distributional semantic models applied successfully following tasks
[ 5429, 5520, 7389, 3158, 4037, 5286 ]
Validation
6,926
3
Double_Tools_for_DoubleSpace:double tools doublespace double tools doublespace software utility released 1993 menlo park-based company addstor inc utility functioned add-on disk compression software doublespace supplied ms-dos 6.0 adding number features available standard version double tools utilities worked microsoft windows providing graphical view control panel compressed drives computer utilities supplied ms-dos operated dos-mode double tools also contained number disk checking rescue/recovery utilities included utilities called silent tools one unique features time capability defragment doublespace compressed drive background features including background defragmentation capability required user let double tools replace standard compression driver ms-dos dblspace.bin one developed addstor claimed 100 compatible doublespace microsoft real-time compression interface introduced ms-dos 6.0 driver added number extra features use 32-bit code paths detected intel 80386 higher cpu caching capabilities addition supporting use upper memory area also permitted use extended memory buffers reducing driver total footprint conventional upper memory albeit cost somewhat reduced speed features provided double tools ability compressed removable media auto-mounted used instead user manually although capability later introduced standard version doublespace found ms-dos 6.2 double tools also capability put special utility compressed floppy disks made possible access compressed data even computers n't doublespace double tools another interesting function ability split compressed volume multiple floppy disks able see entire volume first disk inserted prompted change discs necessary also possible share compressed volume remote computer
[ 1254, 4547, 4759, 6380, 5571 ]
Test
6,927
5
Nortel_Discovery_Protocol:nortel discovery protocol nortel discovery protocol ndp data link layer osi layer 2 network protocol discovery nortel networking devices certain products avaya ciena device topology information may graphically displayed network management software nortel discovery protocol origin synoptics network management protocol sonmp developed synoptics wellfleet communications merger 1994 protocol rebranded bay network management protocol bnmp protocol analyzers referenced bay discovery protocol bdp four years later 1998 bay networks acquired nortel renamed nortel discovery protocol ieee 802.1ab link layer discovery protocol supported nortel equipment standards based vendor-neutral protocol supports multi-vendor environments
[ 6691, 883, 7888, 899, 5492, 2534, 7095 ]
Test
6,928
2
OSEK:osek osek offene systeme und deren schnittstellen für die elektronik kraftfahrzeugen english open systems interfaces electronics motor vehicles standards body produced specifications embedded operating system communications stack network management protocol automotive embedded systems also produced related specifications osek designed provide standard software architecture various electronic control units ecus throughout car supported popular ssl/tls libraries wolfssl optimal security measures osek founded 1993 german automotive company consortium bmw robert bosch gmbh daimlerchrysler opel siemens volkswagen group university karlsruhe 1994 french cars manufacturers renault psa peugeot citroën similar project called vdx vehicle distributed executive joined consortium therefore official name osek/vdx osek open standard published consortium founded automobile industry parts osek standardized iso 17356 documents current osek standard specifies interfaces multitasking functions—generic i/o peripheral access—and thus remains architecture dependent osek systems expected run chips without memory protection features osek implementation usually configured compile-time number application tasks stacks mutexes etc statically configured possible create run time osek recognizes two types tasks/threads/compliance levels basic tasks enhanced tasks basic tasks never block run completion coroutine enhanced tasks sleep block event objects events triggered tasks basic enhanced interrupt routines static priorities allowed tasks first first fifo scheduling used tasks equal priority deadlocks priority inversion prevented priority ceiling i.e priority inheritance specification uses iso/ansi-c-like syntax however implementation language system services specified application binary interface abi also specified comment two claims contradictory 1 static priorities allowed tasks 2 uses priority ceiling states protocol works temporarily raising priorities tasks certain situations thus requires scheduler supports dynamic priority scheduling according german version entry namely scheduling configured two different ways br preemptive scheduling task always preempted means higher priority task. br non-preemptive scheduling task preempted prefixed compile-time points cooperative scheduling br mixed mode also possible autosar consortium reuses osek specifications operating system backwards compatible superset osek os also covers functionality osektime communication module derived osek com osektime specifies standard optional time-triggered real-time operating systems used osektime triggered callbacks run higher priority osek tasks
[ 248, 5055, 5571, 7664, 4336 ]
Train
6,929
4
Ngrep:ngrep ngrep network grep network packet analyzer written jordan ritter command-line interface relies upon pcap library gnu regex library ngrep supports berkeley packet filter bpf logic select network sources destinations protocols also allows matching patterns regular expressions data payload packets using gnu grep syntax showing packet data human-friendly way ngrep open source application source code available download ngrep site sourceforge compiled ported multiple platforms works many unix-like operating systems linux solaris illumos bsd aix also works microsoft windows ngrep similar tcpdump ability look regular expression payload packet show matching packets screen console allows users see unencrypted traffic passed network putting network interface promiscuous mode ngrep appropriate bpf filter syntax used debug plain text protocols interactions like http smtp ftp dns among others search specific string pattern using grep regular expression syntax ngrep also used capture traffic wire store pcap dump files read files generated sniffer applications like tcpdump wireshark ngrep various options command line arguments ngrep man page unix-like operating systems show list available options examples assumed eth0 used network interface ngrep -l -q -d eth0 -i ^get |^post tcp port 80 ngrep -l -q -d eth0 -i user-agent tcp port 80 ngrep -l -q -d eth0 -i udp port 53 capturing raw network traffic interface requires special privileges superuser privileges platforms especially unix-like systems ngrep default behavior drop privileges platforms running specific unprivileged user like tcpdump also possible use ngrep specific purpose intercepting displaying communications another user computer entire network privileged user running ngrep server workstation connected device configured port mirroring switch router gateway connected device used network traffic capture lan man wan watch unencrypted information related login id passwords urls content websites viewed network
[ 4759, 4316, 7534, 726, 7637, 5571, 6908, 578, 2043, 588, 7476, 4895, 3819, 6574, 5880, 1435 ]
Test
6,930
9
Psake:psake psake domain-specific language build automation tool written powershell create builds using dependency pattern similar rake msbuild intends simplify build language compared msbuild scripting build script consists tasks task function define dependencies task functions following example psake script psake executes task functions enforces dependencies tasks since psake written real programming language xml lot freedom flexibility build scripts use features powershell .net framework within build output running psake script shown
[ 5571, 7848, 2530 ]
Validation
6,931
5
HTTP_message_body:http message body http message body data bytes transmitted http transaction message immediately following headers case http/0.9 headers transmitted request/response message consists following request/status line headers must end cr lf carriage return followed line feed empty line must consist cr lf whitespace optional http message body data article defines could response web server message body content example text hello world
[ 4635, 8174, 84, 2054, 833, 6975, 7290, 7649, 2901, 3999, 3383 ]
Validation
6,932
1
Intelligent_database:intelligent database 1980s databases viewed computer systems stored record-oriented business data manufacturing inventories bank records sales transactions database system expected merge numeric data text images multimedia information expected automatically notice patterns data stored late 1980s concept intelligent database put forward system manages information rather data way appears natural users goes beyond simple record keeping term introduced 1989 book intelligent databases kamran parsaye mark chignell setrag khoshafian harry wong concept postulated three levels intelligence systems high level tools user interface database engine high level tools manage data quality automatically discover relevant patterns data process called data mining layer often relies use artificial intelligence techniques user interface uses hypermedia form uniformly manages text images numeric data intelligent database engine supports two layers often merging relational database techniques object orientation twenty-first century intelligent databases become widespread e.g hospital databases call patient histories consisting charts text x-ray images mouse clicks many corporate databases include decision support tools based sales pattern analysis
[ 1905, 6604, 7330, 7341, 6345, 5561, 906, 5217, 6098, 4054, 6636, 2663, 2124, 6737, 6739, 3119, 3801, 7999, 5943, 6462, 2054, 6386, 684, 6390, 7937, 7303, 6144, 4457, 3244, 6320, 1902, 6594 ]
Validation
6,933
2
Active_Template_Library:active template library active template library atl set template-based c++ classes developed microsoft intended simplify programming component object model com objects com support microsoft visual c++ allows developers create variety com objects ole automation servers activex controls atl includes object wizard sets primary structure objects quickly minimum hand coding com client side atl provides smart pointers deal com reference counting library makes heavy use curiously recurring template pattern com objects also created microsoft foundation classes mfc leads larger binaries require support dlls atl hand lightweight alternative situations graphical user interface parts mfc required atl version 7 visual studio 2003 directly succeeded version 3 visual studio 6.0 number mfc classes like cstring made available atl precisely moved atlmfc common layer shared libraries atl version 7 also introduced attributes c++ attempt provide something similar cli attributes however particularly successful deemphasized atl version 8 visual studio 2005 various wizards longer generate default version 7 also introduced new string conversion classes july 28 2009 microsoft released patch atl fix bug could allow activex controls created using atl vulnerable remote code execution security flaw since visual studio 2013 atl code visual c++ 2013 static eliminating dll atl includes many raii classes simplify management com types commonly used classes include although formally part atl microsoft visual c++ also includes additional c++ raii classes simplify management com types compiler com support classes used replacement combination atl includes note visual studio 2012 compiler com support classes include safearray wrapper
[ 7149, 6420, 714, 2198, 720, 1460, 1840, 2928, 5747, 6116, 2953, 6840, 7573, 422, 5786, 5787, 4017, 6504, 4022, 1154, 4026, 7607, 1526, 3687, 4759, 2283, 5479, 7263, 150, 3398, 519, 3052, 4448, 3407, 1232, 2702, 7687, 1989, 4848, 4129, 5...
Test
6,934
9
PyMC3:pymc3 pymc3 python package bayesian statistical modeling probabilistic machine learning focuses advanced markov chain monte carlo variational fitting algorithms rewrite scratch previous version pymc software unlike pymc2 used fortran extensions performing computations pymc3 relies theano automatic differentiation also computation optimization dynamic c compilation pymc3 together stan popular probabilistic programming tools pymc3 open source project developed community fiscally sponsored numfocus pymc3 used solve inference problems several scientific domains including astronomy molecular biology crystallography chemistry ecology psychology previous versions pymc also used widely example climate science public health neuroscience parasitology theano announced plans discontinue development 2017 pymc3 team decided 2018 develop new version pymc named pymc4 pivot tensorflow probability computational backend new version beta pymc3 continue primary target development efforts theano backend supported pymc3 team extended period time pymc3 implements non-gradient-based gradient-based markov chain monte carlo mcmc algorithms bayesian inference stochastic gradient-based variational bayesian methods approximate bayesian inference
[ 3606, 2820, 1626, 4759, 5548, 7966, 1731, 5117, 5571, 4872, 4705, 4067, 3981, 3388, 4070, 3807, 1398, 7848, 1879, 7579, 3410, 5965, 3915, 2803, 1435 ]
Test
6,935
3
Socket_G2:socket g2 socket g2 also known rpga 988b intel cpu socket used line mobile core i7 successor core 2 line also several mobile core i5 core i3 processors based intel sandy bridge architecture like predecessor socket g1 systems run dual-channel memory mode data rates 1600 mhz opposed triple-channel mode unique lga-1366 platform subsequent xeon sockets socket g2 cpus also known fcpga988 socket processors pin compatible ppga988 although nearly motherboards using socket intended mobile products like laptops desktop boards using exist supermicro example produced number mini itx motherboards using qm77 chipset rpga 989 sockets shown left take socket socket g1 rpga988a socket socket g2 rpga988b supported memory see also
[ 2541, 4123, 3849, 3443, 1729, 2828, 6173, 7974, 2830, 3002, 4314, 5379, 3193, 1841, 1645, 3203, 4968, 3385, 4972, 5853, 3565, 2685, 7484, 8021, 7302, 5963, 866, 3333, 7134, 262, 6683, 5886 ]
Test
6,936
3
SV-328:sv-328 sv-328 8-bit home computer introduced spectravideo june 1983 business-targeted model spectravideo range sporting rather crowded full-travel keyboard numeric keypad 80 kb ram 64 kb available software remaining 16 kb video memory respectable amount time keyboard ram machine identical little brother sv-318 sv-328 design msx standard based spectravideo msx-compliant successor 328 sv-728 looks almost identical immediately noticeable differences larger cartridge slot central position fit msx standard cartridges lighter shaded keyboard msx badging reference operating system microsoft extended basic confused msx basic although marketing time claimed microsoft extended msx stood back sv-318 sv-328 adapters permit connect peripherals tape drive sv-903 cvbs monitor joysticks however super expander unit options available
[ 768, 1052, 1670, 1237, 5571, 6970, 974, 1992 ]
Test
6,937
2
Android_Q:android q android q upcoming tenth major release 17th version android mobile operating system currently public beta final release android q scheduled release q3 2019 google released first beta android q march 13 2019 exclusively pixel phones including first generation pixel pixel xl devices support extended due popular demand total six beta release-candidate versions released final release currently scheduled third quarter 2019 beta program expanded release beta 3 may 7 2019 beta available 14 partner devices 11 oems twice many devices compared android pie beta beta access removed huawei mate 20 pro may 21 2019 due u.s. government sanctions later reverted given access back may 31 google released beta 4 june 5 2019 finalized android q apis sdk api level 29 dynamic system updates dsu also included beta 4 dynamic system update allows android q devices temporarily install gsi generic system image try newer version android top current android version users decide end testing chosen gsi image simply reboot device boot back normal device android version google released beta 5 july 10 2019 final api 29 sdk well latest optimizations bug fixes google released beta 6 final release candidate testing august 7 2019 android q introduces revamped full-screen gesture system gestures swiping either side edge display go back swiping go home screen swiping holding access overview swiping diagonally bottom corner screen activate google assistant swiping along gesture bar bottom screen switch apps support gestures mandatory oems free add gestures alongside core gestures legacy three-key navigation style remains supported use edge swiping gesture back command noted potentially causing conflicts apps utilize sidebar menus functions accessible swiping api used apps opt handling back gesture within specific areas screen sensitivity control added adjusting size target area activate gesture google later stated drawer widget would support peeked long-pressing near edge screen swiped open feature known bubbles used present content supported apps pop-up overlays similarly overlay-based chat heads feature facebook messenger apps spawn bubbles via notifications example use cases feature include chat messaging apps reminders ongoing tasks updates bubbles designed replace existing overlay permission deprecated due security due use clickjacking malware performance concerns go edition forbids use overlay permissions entirely sideloaded apps automatically lose overlay permission 30 seconds apps play store lose overlay permission time device rebooted android q includes system-level dark theme third-party apps automatically engage dark theme mode active platform optimizations made foldable smartphones including app continuity changing modes changes multi-window mode allow apps run simultaneously rather actively-used app running others considered paused additional support multiple displays direct share succeeded sharing shortcuts allows apps return lists direct targets sharing combination app specific contact use within share menus unlike direct share apps publish targets advance polled runtime improving performance several major security privacy changes present q apps restricted users access location data actively used foreground also new restrictions launching activities background apps major change storage access permissions known scoped storage supported q become mandatory apps beginning next major android release 2020 apps allowed access files external storage created preferably contained within app-specific directory audio image video files contained within music pictures videos directories file may accessed via user intervention storage access framework apps must new read privileged phone state permission order read non-resettable device identifiers imei number
[ 3933, 5372, 6427, 1095, 740, 7189, 4340, 42, 3309, 3310, 7924, 2591, 5771, 5775, 6153, 7956, 5455, 6176, 5473, 474, 6183, 822, 831, 5141, 136, 2317, 2673, 6209, 1582, 2683, 855, 168, 6232, 6950, 2712, 4116, 5195, 2003, 195, 6978, 7346, ...
Train
6,938
4
Honeynet_Project:honeynet project honeynet project international security research organization dedicated investigating latest attacks developing open source security tools improve internet security learning hackers behave honeynet project began 1999 small mailing list group people time group expanded officially dubbed honeynet project june 2000 project includes dozens active chapters around world including brazil indonesia greece india mexico iran australia ireland many united states honeynet project focuses three primary goals honeynet project volunteers collaborate security research efforts covering data analysis approaches unique security tool development gathering data attackers malicious software use project research provides critical additional information motives attacking communicate attack systems actions compromising system information provided know enemy whitepapers project blog posts scan month forensic challenges project uses normal computers without known vulnerabilities monitors network attacks
[ 907, 6488, 5444, 3486 ]
Validation
6,939
3
Ishido:_The_Way_of_Stones:ishido way stones ishido way stones puzzle video game released 1990 accolade developed publishing international designed michael feinberg programmed ian gilman michael sandige game producer brad fregger brodie lockard designer shanghai computer game contributed graphics ishido puzzle board game consisting set 72 stones game board 96 squares every stone two attributes color symbol six colors six symbols stone set thus creating 36 unique stones since stone comes pair therefore 72 stones stone set primary objective ishido place 72 stones onto board 96 squares challenge arises stones must placed adjacent others match either color symbol board begins fill objective easily accomplished valuable move 4-way stone placed midst four others two matched color two matched symbol ishido comes 6 differently themed stone sets 5 different game boards variety oriental chimes sound effects ishido originally released macintosh 1990 ports ms-dos amiga game boy sega genesis year atari lynx famicom disk system versions published 1991 microsoft entertainment pack contained adaptation ishido called stones genesis port game involved copyright trial sega v. accolade actual physical board game version ishido published japan ascii 1992 compute called macintosh version ishido addictive ... peaceful encounter oriental flavor new york times wrote one deceptively simple games like go gradually reveal subtleties ... engrossing computer gaming world called game remarkably complex entertainment resource pleasant surprises magazine liked ishido vga graphics concluded would please novice experienced strategy game players atari lynx version game reviewed 1992 dragon 181 hartley patricia kirk lesser role computers column reviewers gave game 5 5 stars entertainment weekly gave game b+ ishido rated 'five mice macuser entered macuser game hall fame also pc magazine best strategy game year award 1990 reviewing ishido re-release 1995 macuser gave 4 5 mice integrated ishido oracle way ask questions ancient chinese book changes ching first user poses question meditate upon playing game attain 4-way match ishido utilizing algorithm authentic yarrow stalk method consulting oracle obtains answer original translation ching used wilhelm/baynes anthony translations primary sources written game michael feinberg original ishido game published publishing international limited edition hand-made walnut slip box following year 1990 accolade published first mass-market version ishido came 20-page booklet legend ishido began story fictional written michael feinberg nevertheless many believed ishido actually ancient game recently re-discovered
[ 4023, 6380, 3421, 2934, 6713, 63 ]
Validation
6,940
6
7-Zip:7-zip 7-zip free open-source file archiver utility used place groups files within compressed containers known archives developed igor pavlov first released 1999 7-zip uses 7z archive format read write several archive formats program used command-line interface command p7zip graphical user interface also features shell integration 7-zip source code gnu lgpl license unrar code however gnu lgpl unrar restriction states developers permitted use code reverse-engineer rar compression algorithm default 7-zip creates 7z-format archives codice_1 file extension archive contain multiple directories files container format security size reduction achieved using stacked combination filters consist pre-processors compression algorithms encryption filters core 7z compression uses variety algorithms common bzip2 ppmd lzma2 lzma developed pavlov lzma relatively new system making debut part 7z format lzma uses lz-based sliding dictionary 4 gb size backed range coder native 7z file format open modular file names stored unicode 2011 toptenreviews found 7z compression least 17 better zip 7-zip site since 2002 reported compression ratio results dependent upon data used tests usually 7-zip compresses 7z format 30–70 better zip format 7-zip compresses zip format 2–10 better zip-compatible programs 7z file format specification distributed program source code doc subdirectory 7-zip supports number compression non-compression archive formats packing unpacking including zip gzip bzip2 xz tar wim utility also supports unpacking apm arj chm cpio deb flv jar lha/lzh lzma mslz office open xml onepkg rar rpm smzip swf xar z archives cramfs dmg fat hfs iso mbr ntfs squashfs udf vhd disk images 7-zip supports zipx format unpacking support since least version 9.20 released late 2010 7-zip open msi files allowing access meta-files within along main contents microsoft cab lzx compression nsis lzma installer formats opened similarly microsoft executable programs .exes self-extracting archives otherwise contain archived content e.g. setup files may opened archives compressing zip gzip files 7-zip uses deflate encoder may achieve higher compression lower speed common zlib deflate implementation 7-zip deflate encoder implementation available separately part advancecomp suite tools decompression engine rar archives developed using freely available source code unrar program licensing restriction creation rar compressor 7-zip v15.06 later support extraction files rar5 format backup systems use formats supported archiving programs 7-zip e.g. android backups codice_2 format extracted archivers 7-zip 7-zip comes file manager along standard archiver tools file manager toolbar options create archive extract archive test archive detect errors copy move delete files open file properties menu exclusive 7-zip file manager default displays hidden files follow windows explorer policies tabs show name modification time original compressed sizes attributes comments 4dos codice_3 format going one directory root drives removable internal appear going shows list four options 7-zip lzma sdk originally dual-licensed gnu lgpl common public license additional special exception linked binaries december 2 2008 sdk placed igor pavlov public domain two command-line versions provided 7z.exe using external libraries standalone executable 7za.exe containing built-in modules compression/decompression support limited 7z zip gzip bzip2 z tar formats 64-bit version available support large memory maps leading faster compression versions support multi-threading 7za.exe version 7-zip available unix-like operating systems including linux freebsd macos freedos openvms amigaos 4 morphos p7zip project 7-zip supports self-extracting archives including executable installer 7-zip vulnerable arbitrary code execution dll hijacking load run dll named uxtheme.dll folder executable file 7-zip 16.03 release notes say installer sfx modules added protection dll preloading attack versions 7-zip prior 18.05 contain arbitrary code execution vulnerability module extracting files rar archives cve-2018-10115 vulnerability fixed 30 april 2018 snapfiles.com 2012 rated 7-zip 4.5 stars 5 noting interface additional features fairly basic compression ratio outstanding techrepublic 2009 justin james found detailed settings windows file manager integration appreciated called compression-decompression benchmark utility neat though archive dialog settings confound users concluded 7-zip fits nice niche built-in windows capabilities features paid products able handle large variety file formats process 2002 2016 7-zip downloaded 410 million times sourceforge alone software received awards 2007 sourceforge.net granted community choice awards technical design best project 2013 7-zip received tom hardware elite award due superiority speed compression ratio
[ 2810, 3431, 4213, 7058, 985, 1534, 6885, 1352, 204, 2390, 6992, 5571, 2026, 3967, 5660, 658, 578, 4700, 1955, 7746, 3032, 1576, 753, 6211, 7201, 3219, 510, 7387, 7669, 8126, 1127, 2334, 7581, 4732, 5256, 3152, 6489, 169, 1139, 7306, 758...
Train
6,941
4
De-perimeterisation:de-perimeterisation information security de-perimeterisation removal boundary organisation outside world de-perimeterisation protecting organization systems data multiple levels using mixture encryption secure computer protocols secure computer systems data-level authentication rather reliance organization network boundary internet successful implementation de-perimeterised strategy within organization implies perimeter outer security boundary removed metaphorically de-perimeterisation similar historic dismantling city walls allow free flow goods information achieve shift city states nation states creation standing armies city boundaries extended surround multiple cities de-perimeterisation coined jon measham former employee uk ’ royal mail research paper subsequently used jericho forum royal mail founding member claims made removal border include freeing business-to-business transactions reduction cost ability company agile taken furthest extent organisation could operate securely directly internet operating without hardened border frees organizations collaborate utilizing solutions based collaboration oriented architecture framework recently term used context result entropy deliberate activities individuals within organizations usurp perimeters often well-intentioned reasons latest jericho forum paper named collaboration oriented architecture refers trend de-perimeterisation problem problem br traditional electronic boundary corporate ‘ private ’ network internet breaking trend called de-perimeterisation variations term used describe aspects de-perimeterisation
[ 6870, 6625, 2566, 6346 ]
Test
6,942
0
Co-occurrence_network:co-occurrence network co-occurrence networks generally used provide graphic visualization potential relationships people organizations concepts biological organisms like bacteria entities represented within written material generation visualization co-occurrence networks become practical advent electronically stored text compliant text mining way definition co-occurrence networks collective interconnection terms based paired presence within specified unit text networks generated connecting pairs terms using set criteria defining co-occurrence example terms b may said “ co-occur ” appear particular article another article may contain terms b c. linking b b c creates co-occurrence network three terms rules define co-occurrence within text corpus set according desired criteria example stringent criteria co-occurrence may require pair terms appear sentence co-occurrence networks created given list terms dictionary relation collection texts text corpus co-occurring pairs terms called “ neighbors ” often group “ neighborhoods ” based interconnections individual terms may several neighbors neighborhoods may connect one another least one individual term may remain unconnected individual terms within context text mining symbolically represented text strings real world entity identified term normally several symbolic representations therefore useful consider terms represented one primary symbol several synonymous alternative symbols occurrence individual term established searching known symbolic representations term process augmented nlp natural language processing algorithms interrogate segments text possible alternatives word order spacing hyphenation nlp also used identify sentence structure categorize text strings according grammar example categorizing string text noun based preceding string text known article graphic representation co-occurrence networks allow visualized inferences drawn regarding relationships entities domain represented dictionary terms applied text corpus meaningful visualization normally requires simplifications network example networks may drawn number neighbors connecting term limited criteria limiting neighbors might based absolute number co-occurrences subtle criteria “ probability ” co-occurrence presence intervening descriptive term quantitative aspects underlying structure co-occurrence network might also informative overall number connections entities clustering entities representing sub-domains detecting synonyms etc working applications co-occurrence approach available public internet pubgene example application addresses interests biomedical community presenting networks based co-occurrence genetics related terms appear medline records website namebase example human relationships inferred examining networks constructed co-occurrence personal names newspapers texts ozgur et al. networks information also used facilitate efforts organize focus publicly available information law enforcement intelligence purposes called open source intelligence osint related techniques include co-citation networks well analysis hyperlink content structure internet analysis web sites connected terrorism
[ 5885, 5429, 5304 ]
Test
6,943
3
F-1_Spirit_(series):f-1 spirit series top formula one racing game developed published konami released msx japan europe 1987 game engine similar konami road fighter also features konami custom sound chip called konami scc five-channel chip compliments three-channel psg chip msx computer system words sound custom chip brings five voices three voices psg sound chip system great msx1 graphics go one first rom msx sound feature together 3d spinoff f-1 spirit 3d special f-1 spirit way formula-1 extended racing game konami released msx third-person racing game features many different types cars everything starts stock cars moving rally cars formula 3 main goal finish first place formula 1 king class racing six types races stock race rally f3 race f3000 race endurance race finally f1 races 16 tracks initially player race stock rally f3 races player win races accumulate points allow play new races player finish race first place receive nine points gets eight points finishes second etc player finish 10th later score points 16 different tracks f1 cars player wins races able play tracks f1 car category complete game win 16 f1 tracks grand total 21 tracks first races easiest ones cars slow enemies drive well player classify new tracks difficulty increase f1 cars insanely fast need great agility win f1 tracks even though look impossible control first practice master formula 1 cars win races enough always show skills multi player mode difficulty level set race track selected number laps variable field includes ready made custom made cars player select engine tires suspension avoiding slower cars player come lap crucial race bump cars side boards obstacles damage car every track pit lane labeled letters pit fuel repair car top speed decrease engine damaged make lose time every lap pit stop hold key speed car repairs fuel intake slower though fuel consumption determined rpm meter real cars car consumes fuel accelerate f1 tracks first race unless ace driver win f1 race try memorize curve play race several times know brake accelerate unlicensed sega master system port released zemina year f1 스피리트 similar game chequered flag released arcades 1988 special version original f-1 spirit a1 spirit way formula-1 released pack-in panasonic joy handle game controller chief differences features futuristic vehicles instead racing cars different passwords e.g panasonic see ending demo bugfixes full successor game released 1988 msx2+ spec unlike original game uses scaling-based third-person graphics like pole position like focuses specifically f-1 racing addition free run grand prix modes two player battle mode difficulty level set free run number settings number laps variable cars custom made body color car engine tires suspension brakes gear wings modified released three floppy disks game konami ever developed msx2+ spec game featured special cable allowed two msx2+ computers linked via second joystick port cable sold separately name je700 multiplayer link cable also reverse-engineered enthusiasts use games another thing makes game special uses msx-music fm-pac yamaha ym2413 opll sound chip originally sold separately built various models msx2+ msx turbor computers game konami used particular sound chip konami games enhanced music use konami scc sound chip even games distributed floppy disk often accompanied scc rom cartridge like snatcher sd snatcher original music composed goro kin supposedly pseudonym similar product f-1 sensation released family computer 1993 contains many features though battle mode dropped based around 1992 formula one season released north america world circuit series europe spirit f-1 released game boy 1991 top-viewed racing game like original players compete formula 3 formula 3000 formula 1 25 different tracks around world featured playable according class rise class tracks become longer forcing pit stops racers become faster turns change simple low angle corners require slight trajectory elbow corners require skill turn without losing speed later re-released first volume konami gb collection japan europe although renamed konami racing versions collection 2004 unlicensed remake original f-1 spirit released brain games chiefly 2004 retro remakes competition context developed successor team road fighter remake remake retains much gameplay content original changed physics number sound graphical improvements latter make game resemble titles f-1 grand prix online leaderboards ported windows mac os x linux even arm devices binary versions windows os x provided .deb provided ubuntu debian linux flavors oses general source code game available well
[ 7469, 7388, 3689, 4503, 2377, 7848, 578, 5471, 926 ]
Validation
6,944
4
Organisation-based_access_control:organisation-based access control computer security organization-based access control orbac access control model first presented 2003 current approaches access control rest three entities subject action object control access policy specifies subject permission realize action object orbac allows policy designer define security policy independently implementation chosen method fulfill goal introduction abstract level security policy defined organization thus specification security policy completely parameterized organization possible handle simultaneously several security policies associated different organizations model restricted permissions also includes possibility specify prohibitions obligations three abstract entities roles activities views abstract privileges defined abstract privileges concrete privileges derived orbac context sensitive policy could expressed dynamically furthermore orbac owns concepts hierarchy organization role activity view context separation constraints
[ 1249, 3884, 6162, 3461, 5725, 5074, 1805 ]
Test
6,945
3
IXP1200:ixp1200 ixp1200 network processor fabricated intel corporation processor originally digital equipment corporation dec project development since late 1996 parts dec digital semiconductor business acquired intel 1998 part out-of-court settlement end lawsuits company launched patent infringement processor transferred intel dec design team retained design completed intel samples processor available intel partners since 1999 general sample availability late 1999 processor introduced early 2000 166 200 mhz 232 mhz version introduced later processor later succeeded ixp2000 xscale-based family developed entirely intel processor intended replace general-purpose embedded microprocessors specialized application-specific integrated circuit asic combinations used network routers.the ixp1200 designed mid-range high-end routers high-end models processor could combined others increase capability performance router ixp1200 integrates strongarm sa-1100-derived core six microengines risc microprocessors instruction set optimized network packet workloads strongarm core performed non-real-time functions microengines manipulated network packets processor also integrates static random access memory sram synchronous dynamic random access memory sdram controllers pci interface ix bus interface ixp1200 contains 6.5 million transistors measures 126 mm fabricated 0.28 µm complementary metal–oxide–semiconductor cmos process three levels interconnect packaged 432-ball enhanced ball grid array ebga ixp1200 fabricated dec former hudson massachusetts plant
[ 496, 3262, 6014, 352, 1377, 7364, 6133, 4879, 742, 2332, 4840 ]
Test
6,946
7
Princh:princh princh danish software company founded 2014 developing cloud printing solutions company headquartered city aarhus denmark based idea sharing economy princh building global network printers via smartphone web app users locate printer nearby get directions go print pay print job solution available native mobile apps android ios well web desktop solutions businesses libraries app connects network printer owners users around world princh supports types printable files company founded 2014 first months headquarters located navitas building harbor aarhus early 2015 company signed investment deal private investor allowing princh move bigger offices expand team company currently based southern part aarhus princh printing service officially launched june 23 2015 present princh solution consists printers multitude locations print shops libraries hotels universities conference centers princh popular printing solution among libraries found denmark sweden germany norway princh app users able locate nearest printer denmark currently around 500 printing locations user printer user chooses document printed opens ios shares android princh point document uploaded princh cloud user selects desired nearby printer entering printer id number scanning qr-code located top printer pays credit card preferred payment option print job carried printer owners get access personal control panel set print prices monitor princh activity business installing princh free printer owners princh gets small fee per print job
[ 466 ]
Test
6,947
7
Distributed_object_middleware:distributed object middleware distributed object middleware dom type infrastructure allows remote access remote objects transparently based remote procedure call rpc mechanism dom systems also enable objects different platforms interact example corba examples dom systems include microsoft distributed component object model dcom enterprise javabeans ejb sun microsystems oracle corporation
[ 6989, 4938 ]
Test
6,948
7
Distributed_social_network:distributed social network distributed social network federated social network internet social networking service decentralized distributed across distinct providers something like email social networks fediverse consists multiple social websites users site communicate users involved sites societal perspective one may compare concept social media public utility social website participating distributed social network interoperable sites federation communication among social websites technically conducted social networking protocols software used distributed social networking generally portable easily adopted various website platforms distributed social networks contrast social network aggregation services used manage accounts activities across multiple discrete social networks social networking service providers used term broadly describe provider-specific services distributable across different websites typically added widgets plug-ins add-ons social network functionality implemented users websites distributed social network projects generally develop software protocols software generally free open source protocols generally open free open standards oauth authorization openid authentication ostatus federation activitypub federation protocol xrd metadata discovery portable contacts protocol wave federation protocol extensible messaging presence protocol xmpp aka jabber opensocial widget apis microformats like xfn hcard atom web feeds—increasingly referred together open stack—are often cited enabling technologies distributed social networking electronic frontier foundation eff u.s. legal defense organization advocacy group civil liberties internet endorses distributed social network model one plausibly return control choice hands internet user allow persons living restrictive regimes conduct activism social networking sites also choice services providers may better equipped protect security anonymity world wide web consortium w3c main international standards organization world wide web launched new social activity july 2014 develop standards social web application interoperability
[ 7148, 2087, 5149, 48, 7967, 375, 84, 3794, 87, 403 ]
Test
6,949
9
Daniel_G._Bobrow:daniel g. bobrow daniel gureasko bobrow 29 november 1935 – 20 march 2017 american computer scientist created oft-cited artificial intelligence program student earned phd. worked bbn technologies bbn research fellow intelligent systems laboratory palo alto research center born new york city earned bs rpi 1957 sm harvard 1958 phd mathematics mit supervision marvin minsky 1964 bbn developer tenex bobrow president american association artificial intelligence aaai chair cognitive science society editor-in-chief journal artificial intelligence shared 1992 acm software systems award work interlisp acm fellow aaai fellow
[ 7878, 1716, 1445, 897, 6796, 6888, 6087, 4588, 2734, 6981, 5734, 3188, 6352, 3788, 1557, 218, 1478, 5494, 4704, 3880, 4609, 6116, 3212, 5501, 6210, 1116, 144, 3895, 6471, 7481, 2144, 2600, 154, 7298, 5515, 8025, 5077, 7032, 4543, 1889, ...
Test
6,950
7
Chromebook:chromebook chromebook laptop tablet running linux-based chrome os operating system devices primarily used perform variety tasks using google chrome browser applications data residing cloud rather machine chromebooks released since late 2017 also run android apps chromebooks run linux apps first chromebooks sale acer inc. samsung began shipping june 15 2011 addition laptop models desktop version called chromebox introduced may 2012 all-in-one device called chromebase introduced january 2014 lg electronics october 2012 simon phipps writing infoworld said chromebook line probably successful linux desktop/laptop computer 've seen date january november 2013 1.76 million chromebooks sold us business-to-business channels march 2018 chromebooks made 60 computers purchased schools usa april 2017 electronic frontier foundation accused google using chromebooks collect data mine school children personal information including internet searches without parents consent two years eff filed federal complaint company first chromebooks sale acer inc. samsung announced google i/o conference may 2011 began shipping june 15 2011 lenovo hewlett packard google entered market early 2013 december 2013 samsung launched samsung chromebook specifically indian market employed company exynos 5 dual core processor critical reaction device initially skeptical reviewers new york times technology columnist david pogue unfavorably comparing value proposition chromebooks fully featured laptops running microsoft windows operating system complaint dissipated later reviews machines acer samsung priced lower february 2013 google announced began shipping chromebook pixel higher-spec machine high-end price tag january 2015 acer announced first big screen chromebook acer chromebook 15 fhd 15.6-inch display besides laptops devices run chrome os well desktop version called chromebox introduced may 2012 samsung chromebase all-in-one device introduced january 2014 lg electronics march 2018 acer google announced first chromebook tablet chromebook tab 10 device expected compete lower-priced apple ipad tablet education market tab 10 display—9.7-inch 2048 x 1536 resolution—was ipad device included stylus neither device included keyboard may 2016 google announced would make android apps available chromebooks via google play application distribution platform time google play access scheduled asus chromebook flip acer chromebook r 11 recent chromebook pixel chromebooks slated time partnering google samsung released chromebook plus chromebook pro early 2017 first chromebooks come play store pre-installed february 2017 review verge reported plus arm processor handled android apps much better intel-based pro said android apps chrome os still beta much unfinished experience number chrome os systems supporting android apps either stable beta channel increasing may 2018 google announced would make linux desktop apps available chromebooks via virtual machine code-named crostini initial hardware partners chromebook development included acer adobe asus freescale hewlett-packard later hp inc. lenovo qualcomm texas instruments toshiba intel samsung dell chromebooks ship google chrome os operating system uses linux kernel google chrome web-browser integrated media-player enabling developer mode allows installation linux distributions chromebooks crouton script allows installation linux distributions chrome os running operating systems simultaneously chromebooks include seabios turned install boot linux distributions directly limited offline capability fast boot-time chromebooks primarily designed use connected internet signed google account instead installing traditional applications word processing instant messaging users add web apps chrome web store google claims multi-layer security architecture eliminates need anti-virus software support many usb devices cameras mice external keyboards flash drives included utilizing feature similar plug-and-play operating systems like prototype cr-48 chromebooks specialized keyboard complete buttons opening controlling multiple browser-windows well web search button replaces caps lock key caps lock activated pressing alt+search analysis samsung series 5 components ifixit june 2011 estimated total cost 334.32 representing us 322.12 materials us 12.20 labor initial retail price us 499.99 also pays retail margins shipping marketing research development profit margins chromebooks quite thin requiring large production run make profit chromebooks designed used connected internet users able access google applications gmail google calendar google keep google drive offline mode chromebooks also come built-in local music-player photo editor pdf- microsoft office document-viewer functional without internet access apps offline support include amazon cloud reader new york times app angry birds google play video content available offline using extension chrome browser chromebooks except first three boot help coreboot fast-booting bios integration android chrome announced 2016 anticipated drive design form factor future chromebooks including expected first chrome os tablet first two commercially available chromebooks samsung series 5 acer ac700 unveiled may 11 2011 google i/o developer conference begin selling online channels including amazon best buy united states united kingdom france germany netherlands italy spain starting june 15 2011 however acer ac700 available early july first machines sold 349 499 depending model 3g option google also offered monthly payment scheme business education customers 28 20 per user per month respectively three-year contract including replacements upgrades verizon offers models equipped 3g/4g lte connectivity 100–200 mb free wireless data per month two years google early marketing efforts relied primarily hands-on experience giving away samsung machines 10 cr-48 pilot program participants along title chromebook guru lending chromebooks passengers virgin america flights end september 2011 google launched chrome zone store within store inside currys pc world superstore london store google-style look feel splashes color around retail store front concept later changed broader in-store google shop expanded beyond pc world tottenham court road addition marketing strategies google chrome created several chromebook minis demonstrate ease use simplicity devices comical manner example question back chromebook asked implied refer data backup instead shows two hands pushing chromebook back end table followed statement n't back chromebook showing data stored web article published zdnet june 2011 entitled five chromebook concerns businesses steven j. vaughan-nichols faulted devices lack virtual private network capability supporting wi-fi security methods particular wi-fi protected access ii wpa2 enterprise extensible authentication protocol-transport layer security eap-tls cisco lightweight extensible authentication protocol leap also noted file manager work need use undocumented crosh shell accomplish basic tasks setting secure shell ssh network connection well serious deficiencies documentation one first customer reviews city orlando florida reported initial testing 600 chromebooks part broader study related accessing virtual desktops early indications show potential value reducing support costs end users indicated chromebook easy travel starts quickly one stated need stay connected emergencies take chrome traveling business would still take laptop orlando plan continue use chromebooks november 21 2011 google announced price reductions chromebooks since wi-fi-only samsung series 5 reduced 349 3g samsung series 5 reduced 449 acer ac700 reduced 299 updated series 5 550 chromebox first chrome os desktop machines released samsung may 2012 two lowest cost chromebooks emerged later fall 249 samsung series 3 199 acer c7 following february google introduced costly machine chromebook pixel starting price 1299 models released may 2012 include 100 gb–1.09 tb google drive cloud storage 12 gogo wifi passes january 2013 acer chromebook sales driven heavy internet users educational institutions platform represented 5-10 percent company us shipments according acer president jim wong called numbers sustainable contrasting low windows 8 sales blamed slump market wong said company would consider marketing chromebooks developed countries well corporations noted although chrome os free license hardware vendors required greater marketing expenditure windows offsetting licensing savings first 11 months 2013 1.76 million chromebooks sold united states representing 21 us commercial business-to-business laptop market period 2012 chromebooks sold 400,000 units negligible market share january 2015 silviu stahie noted softpedia chromebooks eating microsoft market share said microsoft engaged silent war actually losing fighting enemy insidious cunning actually hurting company anything else enemy called chromebooks using linux ... sign things slowing microsoft really needs win soon wants remain relevant 2015 chromebooks sales volume companies us second windows based devices android tablets overtaking apple devices 2014 chromebook sales u.s. b2b channels increased 43 percent first half 2015 helping keep overall b2b pc tablet sales falling .. sales google os-equipped android chrome devices saw 29 percent increase 2014 propelled chromebook sales apple devices declined 12 percent windows devices fell 8 percent education market chromebooks notable success competing low cost hardware software upkeep simplicity machines could drawback markets proven advantage school districts reducing training maintenance costs january 2012 even commercial sales flat google placed nearly 27,000 chromebooks schools across 41 states us including one-on-one programs allocate computer every student south carolina illinois iowa august 2012 500 school districts united states europe using device 2016 chromebooks represented 58 percent 2.6 million mobile devices purchased u.s. schools 64 percent market outside u.s. contrast sales apple tablets laptops u.s. schools dropped year 19 percent compared 52 percent 2012 helping spur chromebook sales google classroom app designed teachers 2014 serves hub classroom activities including attendance classroom discussions homework communication students parents however concerns privacy within context education market chromebooks school officials schools issuing chromebooks students affirmed students right privacy using school-issued chromebooks even home online offline activity monitored school using third-party software pre-installed laptops electronic frontier foundation complained google violating privacy students enabling synchronisation function within google chrome chrome sync default allowing web browsing histories data students including under-13 stored google servers potentially used purposes authorised educational purposes point contention fact users school-issued chromebooks change settings measure protect privacy administrator issued laptops change eff claims violates student privacy pledge already signed google 2014 eff staff attorney nate cardozo stated minors n't tracked used guinea pigs data treated profit center google wants use students data 'improve google products needs get express consent parents march 2018 chromebooks made 60 computers used schools cnet writer alfred ng cited superior security main reason level market adoption hardware generation linux kernel version products inferred code name corresponding video game series december 7 2010 press briefing google announced chrome os pilot program pilot experiment first chromebook cr-48 chrome notebook prototype test chrome os operating system modified hardware device minimal design black completely unbranded although made inventec rubberized coating device named chromium-48 unstable isotope metallic element chromium participants named cr-48 test pilots google distributed 60,000 cr-48 chrome notebooks december 2010 march 2011 free participants return asked feedback suggestions bug reports cr-48 intended testing retail sales cr-48 hardware design broke convention replacing certain keys shortcut keys function keys replacing caps lock key dedicated search key changed back caps lock os keyboard settings google addressed complaints operating system offers little functionality host device connected internet demonstrated offline version google docs announced 3g plan would give users 100 mb free data month additional paid plans available verizon device usb port capable supporting keyboard mouse ethernet adapter usb storage printer chrome os offers print stack adding hardware outside previously mentioned items likely cause problems operating system self knowing security model users instead encouraged use secure service called google cloud print print legacy printers connected desktop computers connect hp eprint kodak hero kodak esp epson connect printer google cloud print service cloud aware printer connection cr-48 prototype laptop gave reviewers first opportunity evaluate chrome os running device ryan paul ars technica wrote machine met basic requirements web surfing gaming personal productivity falls short intensive tasks praised google approach security wondered whether mainstream computer users would accept operating system whose application browser thought chrome os could appeal niche audiences people need browser companies rely google apps web applications operating system decidedly full-fledged alternative general purpose computing environments currently ship netbooks paul wrote chrome os advantages found software environments without sacrifice native applications reviewing cr-48 december 29 2010 kurt bakke conceivably tech wrote chromebook become frequently used family appliance household 15 second startup time dedicated google user accounts made go-to device quick searches email well youtube facebook activities device replace five notebooks house one gaming two kids two general use biggest complaint heard lack performance flash applications ongoing testing wolfgang gruener also writing conceivably tech said cloud computing cellular data speeds unacceptable lack offline ability turns cr-48 useless brick connected difficult use chromebook everyday device give used mac/windows pc surely enjoy dedicated cloud computing capabilities occasionally cr-48 features intel atom 455 single-core processor 512 kb cache hyperthreading enabled also features 2 gb removable ddr3 memory single so-dimm integrated chipset graphics 66 watt-hour battery found intel nm10 chipset get hot operation due lack proper heatsink fixed production chromebooks launched google february 2013 chromebook pixel high-end machine chromebook family laptop unusual 3:2 display aspect ratio touch screen featuring debut highest pixel density laptop faster cpu predecessors intel core i5 exterior design described wired austere rectangular block aluminum subtly rounded edges second pixel featuring lte wireless communication twice storage capacity shipped arrival april 12 2013 machine received much media attention many reviewers questioning pixel value proposition compared similarly priced windows machines macbook air 2017 google launched pixelbook replace chromebook pixel like chromebook pixel pixelbook 3:2 aspect ratio touchscreen high pixel density display.. unlike original chromebook pixel like second generation pixelbook excludes option lte instead implements google instant tethering automatically tethers pixelbook pixel phone mobile connection reviewing samsung series 5 specifications scott stein cnet unimpressed machine 12-inch screen 16 gb onboard storage chrome os might lighter windows xp 'd still prefer media storage space price could also get wi-fi amd e-350-powered ultraportable running windows 7 hand mg siegler techcrunch wrote largely favorable review praising improvements speed trackpad sensitivity cr-48 prototype well long battery life fact models priced ipad june 2011 ifixit dismantled samsung series 5 concluded essentially improved cr-48 rated 6/10 repairability predominantly case opened change battery ram chip soldered motherboard ifixit noted mostly-plastic construction felt little cheap plus side stated screen easy remove components including solid-state drive would easy replace ifixit kyle wiens wrote series 5 fixes major shortfalls cr-48 adds polish necessary strike lust heart broad consumer base sleek looks 8+ hours battery life optimized performance may 2012 samsung introduced chromebook series 5 550 wi-fi model expensive 3g model reviews generally questioned value proposition dana wollman engadget wrote chromebook keyboard put thousand-dollar ultrabooks shame offered better display quality many laptops selling twice much price seems exist vacuum—a place tablet apps n't growing sophisticated transformer-like win8 tablets n't way n't solid budget windows machines choose joe wilcox betanews wrote price performance compares choices chromebook crumbles many potential buyers noted new models sell predecessors price-performance ratio quite favorable compared macbook air specs plenty lower-cost options october 2012 series 3 chromebook introduced san francisco event samsung chromebook xe303 device cheaper thinner lighter chromebook 550 google marketed series 3 computer everyone due simple operating system chrome os affordable price target markets included students first-time computer users well households looking extra computer lower price proved watershed reviewers new york times technology columnist david pogue reversed earlier thumbs-down verdict chromebook writing 250 changes everything price half ipad even less ipad mini ipod touch ’ getting laptop wrote chromebook many things people use computers laptops playing flash videos opening microsoft office documents words google correct asserts chromebook perfect schools second computers homes businesses deploy hundreds machines cnet review series 3 chromebook even favorable saying machine largely delivered computer students additional computer household—especially users already using google web applications like google docs google drive gmail got workable standout hardware battery life good switches quickly 249 price tag means much commitment 550 samsung series 5 550 arrived may review subtracted points performance fine many tasks power users accustomed couple dozen browser tabs open steer clear chromebook 3 distinct distinguished similarly named samsung series 3 several respects newer released 2016 different architecture intel celeron n3050 instead exynos 5 dual arm cortex thinner 0.7 less expensive 100 less series 3 remaining full implementation chromeos hp first chromebook largest chromebook market time pavilion 14 chromebook launched february 3 2013 intel celeron 847 cpu either 2gb 4gb ram battery life long 4 hours larger form factor made friendly all-day use hp introduced chromebook 11 october 8 2013 us december 2013 google hp recalled 145,000 chargers due overheating sales halted resuming redesigned charger following month hp chromebook 14 announced september 11 2013 intel haswell celeron processor usb 3.0 ports 4g broadband updated version chromebook lineup announced september 3 2014 11-inch models included intel processor 14-inch models featured fanless design powered nvidia tegra k1 processor hp chromebooks available several colors two types desktop computers also run chrome os classed small form-factor pcs chromeboxes typically feature power switch set ports local area network usb dvi-d displayport audio chromebooks chromeboxes employ solid-state memory support web applications require external monitor keyboard pointing device chromebase all-in-one chrome os device first model released lg electronics integrated screen speakers 1.3-megapixel webcam microphone suggested retail price 350 company unveiled product january 2014 international ces las vegas chromebit dongle running google chrome os operating system placed hdmi port television monitor device turns display personal computer chromebit allows adding keyboard mouse bluetooth via usb port
[ 2902, 3942, 5372, 6427, 7528, 5740, 2569, 1864, 3309, 7924, 2591, 2954, 5775, 2961, 4014, 6153, 2977, 6874, 5455, 4759, 5461, 4762, 7967, 5472, 6176, 5476, 831, 5141, 136, 2317, 2673, 7285, 2683, 855, 6937, 1227, 1977, 168, 2703, 5534, ...
Test
6,951
4
Uncomplicated_Firewall:uncomplicated firewall uncomplicated firewall ufw program managing netfilter firewall designed easy use uses command-line interface consisting small number simple commands uses iptables configuration ufw available default ubuntu installations 8.04 lts gufw intended easy intuitive graphical user interface managing uncomplicated firewall supports common tasks allowing blocking pre-configured common p2p individual ports gufw designed ubuntu also available debian-based distributions arch linux anywhere python gtk+ ufw available
[ 1809, 385, 7536, 6107, 3637, 6456, 2585, 6149, 2260, 84, 7597, 4759, 806, 2296, 2297, 7275, 3394, 6560, 7289, 3738, 4091, 5523, 7683, 6235, 875, 6962, 1249, 5912, 4492, 3780, 7351, 4138, 2746, 5571, 578, 8100, 7744, 1291, 4165, 3484, 27...
Test
6,952
6
Root_directory:root directory computer file system primarily used unix unix-like operating systems root directory first top-most directory hierarchy likened trunk tree starting point branches originate root file system file system contained disk partition root directory located filesystem top file systems mounted system boots use example physical file cabinet separate drawers file cabinet represented highest level sub-directories file system system prompt room file cabinet may represented root directory directories may inside root directory go directories least file system operating systems files placed inside root directory well sub-directories one may envision placing paper files anywhere room file cabinet within room unix abstracts nature tree hierarchy entirely unix unix-like systems root directory denoted codice_1 slash sign though root directory conventionally referred codice_1 directory entry name name empty part initial directory separator character codice_1 filesystem entries including mounted filesystems branches root dos os/2 microsoft windows partition drive letter assignment labeled codice_4 particular partition c common root directory dos os/2 windows support abstract hierarchies partitions mountable within directory another drive though rarely seen possible dos command codice_5 since first added dos achieved windows versions well contexts also possible refer root directory containing mounted drives although contain files directly exist file system instance linking local file using file uri scheme syntax form codice_6 codice_7 standard prefix third 'codice_1 represents root local system unix-like operating systems process idea root directory processes system actual root directory changed calling chroot system call typically done create secluded environment run software requires legacy libraries sometimes simplify software installation debugging chroot meant used enhanced security processes inside break freebsd offers stronger jail system call enables operating-system-level virtualization also serves security purposes restrict files process may access subset file system hierarchy unix systems support directory root directory normally /.. points back inode however changed point super-root directory remote trees mounted example two workstations pcs2a pcs2b connected via connectnodes uunite startup script /../pcs2b could used access root directory pcs2b pcs2a
[ 1710, 5805, 4759, 1534, 3612, 7246, 4307, 2104, 8180, 4229, 7075, 5571, 8092, 6360, 7267, 3463, 6024, 6117, 3033, 7021, 2338, 6051, 7035, 7304, 5783, 7498, 4641, 5784, 2528, 1992 ]
Test
6,953
2
Linux/RK:linux/rk linux/rk implementation resource kernel based linux developed real-time multimedia systems laboratory carnegie mellon university linux/rk consists two major components linux kernel subsystem called portable resource kernel resource kernel provides timely guaranteed enforced access physical resources applications main function operating system kernel multiplex available system resources across multiple requests several applications traditional non-realtime kernel allocates time-multiplexed resource application based fairness metrics certain period resource kernel application request reservation certain amount resource kernel guarantee requested amount available application guarantee resource allocation gives application knowledge amount currently available resources qos manager application optimize system behavior computing best qos obtained available resources
[ 578 ]
Test
6,954
7
Elastic_cloud_storage:elastic cloud storage elastic cloud cloud computing offering provides variable service levels based changing needs elasticity attribute applied cloud services states capacity performance given cloud service expand contract according customer requirements potentially changed automatically consequence software-driven event worst reconfigured quickly customer infrastructure management team elasticity described one five main principles cloud computing rosenburg mateos cloud service manning 2011 cloud computing first described gillet kapor 1996 however first practical implementation consequence strategy leverage amazon excess data center capacity amazon pioneers commercial use technology primarily interested providing “ public ” cloud service whereby could offer customers benefits using cloud particularly utility-based pricing model benefit suppliers followed suit range cloud-based models offering elasticity core component suppliers offering service element public cloud service due perceived weaknesses security least lack proven compliance many organizations particularly financial public sectors slow adopters cloud technologies wary organizations achieve benefits cloud computing adopting private cloud technologies obvious weaknesses two five main principles cloud computing abrogated elasticity utility-based payments alternative form elastic cloud offered vendors emc ibm whereby service based around enterprise infrastructure still retains elements elasticity potential bill consumption elasticity cloud computing ability organization adjust storage requirements terms capacity processing respect operational requirements following benefits operational benefits services acquired quickly meaning evolving requirements business addressed almost immediately giving organization potential agility advantage properly implemented elastic system provision/de-provision according application demands particular business activity spikes provision enabled match demand capacity re-allocated research development r projects r activities longer hindered requirement secure capex budget prior project starting capability simply provisioned cloud released end exercise testing deployment large-scale projects size test needs performed prior final rollout taking advantage elasticity cloud creating full-scale avatar proposed production system realistic data traffic volumes provisioned released needed expensive resources allocated normally apply context customer applying least servers part cloud infrastructure specifically business performance reasons decided invest solid-state storage opposed spinning platters instances due activity spikes less critical process may need moved high-performance resources traditional storage server specification customer elected own/lease hardware select specify servers specifically tuned meet likely needs operation i.e. directly controlling cost/benefit equation utility based payments course key cost driver process notion pay consume acceptable many organizations hardware capacity sourced internally organizations need over-provision applies much traditional outsourcing capex-related expenditure in-house servers cloud platform – heart cloud storage system ability manage hyperscale object storage hadoop distributed files system hdfs elastic storage capability particularly well suited hyperscale hadoop environments capability rapidly respond changing circumstances priorities essential
[ 2961, 3958, 4295, 2700, 5064 ]
Test
6,955
9
Seymour_Papert:seymour papert seymour aubrey papert february 29 1928 – july 31 2016 south african-born american mathematician computer scientist educator spent career teaching researching mit one pioneers artificial intelligence constructionist movement education co-inventor wally feurzeig cynthia solomon logo programming language born jewish family papert attended university witwatersrand receiving bachelor arts degree philosophy 1949 followed phd mathematics 1952 went receive second doctorate also mathematics university cambridge 1959 supervised frank smithies papert worked researcher variety places including st. john college cambridge henri poincaré institute university paris university geneva national physical laboratory london becoming research associate mit 1963 held position 1967 became professor applied math made co-director mit artificial intelligence laboratory founding director professor marvin minsky 1981 also served cecil ida green professor education mit 1974 1981 papert worked learning theories known focusing impact new technologies learning general schools learning organizations particular mit papert went create epistemology learning research group mit architecture machine group later became mit media lab developer theory learning called constructionism built upon work jean piaget constructivist learning theories papert worked piaget university geneva 1958 1963 one piaget protégés piaget said one understands ideas well papert papert rethought schools work based theories learning papert used piaget work development logo programming language mit created logo tool improve way children think solve problems small mobile robot called logo turtle developed children shown use solve simple problems environment play main purpose logo foundation research group strengthen ability learn knowledge papert insisted simple language program children learn—like logo—can also advanced functionality expert users part work technology papert proponent knowledge machine one principals one laptop per child initiative manufacture distribute children machine developing nations papert also collaborated construction toy manufacturer lego logo-programmable lego mindstorms robotics kits named groundbreaking 1980 book became political activist opposition parents began anti-apartheid activity says father said know someone talented seymour would throw life away ‘ schwartzes ’ derogatory yiddish expression black people ” subsequently chose self exile leading figure revolutionary socialist circle around socialist review living london 1950s papert also prominent activist south african apartheid policies university education papert married dona strauss later androula christofides henriques papert third wife mit professor sherry turkle together wrote influential paper epistemological pluralism revaluation concrete final 24 years papert married suzanne massie russian scholar author pavlovsk life russian palace land firebird papert aged 78 received serious brain injury struck motor scooter 5 december 2006 crossing street colleague uri wilensky attending 17th international commission mathematical instruction icmi study conference hanoi vietnam underwent emergency surgery remove blood clot french hospital hanoi transferred complex operation swiss air ambulance bombardier challenger jet boston massachusetts moved hospital closer home january 2007 developed sepsis damaged heart valve later replaced 2008 returned home could think communicate clearly walk almost unaided still complicated speech problems receipt extensive rehabilitation support rehabilitation team used principles experiential hands-on learning pioneered papert died home blue hill maine july 31 2016 papert work used researchers fields education computer science influenced work uri wilensky design netlogo collaborated study knowledge restructurations well work andrea disessa development dynaturtles 1981 papert along several others logo group mit started logo computer systems inc. lcsi board chair 20 years working lcsi papert designed number award-winning programs including logowriter lego/logo marketed lego mindstorms also influenced research idit harel caperton coauthoring articles book constructionism chairing advisory board company mamamedia also influenced alan kay dynabook concept worked kay various projects papert guggenheim fellowship 1980 marconi international fellowship 1981 software publishers association lifetime achievement award 1994 smithsonian award computerworld 1997 papert called marvin minsky greatest living mathematics educator mit president l. rafael reif summarized papert lifetime accomplishments mind extraordinary range creativity seymour papert helped revolutionize least three fields study children make sense world development artificial intelligence rich intersection technology learning stamp left mit profound today mit continues expand reach deepen work digital learning particularly grateful seymour groundbreaking vision hope build ideas open doors learners ages around world
[ 7878, 1445, 897, 6796, 6888, 6087, 4588, 2734, 6981, 5734, 3188, 6352, 1557, 218, 1478, 5494, 2405, 4704, 3880, 4609, 6116, 3212, 5501, 45, 6210, 144, 1116, 6471, 7481, 2144, 2600, 154, 7298, 5515, 8025, 5077, 3910, 4543, 7032, 1889, 21...
Validation
6,956
3
Visual_Instruction_Set:visual instruction set visual instruction set vis simd instruction set extension sparc v9 microprocessors developed sun microsystems five versions vis vis 1 vis 2 vis 2+ vis 3 vis 4 vis 1 introduced 1994 first implemented sun ultrasparc microprocessor 1995 fujitsu sparc64 gp microprocessors 2000 vis 2 first implemented ultrasparc iii subsequent ultrasparc sparc64 microprocessors implement instruction set vis 3 first implemented sparc t4 microprocessor vis 4 first implemented sparc m7 microprocessor vis instruction toolkit like intel mmx sse mmx 8 registers shared fpu stack sparc processors 32 registers also aliased double-precision 64-bit floating point registers simd instruction set extensions risc processors vis strictly conforms main principle risc keep instruction set concise efficient design different comparable extensions cisc processors mmx sse sse2 sse3 sse4 3dnow sometimes programmers must use several vis instructions accomplish operation done one mmx sse instruction kept mind fewer instructions automatically result better performance vis re-uses existing sparc v9 64-bit floating point registers hold multiple 8 16 32-bit integer values respect vis similar design mmx simd architectures sse/sse2/altivec vis includes number operations primarily graphics support integers include 3d 2d conversion edge processing pixel distance four ways use vis code
[ 2000, 1252, 3173, 4845, 2989, 2992, 4224, 6523, 6616, 3098, 1465, 3294, 5665, 5934, 742, 5669, 5670, 584, 5055, 6647, 2226, 1867, 1770, 4077, 6563, 6133, 1881, 2433, 5431, 3747, 6675, 6236, 352, 8145, 971, 3248 ]
Test
6,957
2
Support_programs_for_OS/360_and_successors:support programs os/360 successors article discusses support programs included available os/360 successors ibm categorizes programs utilities others service aids boundaries always consistent obvious many programs match types utility software following lists describe programs associated os/360 successors dos tpf vm utilities included many programs designed ibm users group share modified extended ibm versions originally written user programs usually invoked via job control language jcl tend use common jcl dd identifiers os z/os operating systems data sets idcams access method services generates modifies virtual storage access method vsam non-vsam datasets idcams introduced along vsam os/vs access method reference derives initial vsam replaces access methods mindset os/vs idcams probably functionality utility programs performing many functions vsam non-vsam files following example illustrates use idcams copy dataset disk dataset 80-byte records system choose block size output example sysin control cards coming in-stream file instead point sequential file pds member containing control cards temporary data-set wish example using sysin files would something like iebcompr compares records sequential partitioned data sets iebcompr utility used compare two sequential partitioned datasets data set comparison performed logical record level therefore iebcompr commonly used verify backup copy data set correct exact match original processing iebcompr compares record data set one one records unequal iebcompr lists following information sysout comparing sequential data sets iebcompr considers data sets equal following conditions met partitioned data sets iebcompr considers data sets equal following conditions met ten unequal comparisons encountered processing iecompr terminates appropriate message note iebcompr flexible user-friendly compare program ca n't restrict comparison certain columns ca n't ignore differences white space n't tell record difference occurs halts 10 differences hand fast present ibm mainframes useful exact match expected comparing load modules reblocked checking copy worked properly comparisons programs reports ispf superc isrsupc compare program often used instead iebcopy copies compresses merges partitioned data sets also select exclude specified members copy operation rename replace members tasks iebcopy perform include following iebcopy utility required job control statements copy follows mydd1 mydd2 dd statements names chosen user partitioned input output data sets respectively defaults sysut1 sysut2 use valid ddname two dd statements ddnames specified utility control statements tell iebcopy name input output data sets need one dd statement pds compressed iebdg 'data generator creates test datasets consisting patterned data control statements define fields records created including position length format initialization performed iebdg use existing dataset input change fields specified control statements example replacing name field random alphabetic text contents field may varied record example rotating characters alphanumeric field left right subsequent record example iebedit selectively copies portions jcl example iebedit program example data set xxxxx.yyyyy.zzzzz contain job include steps named step5 step10 step15 iebedit routine copies selected steps job onto sysut2 output file example internal reader syntax edit statement codice_1 specifies name input job edit statement applies edit statement must apply separate job start specified without type stepname job statement job steps specified job included output default start omitted one edit statement provided first job encountered input data set processed start omitted edit statement first statement processing continues next job statement found input data set codice_2 specifies contents output data set values coded codice_3 specifies output consist job statement job step specified stepname parameter steps follow job step job steps preceding specified step omitted operation position default codice_4 specifies output data set contain job statement job steps specified stepname parameter codice_5 specifies output data set contain job statement job steps belonging job except steps specified stepname parameter codice_6 specifies names job steps want process codice_7 single job step name list step names separated commas sequential range steps separated hyphen example stepa-stepe combination may used one namelist one step name specified entire namelist must enclosed parentheses coded type=position stepname specifies first job step placed output data set job steps preceding step copied output data set coded type=include type=exclude stepname specifies names job steps included excluded operation example stepname= stepa stepf-stepl stepz indicates job steps stepa stepf stepl stepz included excluded operation stepname omitted entire input job whose name specified edit statement copied job name specified first job encountered processed codice_8 specifies message data set include listing output data set default resultant output listed message data set see info iebgener copies records sequential dataset creates partitioned dataset tasks iebgener perform include following example iebgener program copy one dataset another straight copy tasks sort program often faster iebgener thus many mainframe shops make use option automatically routes tasks sort icegener program instead iebgener systems possible send email batch job directing output codice_9 external writer systems technique follows also possible attach files sending email mainframe iebimage manipulates several types definitions aka images ibm 3800 laser printing subsystem ibm 4248 printer common uses forms control buffers fcbs character arrangement tables character definitions images forms printed output along text company logos printed page print 'graybar pages alternating gray white horizontal backgrounds match previous greenbar paper utility many different forms logos could stored images printed needed using standard blank paper thus eliminating need stock many preprinted forms need operators stop printer change paper iebisam unloads loads copies prints isam datasets extracted ibm manual sc26-7414-08 z/os dfsmsdfp utilities iebisam program longer distributed starting z/os v1r7 isam data sets longer processed created opened copied dumped isam data sets still use must converted vsam key-sequenced data sets prior z/os v1r7 could use access method services allocate vsam key-sequenced data set copy isam data set iebptpch print punch prints punches records sequential partitioned dataset tasks iebptpch perform include following empty dataset check dataset checked empty rc=4 else 0 read records 2495 tape cartridge reader changes records sequential dataset member partitioned dataset replaced compatible iebupdte iebupdte update incorporates changes sequential partitioned datasets unix codice_10 utility similar program uses different input format markers e..g insert ... mvs becomes ... unix patch programmers pronounce i.e.b up-ditty iebupdte utility used maintain source libraries functions iebupdte perform include following iebupdte commonly used distribute source libraries tape dasd iebupdte uses job control statements required ieb-type utilities exceptions follow job control used ieupdte follows iefbr14 dummy program normally inserted jcl desired action allocation deletion datasets example iefbr14 step calling sequence os/360 contained return address register 14 branch register 14 would thus immediately exit program however executing program operating system would allocate deallocate datasets specified dd statements commonly used quick way set remove datasets consisted initially single instruction branch register 14 mnemonic used ibm assembler br hence name ief br 14 ief course prefix os/360 job management subsystem single instruction program error — n't set return code hence second instruction added clear return code would exit correct status additional error reported fixed ibm two instruction program error due iefbr14 program link-edited reenterable simultaneously usable one caller hackers taken iefbr14 changed br 14 instruction br 15 thereby creating shortest loop world register 15 contains address iefbr14 module br 15 instruction would simply re-invoke module forever utilities normally used systems programmers maintaining operation system rather programmers application work system ickdsf device support facility installs initializes maintains dasd either operating system standalone assign alternate tracks defective tracks iehdasdr “ direct access storage dump restore ” older program found current z/os manuals dumps datasets disk printer backup restores backups iehdasdr removed mvs/xa iehinitt initialize tape initializes tapes writing tape labels multiple tapes may labeled one run utility ibm standard ascii labels may written example iehinitt program example label 3 tapes 3490 magnetic tape unit tape receive ibm standard label volser incremented one tape labeled tape rewound unloaded labeled update ttr links type iv supervisor call svc routines sys1.svclib applicable os/vs2 later iehlist utility used list entries partitioned dataset pds directory list contents volume table contents vtoc iehlist utility used list entries contained one following example iehlist program job produce formatted listing pds directory pds named xxxx.yyyy.zzzz example iehlist program list vtoc similar iehmove moves copies collections data however dfsms system managed storage environments common ibm recommend using iehmove utility move differs copy following move original data set deleted scratched tasks iehmove perform include following surface iehmove may seen redundant iebgener iebcopy utilities however iehmove powerful main advantage using iehmove need specify space dcb information new data sets iehmove allocates information based existing data sets another advantage iehmove copy move groups data sets well entire volumes data ease moving groups data sets volumes iehmove utility generally favored systems programmers sample iehmove job dd statements iehmove sysprint sysin refer dasd magnetic tape volumes instead individual data sets however referencing volumes pose problem since specifying codice_11 gains exclusive access volume therefore iehmove job runs entire volume datasets unavailable users acceptable private volumes tape mountable dasd volumes unacceptable public volumes sysut1 dd statement specifies dasd volume three work data set required iehmove allocated must specify unit volume information dd statement iehmove one first systems developed pl/s example three sequential data sets seqset1 seqset2 seqset3 moved one disk volume three separate disk volumes three receiving volumes mounted required iehmove source data sets cataloged space allocated iehmove iehprogm builds maintains system control data also used renaming scratching deleting data set tasks iehprogm perform include following cataloging select format smf records tape errors programs run control operating system format direct access volumes assign alternate tracks dump restore direct access volumes assign alternate tracks recover replace data load forms control buffer fcb universal character set ucs buffer printer utility program ibm documents service aids diagnosis manuals original os/360 service aids names beginning ifc im* ibm changed naming convention hm* os/vs1 am* os/vs2 ibm change ifc convention initializes sys1.logrec data set summarizes prints records sys1.logrec error recording data set traces selected system events svc i/o interruptions generates jcl needed apply ptf and/or applies ptf functions program subsumed smp verifies and/or replaces instructions and/or data load module program object formats prints object modules load modules program objects csect identification records maps load modules functions program subsumed imblist stand-alone program format print system job queue applicable mvs format print system job queue applicable mvs formats prints dumps tso swap data set gtf trace data stand-alone program produce high-speed low-speed dump main storage sort/merge utility program sorts records file specified order merge pre-sorted files frequently used often commonly used application program mainframe shop modern sort/merge programs also select omit certain records summarize records remove duplicates reformat records produce simple reports sort/merge important enough multiple companies selling sort/merge package ibm mainframes ibm original os/360 sort/merge program 360s-sm-023 program name ierrco00 alias sort supported ibm first-generation direct-access storage devices dasd tapes 2400 support second-generation disk drives provided ibm program products 5734-sm1 later 5740-sm1 dfsort alias iceman also sort sort frequently executed stand-alone program normally reads input file identified dd codice_12 writes sorted output file identified dd codice_13 also often called another application via cobol codice_14 verb calls pl/i codice_15 routines may use either codice_12 codice_13 files passed records sorted caller and/or pass sorted records back caller one time operation sort directed control statements largely compatible among various ibm third-party sort programs codice_14 codice_19 statement defines sort keys — fields data sorted merged statement identifies position length data type key codice_20 statement describes format length records input file statements allow user specify records included excluded sort specify transformations performed data keys combination ebcdic ascii character data zoned packed-decimal signed unsigned fixed-point binary hexadecimal floating-point keys located anywhere record contiguous sorting specified combination ascending descending sequence key os/360 sort program ierrco00 operates dividing input data sections sorting section main memory writing sorted section intermediate datasets either direct-access storage devices dasd magnetic tape final merge phases merge sections produce sorted output sort uses one number techniques distributing sections among secondary storage devices usually sort choose optimal technique overridden user sort three techniques used intermediate storage tape two disk tape techniques disk techniques os/360 linkage editor available several configurations dfsmsdfp added binder alternatives load modules option program objects linkage editor creates replaces load modules partitioned data set combination control cards object modules load modules rename replace control section csect perform several miscellaneous functions originally available several configurations depending storage requirement e level linkage editor longer available f level linkage editor known simply linkage editor z/os linkage editor present compatibility binder performs functions linkage editor addition supports new format program object functional equivalent load module partitioned data set extended pdse many additional capabilities programming language used computer shop one associated compilers translate source program machine-language object module object module compiler must processed linkage editor iewl create executable load module igycrctl common example compiler compiler current ibm enterprise cobol z/os product several previous ibm cobol compilers years different names many compilers various programming languages assembler e intended os/360 running small machines assembler f intended normal os/360 installations assembler xf system assembler os/vs1 os/vs2 replacing assembler e f although fully compatible ibm soon made assembler xf system assembler dos vm well assembler h assembler h version 2 program product assemblers generally faster assemblers e f xf although fully compatible ibm high level assembler hlasm essentially new version assembler h version 2 assembler ibm supports z/os z/vm replaces older assemblers although fully compatible system modification program smp vehicle installing service os/360 successors replacing e.g. stand-alone assembly link edit imaptfle jobs originally optional facility mandatory mvs/sp later program product version smp/e included recent systems e.g. z/os
[ 7605, 3, 630, 5726, 1361, 6094, 3278, 5041, 5932, 839, 4428, 5502, 5852, 5764, 336, 607, 4544, 6856, 2438 ]
Train
6,958
2
Developer_Certificate_of_Origin:developer certificate origin developer certificate origin dco introduced 2004 linux foundation enhance submission process software used linux kernel shortly sco–linux disputes dcos often used alternative contributor license agreement cla instead signed legal contract dco affirmation source code submitted originated developer developer permission submit code proponents dco content reduces barriers entry introduced cla
[ 578 ]
Validation
6,959
5
ARP_cache:arp cache arp cache collection address resolution protocol entries mostly dynamic created ip address resolved mac address computer effectively communicate ip address arp cache disadvantage potentially used hackers cyber attackers arp cache helps attackers hide behind fake ip address beyond fact arp caches may help attackers may also prevent attacks distinguish ing low level ip ip based vulnerabilities
[ 3797 ]
Validation
6,960
9
ModernPascal:modernpascal modern pascal closed source cross-platform interpreter compiler runtime environment command line server-side networking applications modern pascal applications written pascal/object pascal run within modern pascal runtime microsoft windows linux os x freebsd solaris dos/32 operating systems work hosted supported 3f llc partner mp solutions llc modern pascal provides blocking i/o api technology commonly used operating system applications modern pascal coderunner contains built-in library allow applications act web server without software apache http server iis modern pascal invented 2000 ozz nixon also co-developing dxjavascript alexander baronovski ozz inspired kylix project 1999 met borland pascal team shared programming language modern pascal ozz ported commercial socket suite dxsock kylix started developing modern pascal run pascal scripts microsoft windows linux os x 2002 version 1.1 released modern pascal v1.1 capable running turbo pascal dos syntax last version using variants internally variable code instances version 1.1 introduced support built-in rtl units allowing developers extend language grammar support crt/display tcp/ip socket calls 2005 version 1.2 released modern pascal v1.2 available 64bit platforms native 64bit binaries internal support 64bit numbers memory addresses 2007 version 1.3 released modern pascal v1.3 added cross-platform support dynamic libraries .so .dylib .dll first version capable developing native windows gui applications along linux qt gui applications supporting external libraries language longer limited command line web server script engine role 2008 version 1.4 released modern pascal v1.4 fork internally called declan decisioning language use credit financial industry version 1.4 also introduced tdataset compatibility borland delphi compiler along ability connect databases via built-in odbc support allows modern pascal leverage almost sql database engines command line web solutions 2009 version 1.5 released modern pascal v1.5 redesign parser phase lexicon first version modern pascal started incorporate syntax popular languages like += -= *- /= c/javascript version 1.5 available native apache module windows linux os x 2010 version 1.6 released modern pascal v1.6 incorporates built-in rtl units ciphers compressions hashs version truly focused migrating applications web needed built support common ciphers hashes compression algorithms used restful applications 2011 version 1.7 released modern pascal v1.7 redesign apache module release forward modern pascal longer built apache module modern pascal celerity introduced inspired design coldfusion ntier back end web servers means future release fastcgi isapi even old cgi nsapi interfaces could deployed version 1.7 also introduced old pascal 3.0 feature called chaining slightly modern style 2013 version 1.8 released modern pascal v1.8 introduced support delphi-like classes smart records unions self instantiation version 1.8 first version modern pascal started truly become pascal dialect 2014 version 1.9 built released public modern pascal v1.9 used develop developip large scale public web site 2015 version 2.0 begun modern pascal 2.0 fork lape previous versions fast efficient fast enough larger customers current benchmarks show v2.0 processing 100 million instructions second roughly 8 times faster version 1.9 much faster alternative pascal script engines july 2015 modern pascal 2.0 enters final private beta cycle team actively porting code snippets old applications 2.0 publishing code github 2017 version 2.0 released public includes native dbase iii+ iv v vii clipper foxpro support past 24 months development 3f ported github source 17 bbses including quickbbs tpboard hermes binkp fidonet protocol multiple tossers adventure game studio 1984 custom micro solutions inc. accounting point sale software web ria applications 3f also introduced transparent support extended ascii ansi utf8 graphics modern pascal command line interface allows create run dos like applications using pascal decades free pascal source code implement run wide range business classes command utilities modern pascal celerity allows create similar solutions stand-alone middleware backend engine combined apache module celerity used create wide range web script solutions modern pascal coderunner allows create standalone networking tools including web servers email servers chat servers coderunner manages tcp communications code even tls/ssl developer simply focus happens connection established program game.loot.example uses math const maxprobability=1000 type function looter.choose loottype var begin end function looter.asstring l loottype string begin end procedure looter.free begin end // must listed implementation // procedure looter.init begin end var begin end output replaced original code sample something easier read/follow run turbo pascal syntax hello world program modernpascal coded normal pascal hello world program helloworld begin end modernpascal also supports brief pascal execute statements without formality writeln 'hello world pascal speak reusable collection methods referred unit languages often call modules libraries modern pascal built-in units handle display environment calls like file system i/o sockets networking tcp binary data buffers classes objects cryptography functions data streams regular expression collections logging configuration files using ini csv sdf similar csv formats databases odbc built-in dbase clipper foxpro core functions modern pascal operates without requiring third-party libraries modern pascal optionally require openssl achieve tls/ssl listeners clients modern pascal operates using single thread model using blocking i/o calls celerity coderunner self-threading engines allowing modern pascal support tens thousands concurrent connections design single thread instance code means used build highly reliable applications design goal modern pascal application skill level programmer able operate without fear memory leak variable collision threads etc approach allows scaling number cpu cores machine running negative approach increase thread switching contexts however modern pascal tested base dell laptop handling 50,000 concurrent connections/scripts
[ 1361, 3623, 3915, 4759, 5948, 5571, 7637, 6778, 2420, 7848, 578, 3135, 3955 ]
Train
6,961
8
Masterseek:masterseek masterseek corp. b2b business-to-business search engine founded denmark 1999 masterseek encompasses 175 million business profiles 346 million websites 450 million contacts 216 million linkedin members thus making masterseek largest commercial database world masterseek founded denmark rasmus refer 1999 denmark headquarters located bredgade 29 dk-1260 kbh k also current headquarters new york city 82 wall street according executives masterseek utilizes business model based annual business subscription fee usd 149 return subscribers receive full editing control corporate profile content advertising control widgets embedded video among factors june 2008 accountancy firm horwart international approximated raw market value masterseek company 150 million company remains privately owned also june 2008 sold 10 authorized stocks range foreign investors company announced january 31 2009 company offering limited number shares sale order raise 4–6 million order gain listing swedish marketplace aktietorget founder refer also announced plans ipo october 2009 signed swedish-based company thenberg kinde fondkommission ab financing july 11 2016 masterseek announced company planning getting listed nasdaq listing nasdaq provide capital expansion rapidly growing markets latin america africa asia doney law firm assisting listing nasdaq capital market june 2008 company stated 50 million company profiles 75 countries handled 90,000 b2b searches daily company stated 82 million profiles march 21 2011 average 300,000 new profiles added monthly 2017 company stated 178 million company profiles october 30 2008 announced masterseek acquired b2b search engine accoona search engine fairly successful united states china exclusive partnership china daily august 3 2006 time dubbed accoona one 50 best websites illustrating search engine used artificial intelligence understand meaning keyword queries accoona run difficulties gone defunct early october 2008 withdrawing ipo making possible masterseek acquire data technology masterseek bought remaining search engine codes domain name assets accoona integrated masterseek re-launched usa china launched europe january 2009 accoona information also integrated masterseek search engine masterseek search engine relies web crawlers automatically collect sort company details internet searches look company profiles contact information descriptions products services searches global national regional involved local markets hits listed relevance according search terms different search options including specific product search company searches people searches results displayed languages search engine also offers masterrank point system ranking corporate websites july 5 2007 masterseek announced cosponsors team csc denmark cycling team beginning team involvement tour de france masterseek name began displayed team apparel week tour start london global investor alerts issued public warning alerting masterseek corp. cold-calling potential customers offering unauthorised illegal financial services also multiple reports masterseek engine crawling profiles individuals illegally violating privacy fair use policies services like linkedin create publicly publish profiles individuals without consent providing control editing profiles owners profiles thus violating civil criminal laws multiple jurisdictions around world
[]
Train
6,962
4
Norton_360:norton 360 norton 360 developed symantec “ all-in-one ” security suite combined online protection performance tuning thing distinguished suite norton internet security inclusion optimization problem-solving tools norton 360 distributed boxed copy download preinstalled computers oem software norton 360 discontinued cut overhauled norton line mid-2014 features carried successor norton security symantec announced project genesis february 7 2006 genesis would differ symantec consumer security products incorporating file backup performance optimization tools antivirus capabilities firewall phishing protection real-time heuristics also planned windows vista compatibility major aspect genesis genesis slated release september may 2005 microsoft announced windows live onecare security suite similar functionalities slated release 2006 genesis renamed norton 360 may 31 2006 feature set confirmed—it would functionalities norton internet security—with file backup performance tools phishing protection real-time heuristics public beta test planned summer 2006 final release date set end 2006 day mcafee announced falcon security suite similar functionalities norton 360 onecare however dates delayed onecare launched summer 2006 falcon entered public beta testing viewed norton 360 response microsoft antivirus software onecare however release onecare saw symantec lagging behind rivals mark bregman symantec vice president claimed upcoming norton 360 intended compete onecare stating somehow left wrong impression market place windows live onecare microsoft falcon mcafee nothing symantec first public beta delivered november 2006 compatible windows xp second beta subsequently released december 20 2006 adding compatibility windows vista build 6000 100,000 people tested software symantec began distribution retailers february 2007 version 1.0 released february 26 2007 version first symantec product use sonar detect zero-day viruses monitors applications malicious behavior taking action needed backup restore functionality allowed users back files online hard drive cd dvd performance optimization tools allowed users clear web browser history temporary files disk defragmenter bundled part optimization tools phishing protection integrates internet explorer warning users fraudulent sites windows xp 300 megahertz processor 256 megabytes ram 300 mb hard disk space required vista 800 mhz processor 512 mb ram 300 mb hard disk space required reviews cited norton 360 low resource usage relative norton internet security 2007 phishing protection pc magazine found phishing protection feature effective blocking access fraudulent sites internet explorer 7 firefox 2 however reviewers highlighted lack manual control advanced users cnet noted lack phishing protection browsers internet explorer mozilla firefox cnet also highlighted lack wireless network tools notifying users someone uninvited joins network help encrypting wireless signals pc magazine criticized antispam filter version 1.0 finding blocked half spam mail five percent false positive rate version 2.0 released march 3 2008 backup feature inscribe data blu-ray hd dvd discs multiple installations norton 360 also managed centralized location backing files online user control amount bandwidth norton uses registry cleaner bundled performance tools allowing user remove invalid entries phishing protection firefox added supplementing phishing protection norton identity safe stores login credentials websites network map allows users view status norton installations networked computers view basic information computer system requirements remain version 1.0 pc magazine found spam filter inaccurate 25 percent false positive rate cnet encountered problems installing version 2.0 legacy machines version 3.0 released march 4 2009 version uses codebase norton internet security 2009 earlier versions symantec rewrote code specifically norton 360 version 3.0 incorporates norton safe web offered standalone service earlier safe web integrates firefox internet explorer toolbar blocking access fraudulent malware hosting sites toolbar also includes search box routing search queries typed box ask.com search engine toolbar share code ask.com toolbar classified spyware mcafee trend micro antivirus vendors due criticism search functionality symantec announced ask.com search box would hidden future releases version 3.0 capability back files flash drive introduced release files stored flash drive copied another computer without norton 360 installed norton also creates virtual drive windows explorer allowing users browse backup files stored locally online users restore individual files using drag-and-drop technique version 3.0 retain previous versions files skips files open another program startup application manager included release allowing users control programs start login complement application manager norton measure impact programs login time pc magazine highlighted version 3.0 inaccurate spam filter misfiling half valid mail spam pc magazine also noted support session symantec technician used shareware application malwarebytes anti-malware remove malware computer referring online norton program controversy raised fact technician misleadingly referred program symantec product version 4.0 released february 17 2010 version adds many new security features found norton internet security 2010 version 4 also features gui change prominent colors match gold black sunburst norton internet security widely criticized antispam replaced far effective brightmail according symantec gives 20 better results require training version 5.0 released february 2011 offers improved performance virus detection also provides updated versions sonar version 3 system insight download insight supports internet explorer firefox browsers also supports following clients qq chat msn messenger chat limewire p2p msn explorer browser e-mail chat opera browser outlook e-mail thunderbird e-mail windows mail e-mail chrome browser bittorrent p2p aol browser yahoo messenger chat safari browser filezilla file manager outlook express e-mail features new enhanced interface realistic icons animations also includes norton widgets platform integrates symantec online services directly ui also new version reputation scan gives user clear insight loaded applications files safeweb facebook scans links wall verify safety links norton recovery tools added scanner interface start menu folder help restoring highly infected system backup restore functionality also improved passmark performance test 011 rated norton 360 5.0 fastest lightest all-in-one suite featured metered broadband modes easily remembers logins personal info protecting online identity theft version norton released september 5 2012 together newest norton antivirus norton internet security products described version-less symantec press release alluding automatic updates always keep software latest version specific version reference anywhere description software software compatible windows 8 version norton 360 features enhancements social networking protection anti-scam capabilities stronger networking defenses norton also introduced extra tune disk optimizer version 21 norton security suite released september 4 2013 together newest norton antivirus norton internet security products norton 360 antivirus solution developed sonar technology claims able detect threat block remove thanks three five layers shields threat monitoring threat removal network defense last one dealing online threats actually reach user ’ computer protection also granted analyzing behavior known menaces another important aspect derives stealth capabilities five shields work silently background performing scans updates back-ups automatically need whatsoever care important files browser protection download insight keen eye dangerous applications warning user eventual threats running computer version 22 released september 22 2014 release marketed norton security 2015 however norton 360 users able update v22 even norton retiring norton 360 brand appearance software identical norton security 2015 except product name top-left corner april 2019 symantec released new norton 360 emphasis new old legacy norton 360 remains retired product new norton 360 step norton security basically got replaced new product main change reflects besides security protection norton 360 provides secure vpn online privacy dark web monitoring powered lifelock safecam help block pc webcam takeovers new norton 360 comes several editions two standalone three bundle lifelock options norton 360 available norton 360 standard norton 360 premier edition norton 360 multi-device premier edition functions standard edition difference comes 25 gb online storage versus 2 gb included standard edition norton 360 multi-device actually three products one subscription norton 360 premier edition norton internet security mac® norton mobile security comparison norton 360 editions norton one shows features os coverage norton 360- gold edition credit card type 5 unique sets alpha-numeric key data reverse sold instructions go online install installation page norton 360 software sold purchased subscription stated period e.g one year software e.g firewall antivirus automatically disabled end subscription period unless new subscription purchased special edition norton 360 premier edition branded norton security suite available free pc customers comcast xfinity internet service difference norton 360 premier edition norton security suite latter include online storage feature norton internet security mac also available free comcast xfinity customers major version updates norton security suite typically occur 1 month norton 360 windows 8 consumer preview released february 29 2012 symantec announced norton antivirus internet security well newest norton 360 version 6 compatible windows 8 symantec compliance fbi whitelisted magic lantern keylogger developed fbi purpose magic lantern obtain passwords encrypted e-mail part criminal investigation magic lantern first reported media bob sullivan msnbc november 20 2001 ted bridis associated press magic lantern deployed e-mail attachment attachment opened trojan horse installed suspect computer trojan horse activated suspect uses pgp encryption often used increase security sent e-mail messages activated trojan horse log pgp password allows fbi decrypt user communications symantec major antivirus vendors whitelisted magic lantern rendering antivirus products including norton internet security incapable detecting magic lantern concerns include uncertainties magic lantern full potential whether hackers could subvert purposes outside jurisdiction law graham cluley technology consultant sophos said way knowing written fbi even ’ know whether used fbi commandeered third party another reaction came marc maiffret chief technical officer cofounder eeye digital security customers paying us service protect forms malicious code us law enforcement job make exceptions law enforcement malware tools fbi spokesman paul bresson response magic lantern needed court order deploy like technology projects tools deployed fbi would used pursuant appropriate legal process proponents magic lantern argue technology would allow law enforcement efficiently quickly decrypt messages protected encryption schemes implementing magic lantern require physical access suspect computer unlike carnivore predecessor magic lantern since physical access computer would require court order norton internet security windows versions criticized uninstalling completely leaving unnecessary files registry entries versions prior 3.0 also installed separate liveupdate program updates norton-branded software user must uninstall norton internet security liveupdate component manually liveupdate component purposely left behind update norton-branded products present symantec developed norton removal tool remove registry keys values along files folders uninstaller must run twice initially computer restart requiring second restart uninstallation remove subscription data preserved prevent users installing multiple trial copies norton 360 version 2.0 installed users encountered incompatibilities upgrading windows xp service pack 3 windows vista service pack 1 users report numerous invalid windows registry keys added tool named fixcss.exe resulting empty device manager missing devices wireless network adapters symantec initially blamed microsoft incompatibilities since accepted partial responsibility dave cole senior director product management acknowledged users running norton products experiencing problems said numbers small cole also said symantec done extensive testing products windows xp sp3 issue encountered cole blamed microsoft related xp sp3 microsoft recommended users contact windows customer support resolve problem symantec issued fix intended users upgrading symantec also recommends disabling tamper protection component 2008 release dubbed symprotect tool remove added registry entries available symantec sarah hicks symantec vice president consumer product management voiced concern windows vista 64-bit patchguard feature patchguard designed microsoft ensure integrity kernel part operating system interacts hardware rootkits may hide operating system kernel complicating removal mike dalton european president mcafee said decision build wall around kernel assumption ca n't breached ridiculous claiming microsoft preventing security vendors effectively protecting kernel promoting security product windows live onecare hicks said symantec mind competition onecare symantec later published white paper detailing patchguard instructions obtain patchguard exploit negotiations investigations antitrust regulators microsoft decided allow security vendors access kernel creating special api instructions norton 360 comes one-year subscription activated upon installation valid three home computers expiration subscription blocks access program updates shuts antivirus firewall well tools bundled password manager user saved passwords also inaccessible users often understand completely exposed pcs become infected viruses
[ 1809, 6802, 385, 7536, 1097, 6107, 3637, 6456, 6823, 2241, 5773, 6149, 7597, 88, 4759, 806, 4398, 2296, 7646, 496, 7275, 3394, 5856, 6560, 7289, 4091, 7683, 6235, 6951, 875, 1249, 5552, 3089, 4492, 7351, 4138, 2746, 5571, 2032, 578, 773...
Train
6,963
7
GridPP:gridpp gridpp collaboration particle physicists computer scientists united kingdom cern manage maintain distributed computing grid across uk primary aim providing resources particle physicists working large hadron collider experiments cern funded uk science technology facilities council collaboration oversees major computing facility called tier1 rutherford appleton laboratory ral along four tier 2 organisations scotgrid northgrid southgrid londongrid formerly lt2 tier 2s geographically distributed composed computing clusters multiple institutes 2012 gridpp infrastructure spans 18 uk institutions major partner uk national grid initiative part european grid infrastructure original gridpp plan drawn late 2000 provide uk contribution lhc computing grid europeandatagrid project european grid infrastructure drive behind projects provide researchers working lhc experiments suitable computing resources extend use technology communities first gridpp proposal accepted pparc time uk funding council responsible funding particle physics related projects collaboration officially began 1 september 2001 £17m funding first phase gridpp 2001 2004 collaboration built uk testbed working prototype grid linked similar systems around world preparation use production infrastructure analysed real data wide variety experiments run around world different institutions 2004 extended till september 2007 bring proposed lhc switch date 2007 gridpp fully functioning production service lhc switch still year away september 2007 received extension stfc receiving £30m funding march 2011 gridpp fourth phase 2011–2014 received funding science technology facilities council stfc support lhc experiments users late 2011 project providing 29,000 cpus 25,000tb storage worldwide grid infrastructure uk universities institutions researchers working lhc members 2011 list follows scotgrid based across 3 main sites primarily supports on-going research within field particle physics entire environment monitored maintained developed dedicated teams site ensure fully operational system available end user communities londongrid joint collaboration 5 institutes london region provide high performance computing resources high energy physics community gridpp supports many disciplines projects list different experiments projects actively use gridpp resources gridpp originally created support experiments based cern using lhc 4 main experiments supported alongside experiments lhc gridpp also supports international high energy physics experiments include gridpp european grid infrastructure efforts supports many non-physics research disciplines
[ 1237, 7055, 4159, 1293 ]
Test
6,964
2
NCR_VRX:ncr vrx vrx acronym virtual resource executive proprietary operating system ncr criterion series later v-8000 series mainframe computers manufactured ncr corporation 1970s 1980s replaced b3 operating system originally distributed century series inherited many features b4 operating system high-end ncr century series computers vrx upgraded late 1980s 1990s become vrx/e use ncr 9800 series computers edward d. scott managed development team 150 software engineers developed vrx tom tang director engineering ncr responsible development entire criterion family computers product line achieved 1b revenue 300m profits ncr
[ 1522, 5571 ]
Test
6,965
5
GNUMail:gnumail gnumail free open-source cross-platform e-mail client based gnustep cocoa official mail client gnustep also used étoilé inspired nextmail next mail.app predecessor apple mail gnumail based mail handling framework pantomime furthermore gnumail demonstrates possible develop cross platform programs gnustep cocoa
[ 1152, 2453, 5101, 7975, 6721, 5571, 735, 1475, 6908, 405, 2131, 2769, 5070, 4352, 5773, 6582, 3915, 5786, 5787, 6588, 5887, 4918, 5450 ]
Test
6,966
5
SPDY:spdy spdy pronounced speedy deprecated open-specification networking protocol developed primarily google transporting web content spdy manipulates http traffic particular goals reducing web page load latency improving web security spdy achieves reduced latency compression multiplexing prioritization although depends combination network website deployment conditions name spdy trademark google acronym throughout process core developers spdy involved development http/2 including mike belshe roberto peon february 2015 google announced following recent final ratification http/2 standard support spdy would deprecated support spdy would withdrawn google removed spdy support google chrome 51 mozilla removed firefox 50 apple deprecated technology macos 10.14.4 ios 12.2. group developing spdy stated publicly working toward standardisation available internet draft first draft http/2 used spdy working base specification draft editing implementations spdy exist chromium mozilla firefox opera amazon silk internet explorer safari implementations chromium firefox open source software february 2015 google announced plans remove support spdy favor http/2 http/2 first discussed became apparent spdy gaining traction implementers like mozilla nginx showing significant improvements http/1.x call proposals selection process spdy chosen basis http/2 since number changes based discussion working group feedback implementers february 11 2016 google announced chrome would longer support spdy npn may 15 2016 anniversary rfc 7540 january 25 2019 apple announced spdy would deprecated favor http/2 would removed future releases goal spdy reduce web page load time achieved prioritizing multiplexing transfer web page subresources one connection per client required tls encryption nearly ubiquitous spdy implementations transmission headers gzip- deflate-compressed design contrast http headers sent human-readable text moreover servers may hint even push content instead awaiting individual requests resource web page spdy requires use ssl/tls tls extension alpn security also supports operation plain tcp requirement ssl security avoid incompatibility communication across proxy spdy replace http modifies way http requests responses sent wire means existing server-side applications used without modification spdy-compatible translation layer put place spdy effectively tunnel http https protocols sent spdy http requests processed tokenized simplified compressed example spdy endpoint keeps track headers sent past requests avoid resending headers changed must sent compressed ietf working group httpbis released draft http/2 spdy draft-mbelshe-httpbis-spdy-00 chosen starting point use within https spdy needs tls extension next protocol negotiation npn thus browser server support depends https library openssl 1.0.1 greater introduces npn patches add npn support also written nss tlslite spdy scheduled switch npn application-layer protocol negotiation alpn end 2014 security support provider interface sspi microsoft implemented npn extension tls implementation prevented spdy inclusion latest .net framework versions since spdy specification refined http/2 expected include spdy implementation one could expect microsoft release support http/2 finalized spdy versioned protocol control frames 15 dedicated bits indicate version session protocol approximately 7.1 websites support spdy fielded versions two popular web servers nginx apache major providers spdy traffic although latest version nginx removed spdy support compares adoption rate 8.1 newer http/2 protocol overtaken adoption spdy google services e.g google search gmail ssl-enabled services use spdy available google ads also served spdy-enabled servers brief history spdy support amongst major web players according w3techs spdy-enabled websites use nginx litespeed web server coming second
[ 4655, 7148, 7170, 1460, 1462, 6809, 393, 3291, 2574, 3637, 2577, 2219, 3640, 6458, 7916, 3312, 4352, 4725, 7214, 7217, 1136, 3338, 2620, 1152, 6871, 456, 6879, 2281, 6521, 1543, 2644, 5821, 7628, 6531, 2291, 2650, 5127, 7637, 6908, 5492, ...
Test
6,967
4
Mushroom_Networks:mushroom networks mushroom networks inc. privately held company san diego california mushroom networks founded 2004 electrical computer engineer rene l. cruz cahit akin rajesh mishra spin-off university california san diego ucsd got support von liebig center mushroom networks also received initial funding support itu ventures los angeles investment firm company solely focuses networking products utilizing broadband bonding technology various configurations products provide end-user appearance larger bandwidth aggregating multiple network services load balancing and/or channel bonding mushroom networks developed broadband bonding extensive research development
[ 2442, 7169 ]
Validation
6,968
1
Database_System_Concepts:database system concepts database system concepts abraham silberschatz hank korth s. sudarshan best-selling textbook database systems often called sailboat book cover sailboats since first edition first edition cover number sailboats labelled names various database models boats sailing desert island towards tropical island wind pushes away prevents arrival book currently 7th edition released march 2019 copyright year 2020 previous editions released 2010 6th edition 2005 5th edition 2001 4th edition 1997 3rd edition 1991 2nd edition 1986 1st edition 1st 2nd editions book authored hank korth abraham silberschatz s. sudarshan co-author since third edition various editions book translated numerous languages including chinese korean portuguese spanish official website book db-book.com
[ 7067, 7303 ]
Test
6,969
2
Netwide_Assembler:netwide assembler netwide assembler nasm assembler disassembler intel x86 architecture used write 16-bit 32-bit ia-32 64-bit x86-64 programs nasm considered one popular assemblers linux nasm originally written simon tatham assistance julian hall maintained small team led h. peter anvin open-source software released terms simplified 2-clause bsd license nasm output several binary formats including coff omf a.out executable linkable format elf mach-o binary file .bin binary disk image used compile operating systems though position-independent code supported elf object files nasm also binary format called rdoff variety output formats allows retargeting programs virtually x86 operating system os also nasm create flat binary files usable write boot loaders read-only memory rom images various facets os development nasm run non-x86 platforms cross assembler powerpc sparc though generate programs usable machines nasm uses variant intel assembly syntax instead syntax also avoids features automatic generation segment overrides related assume directive used masm compatible assemblers hello world program dos operating system equivalent program linux example similar program microsoft windows 64-bit program apple os x inputs keystroke shows screen nasm principally outputs object files generally executable exception flat binaries e.g. .com inherently limited modern use translate object files executable programs appropriate linker must used visual studio link utility windows ld unix-like systems first release version 0.90 released october 1996 28 november 2007 version 2.00 released adding support x86-64 extensions development versions uploaded sourceforge.net instead checked project git repository binary snapshots available project web page search engine nasm documentation also available july 2009 version 2.07 nasm released simplified 2-clause bsd license previously nasm licensed lgpl led development yasm complete rewrite nasm new bsd license yasm offered support x86-64 earlier nasm also added support gnu assembler syntax relocatable dynamic object file format rdoff used developers test integrity nasm object file output abilities based heavily internal structure nasm essentially consisting header containing serialization output driver function calls followed array sections containing executable code data tools using format including linker loader included nasm distribution version 0.90 released october 1996 nasm supported output flat-format executable files e.g. dos com files version 0.90 simon tatham added support object-file output interface dos .obj files 16-bit code nasm thus lacked 32-bit object format address lack exercise learn object-file interface developer julian hall put together first version rdoff released nasm version 0.91 since initial version one major update rdoff format added record-length indicator header record allowing programs skip records whose format recognise support multiple segments rdoff1 supported three segments text data bss containing uninitialized data
[ 4662, 4843, 4759, 6616, 1335, 5571, 578, 2403, 1992, 584, 4611, 410, 3557, 6380, 4810, 421, 336, 5606, 6489, 352, 263, 6498, 971, 5190 ]
Validation
6,970
3
Spectravideo:spectravideo spectravideo international svi american computer manufacturer software house originally called spectravision company founded harry fox 1981 company produced video games software vic-20 home computer atari 2600 home video game console computemate peripheral computers compatible microsoft msx ibm pc company ceased operations 1988 spectravision founded 1981 harry fox alex weiss distributor computer games contracting external developers write software main products gaming cartridges atari 2600 vcs colecovision commodore vic-20 also made world first ergonomic joystick quickshot late 1982 company renamed spectravideo due naming conflict oncommand hotel tv system called spectravision early 1980s company developed 11 games atari 2600 including several titles rarity chase chuckwagon mangia bumper bash titles available columbia house music club company first attempt computer add-on atari 2600 called spectravideo compumate membrane keyboard simple programmability spectravideo first real computers sv-318 sv-328 released 1983 powered z80 3.6 mhz differed amount ram sv-318 32kb sv-328 80kb total 16kb reserved video keyboard style main operating system residing rom version microsoft extended basic computer equipped floppy drive user option boot cp/m instead two computers precedent msx fully compatible standard though changes made design create msx minor system wide range optional hardware example adapter making possible run colecovision games svi may 1983 spectravideo went public sale 1 million shares stock 6.25 per share initial public offering underwritten brokerage d. h. blair co however spectravideo quickly ran trouble december 1983 stock fallen 75 cents per share march 1984 company agreed sell 60 stake hong kong-based bondwell holding deal would also required resignation president harry fox vice-president alex weiss deal set aside spectravideo unable restructure 2.6 million worth debt another deal fanon courier u.s.a. inc. would purchased 80 company struck july fanon courier deal similarly fell fox resigned president september bondwell holding purchasing half company stock installing bondwell vice-president christopher chan new president later computer spectravideo svi-728 made msx compatible svi-738 also msx compatible came built-in 360 kb 3.5 floppy drive last computer produced spectravideo svi-838 also known spectravideo x'press 16 pc msx2 device today spectravideo name used uk-based company called spectravideo plc formerly known ash newman company founded 1977 bought spectravideo brand name bondwell svi owner 1988 sell range logic3 branded products connection old spectravideo products
[ 3007, 5571, 4277, 974, 6936 ]
Validation
6,971
2
Scott_Forstall:scott forstall scott forstall born 1969 american software engineer best known leading original software development team iphone ipad broadway producer best known co-producing tony award-winning fun home eclipsed wife spent career first next apple senior vice president svp ios software apple inc. 2007 october 2012 forstall grew middle-class family kitsap county washington second-born three boys registered-nurse mother jeanne engineer father tom forstall older brother bruce also senior software design engineer microsoft gifted student skills programming came easily difficult others forstall qualified advanced-placement science math class junior high school gained experience programming apple iie computers skipped forward year entering olympic high school bremerton washington early classmates recall immersion competitive chess history general knowledge occasion competing state level achieved 4.0 gpa earned position valedictorian position shared classmate molly brown would later become wife established goal designer high-tech electronics equipment proclaimed interview local newspaper enrolling stanford university graduated 1991 degree symbolic systems next year received master degree computer science also stanford time stanford forstall member phi kappa psi fraternity forstall joined steve jobs next 1992 stayed purchased apple 1997 forstall placed charge designing user interfaces reinvigorated macintosh line 2000 forstall became leading designer mac new aqua user interface known water-themed visual cues translucent icons reflections making rising star company promoted svp january 2003 period supervised creation safari web browser melton senior developer safari team credited forstall willing trust instincts team respecting ability develop browser secret 2005 jobs began planning iphone choice either shrink mac would epic feat engineering enlarge ipod jobs favored former approach pitted macintosh ipod team led forstall tony fadell respectively internal competition forstall fierce competition create ios decision enabled success iphone platform third-party developers using well-known desktop operating system basis allowed many third-party mac developers write software iphone minimal retraining forstall also responsible creating software developer kit programmers build iphone apps well app store within itunes 2006 forstall became responsible mac os x releases avie tevanian stepped company chief software technology officer named svp iphone software forstall received credit ran ios mobile software team like clockwork widely respected ability perform pressure spoken publicly apple worldwide developers conferences including talks mac os x leopard 2006 iphone software development 2008 later release iphone os 2.0 iphone 3g january 27 2010 apple 2010 ipad keynote wwdc 2011 forstall introduced ios 5 forstall also appears ios 5 video narrating three-quarters clip almost every major apple ios special event let talk iphone event launching iphone 4s took stage demonstrate phone siri voice recognition technology originally developed sri international aftermath release ios 6 september 19 2012 proved troubled period apple newly introduced maps application completely designed in-house apple criticized underdeveloped buggy lacking detail addition clock app used design based trademarked swiss railway clock apple failed license forcing apple pay swiss railways reported 21 million compensation october apple reported third-quarter results revenues profits grew less predicted second quarter row company missed analysts expectations october 29 2012 apple announced press release scott forstall leaving apple 2013 serve advisor ceo tim cook interim forstall duties divided among four apple executives design svp jonathan ive assumed leadership apple human interface team craig federighi became new head ios software engineering services chief eddy cue took responsibilities maps siri bob mansfield previously svp hardware engineering unretired oversee new technology group day john browett svp retail dismissed immediately six months job neither forstall apple executive commented publicly departure beyond initial press statement generally presumed forstall left position involuntarily information reasons departure therefore come anonymous sources cook aim since becoming ceo reported building culture harmony meant weeding people disagreeable personalities—people jobs tolerated even held close like forstall although former apple senior engineer michael lopp believes apple ability innovate came tension disagreement steve jobs referred decider final say products features ceo reportedly keeping strong personalities apple check always casting winning vote last word jobs death many executive conflicts became public forstall poor relationship ive mansfield could meeting unless cook mediated reportedly forstall ive cooperate level forced choose two cook reportedly chose retain ive since forstall collaborative forstall close referred mini-steve jobs jobs death left forstall without protector forstall also referred ceo-in-waiting fortune magazine book inside apple written adam lashinsky profile made unpopular apple forstall said responsible departure jean-marie hullot cto applications 2005 tony fadell svp hardware engineering 2008 fadell remarked interview bbc forstall firing justified got deserved jon rubinstein fadell predecessor svp hardware also strained relationship forstall jobs death 2011 reported forstall trying gather power challenge cook siri intelligent personal voice assistant forstall introduced september 2011 received mixed reception observers regarding flop forstall vigorously criticized new maps app introduced ios 6 received criticism inaccuracies apple standards according adam lashinsky fortune apple issued formal apology errors maps forstall refused sign long-standing practice apple forstall directly responsible individual maps refusal sign apology convinced cook forstall go forstall skeuomorphic design style strongly advocated former ceo steve jobs reported also controversial divided apple design team 2012 interview ive head hardware design refused comment ios user interface terms elements 're talking 'm really connected forstall make public appearances departure apple number years report december 2013 said concentrating travel advising charities providing informal advice small companies april 17 2015 forstall made first tweet revealed co-producer broadway version musical fun home first public appearance since departing apple 2012 june 7 2015 forstall-produced musical five awards tonys forstall reportedly working advisor snap inc. june 20 2017 forstall gave first public interview leaving apple interviewed computer history museum john markoff creation iphone 10th anniversary sales launch
[ 6788, 3940, 7890, 4320, 4690, 734, 6814, 5752, 405, 3649, 6125, 2954, 4355, 6847, 4003, 6142, 2609, 1897, 4376, 5450, 4749, 7601, 6165, 7245, 3001, 120, 1940, 2300, 3025, 502, 2679, 2327, 6565, 2331, 3050, 163, 1599, 1234, 3412, 889, 55...
Test
6,972
2
PUFFS_(NetBSD):puffs netbsd pass-to-userspace framework file system puffs netbsd kernel subsystem developed running filesystems userspace added netbsd 5.0 release ported dragonfly bsd 3.2 release netbsd 5.0 puffs includes refuse reimplementation libfuse high-level interface filesystems use low-level libfuse interface kernel fuse interface supported refuse netbsd 6.0 addresses limitation perfuse new compatibility layer emulates fuse kernel interface
[ 885, 1254, 191, 732, 5571, 8194, 6743, 1394, 6211, 594, 1315, 5518, 1133, 7581, 1697, 6149, 1793, 8037, 1435, 6505 ]
Test
6,973
2
INtime:intime intime pronounced time real time operation system rtos family based 32 bit rtos conceived run time-critical operations cycle-times low 50μs intime rtos runs single-core hyper-threaded multi-core x86 pc platform intel amd supports two binary compatible usage configurations intime windows intime rtos runs alongside microsoft® windows® intime distributed rtos intime runs stand-alone rtos like irmx predecessors intime real-time operating system like dosrmx irmx windows runs concurrently general-purpose operating system single hardware platform intime 1.0 originally introduced 1997 conjunction windows nt operating system since upgraded include support subsequent protected-mode microsoft windows platforms windows xp windows 10 intime also used stand-alone rtos intime binaries able run unchanged running stand-alone node intime rtos unlike windows intime run intel 80386 equivalent processor current versions windows operating system generally require least pentium level processor order boot execute spinning radisys 2000 development work intime continued tenasys corporation 2003 tenasys released version 2.2 intime notable features version 2.2 include
[ 4759, 6256, 4336 ]
Test
6,974
4
Spanish_Data_Protection_Agency:spanish data protection agency spanish data protection agency aepd agency government spain aepd established royal decree 428/1993 26 march amended organic law 15/1999 protection personal data amendment implemented directive 95/46/ec agency created context spanish constitution 1978 article 18.4 stating law shall restrict use informatics order protect honour personal family privacy spanish citizens well full exercise rights elaborated organic law 5/1992 aepd public law authority enjoying absolute independence public administration responsible response latter point aepd advocated aepd conducting anti-spam investigations since 2004 collaborating foreign agencies united states federal trade commission aepd come conflict google information gathered wi-fi networks google street view images taken asserting verified data location wifi networks identification owners personal data diverse nature communications names surnames messages associated accounts message services user codes passwords collected also demanded removal approximately 90 names search results claiming right forgotten google contesting actions
[ 1998, 1344, 6438, 2548, 803, 2727, 7120 ]
Test
6,975
5
Variant_object:variant object variant objects context http objects served origin content server type transmitted data variation i.e uncompressed compressed different languages etc. http/1.1 1997–1999 introduces content/accept headers used http requests responses state variant data presented client server
[ 4635, 8174, 7290, 1822, 84, 2054, 6931, 7649, 3383 ]
Test
6,976
5
Link_layer:link layer computer networking link layer lowest layer internet protocol suite networking architecture internet described rfc 1122 rfc 1123 link layer group methods communications protocols operate link host physically connected link physical logical network component used interconnect hosts nodes network link protocol suite methods standards operate adjacent network nodes local area network segment wide area network connection despite different semantics layering tcp/ip osi link layer sometimes described combination data link layer layer 2 physical layer layer 1 osi model however layers tcp/ip descriptions operating scopes application host-to-host network link detailed prescriptions operating procedures data semantics networking technologies rfc 1122 exemplifies local area network protocols ethernet ieee 802 framing protocols point-to-point protocol ppp belong link layer local area networking standards ethernet ieee 802 specifications use terminology seven-layer osi model rather tcp/ip model tcp/ip model general consider physical specifications rather assumes working network infrastructure deliver media level frames link therefore rfc 1122 rfc 1123 definition tcp/ip model discuss hardware issues physical data transmission set standards aspects textbook authors supported interpretation physical data transmission aspects part link layer others assumed physical data transmission standards considered communication protocols part tcp/ip model authors assume hardware layer physical layer link layer several adopt osi term data link layer instead link layer modified description layering predecessor tcp/ip model arpanet reference model rfc 908 1982 aspects link layer referred several poorly defined terms network-access layer network-access protocol well network layer next higher layer called internetwork layer modern text books network-interface layer host-to-network layer network-access layer occur synonyms either link layer data link layer often including physical layer link layer tcp/ip model descriptive realm networking protocols operate local network segment link host connected protocol packets routed networks link layer includes protocols define communication local on-link network nodes fulfill purpose maintaining link states local nodes local network topology usually use protocols based framing packets specific link types core protocols specified internet engineering task force ietf layer address resolution protocol arp reverse address resolution protocol rarp neighbor discovery protocol ndp facility delivering similar functionality arp ipv6 since advent ipv6 open shortest path first ospf considered operate link level well although ipv4 version protocol considered internet layer is-is rfc 1142 another link-state routing protocol fits layer considering tcp/ip model however developed within osi reference stack layer 2 protocol internet standard link layer tcp/ip model often compared directly combination data link layer physical layer open systems interconnection osi protocol stack although congruent degree technical coverage protocols identical link layer tcp/ip still wider scope principle different concept terminology classification may observed certain protocols address resolution protocol arp confined link layer tcp/ip model often said fit osi data link layer network layer general direct strict comparisons avoided layering tcp/ip principal design criterion general considered harmful rfc 3439 another term sometimes encountered network access layer tries suggest closeness layer physical network however use misleading non-standard since link layer implies functions wider scope network access important link layer protocols used probe topology local network discover routers neighboring hosts i.e functions go well beyond network access
[ 7148, 709, 4667, 4676, 4677, 7170, 4683, 6432, 1462, 5039, 6446, 2219, 3640, 4709, 3312, 66, 7214, 7217, 2612, 3337, 1900, 456, 5456, 6879, 2281, 6521, 106, 1543, 2644, 6531, 2650, 121, 7637, 4414, 6908, 3379, 5492, 3383, 494, 500, 7297...
Validation
6,977
9
George_Necula:george necula george ciprian necula romanian computer scientist engineer google former professor university california berkeley research area programming languages software engineering particular focus software verification formal methods best known ph.d. thesis work first describing proof-carrying code work received 2007 sigplan influential popl paper award originally baia mare romania necula attended polytechnic university bucharest coming carnegie mellon university united states complete ph.d. programming languages researcher peter lee ph.d. thesis first describing proof-carrying code influential mechanism allow untrusted machine code run safely without performance overhead joined faculty university california berkeley 1998 recently necula work focused open-source analysis verification transformation tools c including c intermediate language cil ccured deputy c intermediate language cil simplified subset c programming language well set tools transforming c programs language several tools use cil way access c abstract syntax tree programs frama-c framework analyze c programs compcert c compiler proven coq necula fellow okawa foundation alfred p. sloan foundation see sloan fellowship received grace murray hopper award 2001 national science foundation career award 1999 acm sigops hall fame award 2006
[ 6285, 7758, 2315, 908, 1116, 851, 6263, 1435 ]
Validation
6,978
2
Android_Eclair:android eclair android eclair codename android mobile operating system developed google fifth operating system android longer supported versions 2.0 2.1 unveiled october 26 2009 android 2.1 builds upon significant changes made android 1.6 donut default home screen eclair displays persistent google search bar across top screen camera app also redesigned numerous new camera features including flash support digital zoom scene mode white balance color effect macro focus photo gallery app also contains basic photo editing tools version also included addition live wallpapers allowing animation home-screen background images show movement speech-to-text first introduced replacing comma key android eclair inherits platform additions donut release ability search saved sms mms messages improved google maps 3.1.2 exchange support email app operating system also provides improved typing speed virtual keyboard along new accessibility calendar virtual private network apis internet browsing android eclair also adds support html5 refreshed browser ui bookmark thumbnails double-tap zoom
[ 3933, 5372, 6427, 1095, 740, 4340, 42, 3309, 3310, 7924, 2591, 5771, 5775, 6153, 7956, 5455, 6176, 5473, 474, 6183, 822, 831, 5141, 136, 2317, 2673, 6209, 1582, 2683, 855, 6937, 168, 6232, 6950, 2712, 4116, 5195, 2003, 195, 7346, 561, ...
Test
6,979
3
Bomberman_(1983_video_game):bomberman 1983 video game nes/famicom release eponymous character bomberman robot must find way maze avoiding enemies doors leading maze rooms found rocks bomberman must destroy bombs items help improve bomberman bombs fire ability improves blast range bombs bomberman turn human escapes reaches surface game 50 levels total original home computer games basic different rules bomberman written 1980 purely serve tech demo hudson soft basic compiler basic version game given small-scale release japanese pcs 1983 european pcs following year bomberman known nes/famicom version released japan december 19 1985 north america 1987 hudson soft director research development shinichi nakamoto commented 1995 interview personally believe famicom version bomberman one version game version ported back msx following year bomberman special bomberman appearance game hudson soft re-used enemy graphic taken 1984 nes/famicom port broderbund lode runner early version bomberman famous design robotic anime-like character pink antenna game also released game boy game b mode game atomic punk 2004 version bomberman re-released game boy advance part famicom mini series japan classic nes series north america europe released year n-gage remake/update also released sony playstation entitled bomberman japan europe renamed bomberman party edition us version features port original version single-player game well revised updated version pre-rendered 3d graphics contemporary audio updated graphics audio also used multiplayer aspect game
[ 6222 ]
Test
6,980
9
Name_binding:name binding programming languages name binding association entities data and/or code identifiers identifier bound object said reference object machine languages built-in notion identifiers name-object bindings service notation programmer implemented programming languages binding intimately connected scoping scope determines names bind objects – locations program code lexically one possible execution paths temporally use identifier codice_1 context establishes binding codice_1 called binding defining occurrence occurrences e.g. expressions assignments subprogram calls identifier stands bound occurrences called applied occurrences example static binding direct c function call function referenced identifier change runtime example dynamic binding dynamic dispatch c++ virtual method call since specific type polymorphic object known runtime general executed function dynamically bound take example following java code codice_3 interface codice_4 must refer subtype reference codice_5 codice_6 subtype codice_3 actual method referenced codice_8 known runtime c instance dynamic binding may call function pointed variable expression function pointer type whose value unknown actually gets evaluated run-time rebinding confused mutation consider following java code identifier codice_4 initially references nothing uninitialized rebound reference object linked list strings linked list referenced codice_4 mutated adding string list lastly codice_4 rebound codice_12 late static binding variant binding somewhere static dynamic binding consider following php example example php interpreter binds keyword codice_13 inside codice_14 class codice_15 call codice_16 produces string hello semantics codice_17 based late static binding result would bye beginning php version 5.3 late static binding supported specifically codice_17 changed codice_19 shown following block keyword codice_20 would bound runtime result call codice_16 would bye
[ 274, 2986, 5986, 7333, 4302, 6614, 8174, 5731, 7352, 8097, 1102, 7460, 6029, 1763, 7391, 3659, 7936, 5786, 260, 2079, 2619, 1435 ]
Validation
6,981
9
GNU_Guile:gnu guile gnu ubiquitous intelligent language extensions gnu guile preferred extension language system gnu project features implementation programming language scheme first version released 1993 addition large parts scheme standards guile scheme includes modularized extensions many different programming tasks extending programs guile offers libguile allows language embedded programs integrated closely c language application programming interface api similarly new data types subroutines defined c api made available extensions guile guile used programs gnucash lilypond gnu guix guix system distribution guixsd gnu debugger guile scheme general-purpose high-level programming language whose flexibility allows expressing concepts fewer lines code would possible languages c. example hygienic macro system allows adding domain specific syntax-elements without modifying guile guile implements scheme standard r5rs r6rs several scheme requests implementation srfi many extensions core idea guile scheme developer implements critical algorithms data structures c c++ exports functions types use interpreted code application becomes library primitives orchestrated interpreter combining efficiency compiled code flexibility interpretation thus guile scheme languages implemented guile extended new data types subroutines implemented c api standard distribution offers modules portable operating system interface posix system calls scheduling foreign function interface s-expression based xml processing sxml sxpath sxslt http world wide web apis delimited continuations array programming functionality guile programs use facilities slib portable scheme library using continuations call/cc requirement scheme standard guile copies execution stack heap back foreign code may pointers scheme objects guile uses conservative boehm–demers–weiser bdw garbage collector guile manual gives details inception early history language brief summary follows success emacs free software community highly extensible customizable application via extension partly implementation language emacs lisp community began consider design strategy could apply rest gnu system tom lord initially began work embeddable language runtime named gnu extension language gel based aubrey jaffer scheme implementation scm turn based george carrette siod lord convinced richard stallman make gel official extension language gnu project based argument scheme cleaner lisp dialect emacs lisp gel could evolve implement languages runtime namely emacs lisp lord discovered gel naming conflict another programming language solicited suggestions new name several contributions several usenet newsgroups lord controversially chose guile suggestion lee thomas development guile gel public release extension language tcl gaining popularity pushed universal extension language stallman saw tcl underpowered extension language posted criticism comp.lang.tcl newsgroup initiated flamewar known tcl war since public announcement guile project coincided tcl debate become common misconception guile began reaction initial release guile development languished many years 2009–2010 saw major improvements guile 2.0 released 2011 new compiler infrastructure virtual machine implementation switch boehm–demers–weiser garbage collector many improvements guile scheme language major changes one goals guile allow languages used alongside scheme guile would effectively language-neutral runtime environment various attempts made past versions dialect scheme essentially differing c-like syntax translation emacs lisp tcl converter motivated tkwww something roughly resembling language logo version 2.0 project successfully transitioned compiler tower approach allowing definition compilers one language another typically higher-level one lower-level intermediate representation eventually virtual machine bytecode native machine code several past unfinished attempts replace supplement emacs emacs lisp elisp extension language guile parallel efforts supporting languages guile version 2.0 guile new attempt implementing elisp guile compiler tower replacing emacs elisp implementation libguile begun made significant progress google summer code projects guile-based emacs could offer better execution performance emacs lisp support new emacs lisp language features easily make guile libraries written programming languages available emacs lisp code allow writing emacs extensions programming languages supported guile remaining fully backward compatible existing emacs lisp code bases implementation reached stage guile emacs able reliably run emacs lisp code remaining problems possible problems involve different internal representation emacs lisp strings scheme strings difference emacs lisp scheme treat boolean false empty list objects emacs lisp macros integrating scheme emacs lisp designed concurrency portability guile platforms supported emacs concerns raised emacs community include relative sizes emacs guile communities whether would cause splitting community emacs extensible programming languages emacs lisp
[ 7878, 1445, 5019, 1820, 6796, 6087, 2915, 2559, 5734, 1478, 2218, 4704, 5757, 6116, 7559, 3981, 1116, 6471, 7573, 2599, 2600, 5077, 1885, 1889, 5787, 6497, 84, 1523, 795, 6876, 6888, 4778, 1557, 486, 4789, 5494, 5501, 4070, 6210, 144, 4...
Test
6,982
9
Compile_time:compile time computer science compile time refers either operations performed compiler compile-time operations programming language requirements must met source code successfully compiled compile-time requirements properties program reasoned compilation compile time refers time duration statements written programming language checked errors operations performed compile time usually include syntax analysis various kinds semantic analysis e.g. type checks instantiation template code generation programming language definitions usually specify compile time requirements source code must meet successfully compiled example languages may stipulate amount storage required types variables deduced properties program reasoned compile time include range-checks e.g. proving array index exceed array bounds deadlock freedom concurrent languages timings e.g. proving sequence code takes allocated amount time compile time occurs link time output one compiled files joined together runtime program executed programming languages may necessary compilation linking occur runtime trade-off compile-time link-time many compile time operations deferred link-time without incurring extra run-time compile time also refer amount time required compilation
[ 5012, 5983, 279, 97, 7333, 6886, 809, 7804, 5731, 1361, 6002, 5218, 1990, 1854, 3298, 4154, 7096, 4525, 7474, 6750, 5506, 1673, 2420, 5771, 3817, 8122, 3225, 7936, 5606, 5965, 7687, 3751, 1989, 3242, 6778, 1430, 2079, 1803, 5190 ]
Validation
6,983
4
Social_jacking:social jacking social jacking malicious technique tricking users clicking vulnerable buttons compromise showing false appearing pages mixture click jacking technique breach browser security social engineering may also referred user interface disguising method variant click jacking method original page vulnerable page loaded using iframe tag unnecessary contents webpage displayed iframe removed placing white background div tag elements using absolute positioning property using css thus unnecessary information displayed vulnerable page removed buttons links alone made visible user additional social engineering messages like click button get access get reward displayed iframe tag user made click visible button without knowing happens clicks button prevention methods quite tough user identifying analyzing webpages click anonymous links buttons social jacking easily implemented using google web toolkit design webpage using wysiwyg gui builder drag white background colored panel iframe window thus hiding unnecessary information revealing vulnerable buttons alone
[ 2789, 2577 ]
Test
6,984
2
User_space:user space modern computer operating system usually segregates virtual memory kernel space user space primarily separation serves provide memory protection hardware protection malicious errant software behaviour kernel space strictly reserved running privileged operating system kernel kernel extensions device drivers contrast user space memory area application software drivers execute term userland user space refers code runs outside operating system kernel userland usually refers various programs libraries operating system uses interact kernel software performs input/output manipulates file system objects application software etc user space process normally runs virtual memory space unless explicitly allowed access memory processes basis memory protection today mainstream operating systems building block privilege separation separate user mode also used build efficient virtual machines – see popek goldberg virtualization requirements enough privileges processes request kernel map part another process memory space case debuggers programs also request shared memory regions processes although techniques also available allow inter-process communication common way implementing user mode separate kernel mode involves operating system protection rings another approach taken experimental operating systems single address space software rely programming language semantics make sure arbitrary memory accessed – applications simply acquire references objects allowed access approach implemented jxos unununium well microsoft singularity research project
[ 4295, 4297, 13, 5744, 2942, 4341, 5762, 4347, 58, 65, 5781, 5783, 2970, 5787, 1522, 7242, 1534, 4397, 5814, 7260, 5829, 126, 1559, 7267, 3023, 4423, 1574, 4435, 5865, 1596, 165, 7310, 7312, 5884, 3073, 7325, 3084, 190, 1638, 204, 4498, ...
Validation