node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4 values |
|---|---|---|---|---|
6,985 | 4 | Korea_Internet_&_Security_Agency:korea internet amp security agency korea internet security agency 한국인터넷진흥원 kisa ministry science ict sub-organization dealing allocation maintenance south korea ipv4/ipv6 address space related whois information autonomous system numbers .kr country code top-level domain cctld also responsible cybersecurity internet within south korea runs korea computer emergency response team coordination center a.k.a krcert/cc private sector country roles include limited promotion safe internet usage internet culture detecting analyzing malware/virus web privacy protection operating root ca education internet cybersecurity various cybersecurity issues organization created july 2009 three different agencies merged one organization korea information security agency kisa national internet development agency nida korean international cooperation agency kiica kisa internet information security promotion organization korea aim improve global competitiveness korea ’ internet industry kisa set ‘ internet promotion ’ future ‘ information security ’ safety primary tasks focusing enhancing information security capacity korea ’ ict industry expanding global cooperative partnership based k-ict security development strategy krcert/cc internal division kisa csirt national responsibility focal point contact korea international cybersecurity incident handling cooperates interacts locally national cyber security center national intelligence service korea relevant stakeholders including local internet service providers cybersecurity vendors also interacts national csirts global cybersecurity vendors krcert/cc memberships asia pacific computer emergency response team apcert forum incident response security teams first kisa also 4 regional offices overseas located oman middle east region indonesia southeast asia costa rica latin america caribbean tanzania africa roles facilitate inter-governmental cooperation including b2b/b2g/g2b introduce talented korean cybersecurity enterprises global market | [
8040,
3819
] | Test |
6,986 | 8 | Web_service:web service term web service ws either web service web technology http — originally designed human-to-machine communication — used transferring machine-readable file formats xml json practice web service commonly provides object-oriented web-based interface database server utilized example another web server mobile app provides user interface end user many organizations provide data formatted html pages also provide data server xml json often web service allow syndication example wikipedia another application offered end user may mashup web server consumes several web services different machines compiles content one user interface asynchronous javascript xml ajax dominant technology web services developing combination http servers javascript clients plain old xml distinct soap w3c web services frequently used json well instead xml representational state transfer rest architecture well-behaved web services function internet scale 2004 document w3c sets following rest key distinguishing feature web services number web services use markup languages web api development web services emphasis moving simpler representational state transfer rest based communications restful apis require xml-based web service protocols soap wsdl support interfaces relation w3c web services w3c defined web service w3c web services may use soap http protocol allowing less costly efficient interactions internet via proprietary solutions like edi/b2b besides soap http web services also implemented reliable transport mechanisms like ftp 2002 document web services architecture working group defined web services architecture requiring standardized implementation web service term web service describes standardized way integrating web-based applications using xml soap wsdl uddi open standards internet protocol backbone xml data format used contain data provide metadata around soap used transfer data wsdl used describing services available uddi lists services available web service method communication two electronic devices network software function provided network address web service always concept utility computing many organizations use multiple software systems management different software systems often need exchange data web service method communication allows two software systems exchange data internet software system requests data called service requester whereas software system would process request provide data called service provider different software may use different programming languages hence need method data exchange n't depend upon particular programming language types software however interpret xml tags thus web services use xml files data exchange rules communication different systems need defined rules communication defined file called wsdl web services description language codice_1 extension proposals autonomous web services aws seek develop flexible web services rely strict rules directory called uddi universal description discovery integration defines software system contacted type data one software system needs one particular report/data would go uddi find systems contact receiving data software system finds systems contact would contact system using special protocol called soap simple object access protocol service provider system would first validate data request referring wsdl file process request send data soap protocol automated tools aid creation web service services using wsdl possible either automatically generate wsdl existing classes bottom-up model generate class skeleton given existing wsdl top-down model critics non-restful web services often complain complex based upon large software vendors integrators rather typical open source implementations also concerns performance due web services use xml message format soap/http enveloping transporting functional non-functional testing web services done help wsdl parsing regression testing performed identifying changes made upgrade software web service regression testing needs categorized three different ways namely changes wsdl changes code selective re-testing operations capture three needs three intermediate forms subset wsdl namely difference wsdl dwsdl unit wsdl uwsdl reduced wsdl rwsdl respectively three subset wsdls combined form combined wsdl cwsdl used regression testing web service help automated web service change management awscm performing selection relevant test cases construct reduced test suite old test suite web services testing also automated using several test automation tools like soap ui oracle application testing suite oats unified functional testing selenium etc work related capture visualization changes made web service visualization computation changes done form intermediate artifacts subset wsdl insight computation change impact helpful testing top-down development reduce regression testing awscm tool identify subset operations wsdl file construct subset wsdl | [
5014,
7170,
382,
5378,
3961,
730,
6105,
3290,
1479,
1485,
751,
7198,
7565,
5064,
59,
1125,
5075,
7934,
3326,
5428,
6142,
773,
5432,
6858,
84,
1147,
87,
5795,
7601,
92,
98,
2636,
4038,
7252,
4043,
110,
817,
5479,
3369,
3706,
5485,
1942... | Test |
6,987 | 7 | Mesh_networking:mesh networking mesh network simply meshnet local network topology infrastructure nodes i.e bridges switches infrastructure devices connect directly dynamically non-hierarchically many nodes possible cooperate one another efficiently route data from/to clients lack dependency one node allows every node participate relay information mesh networks dynamically self-organize self-configure reduce installation overhead ability self-configure enables dynamic distribution workloads particularly event nodes fail turn contributes fault-tolerance reduced maintenance costs mesh topology may contrasted conventional star/tree local network topologies bridges/switches directly linked small subset bridges/switches links infrastructure neighbours hierarchical star-and-tree topologies well established highly standardized vendor-neutral vendors mesh network devices yet agreed common standards interoperability devices different vendors yet assured mesh networks relay messages using either flooding technique routing technique routing message propagated along path hopping node node reaches destination ensure paths available network must allow continuous connections must reconfigure around broken paths using self-healing algorithms shortest path bridging self-healing allows routing-based network operate node breaks connection becomes unreliable result network typically quite reliable often one path source destination network although mostly used wireless situations concept also apply wired networks software interaction mesh network whose nodes connected fully connected network fully connected wired networks advantages security reliability problems cable affect two nodes attached however networks number cables therefore cost goes rapidly number nodes increases shortest path bridging allows ethernet switches connected mesh topology allows paths active wireless mesh radio networks originally developed military applications every node could dynamically serve router every node way even event failure nodes remaining nodes could continue communicate necessary serve uplinks nodes early wireless mesh network nodes single half-duplex radio one instant could either transmit receive time accompanied development shared mesh networks subsequently superseded complex radio hardware could receive packets upstream node transmit packets downstream node simultaneously different frequency different cdma channel allowed development switched mesh networks size cost power requirements radios declined nodes could cost-effectively equipped multiple radios turn permitted radio handle different function instance one radio client access another backhaul services work field aided use game theory methods analyze strategies allocation resources routing packets | [
7876,
3762,
6332,
6601,
6335,
3608,
7432,
7808,
7254,
5030,
6001,
6093,
2650,
7180,
8192,
7453,
4706,
1484,
1205,
2132,
1767,
3314,
7119,
1042,
427,
4378
] | Validation |
6,988 | 2 | BioLinux:biolinux biolinux term used variety projects involved making access bioinformatics software linux platform easier using one following methods various projects similar aims linux systems unices selection given also overview canadian bioinformatics helpdesk newsletter details linux-based projects package repositories generally specific distribution linux bioinformatician using number linux variants prevalent bioinformatics work fedora freely-distributed version commercial red hat system red hat widely used corporate world offer commercial support training packages fedora core community supported derivative red hat popular amongst like red hat system n't require commercial support many users bioinformatics applications produced rpms red hat package format designed work fedora potentially also install red hat enterprise linux systems distributions mandriva suse use rpms packages may also work distributions debian another popular linux distribution use many academic institutions bioinformaticians made software packages available distribution deb format slackware one less used linux distributions popular better knowledge linux operating system prefer command line various guis available packages tgz tgx format widely known live distribution based slackware slax used base many bioinformatics distributions many linux packages compatible mac os x several projects attempt make easy install selected linux packages including bioinformatics software computer running mac os x source live dvds cds ideal way provide bioinformatics computing run cd/dvd drive means slower traditional hard disk installation limited ability configured however suitable providing ad hoc solutions linux access available may even used basis linux installation general linux distributions wide range official packages available usually include much way scientific support exceptions detailed gentoo linux provides 156 bioinformatics applications see gentoo sci-biology herd main tree form ebuilds build applications source code additional 315 packages gentoo science overlay testing although flexible system excellent community support requirement install source means gentoo systems often slow install require considerable maintenance possible reduce compilation time using central server generate binary packages hand fine tune run highest speed utilizing best processor example actually use sse avx avx2 cpu instructions binary-based distro usually provide binaries using i686 even i386 instruction sets freebsd linux distribution version unix similar ports like gentoo ebuilds caveats apply however also pre-complied binary packages available 60 biological sciences applications 're listed fresh ports site hundred bioinformatics packages provided part standard debian installation nebc bio-linux packages also installed standard debian system long bio-linux-base package also installed creates /usr/local/bioinf directory packages install software debian packages may also work ubuntu linux debian-derived installations providing support documentation important part biolinux project scientists specialists may quickly find answers specific problems support forums mailing lists also useful disseminate knowledge within research community resources linked | [
7075,
2680,
213,
6586,
7108,
7778,
578
] | Test |
6,989 | 7 | Distributed_Component_Object_Model:distributed component object model distributed component object model dcom proprietary microsoft technology communication software components networked computers dcom originally called network ole extends microsoft com provides communication substrate microsoft com+ application server infrastructure addition com due extensive use dce/rpc distributed computing environment/remote procedure calls – specifically microsoft enhanced version known msrpc terms extensions added com dcom solve problems one key factors solving problems use dce/rpc underlying rpc mechanism behind dcom dce/rpc strictly defined rules regarding marshalling responsible freeing memory dcom major competitor corba proponents technologies saw one day becoming model code service-reuse internet however difficulties involved getting either technologies work internet firewalls unknown insecure machines meant normal http requests combination web browsers microsoft one point attempted failed head adding extra http transport dce/rpc called ncacn_http network computing architecture connection-oriented protocol later resurrected support microsoft exchange 2003 connection http dcom supported natively windows nt 4.0 windows 2000 windows xp windows server 2003 well windows 7 windows 8 windows 10 windows server 2008 windows server 2008 r2 windows server 2012 windows server 2012 r2 windows server 2016 part initiative began microsoft part secure development lifecycle re-architect insecure code dcom saw significant security-focused changes windows xp service pack 2 comsource source code available along full complete documentation sufficient use also implement interoperable version dcom according documentation comsource comes directly windows nt 4.0 source code even includes source code windows nt registry service wine team also implementing dcom binary interoperability purposes currently interested networking side dcom provided msrpc restricted implementing ndr network data representation microsoft api committed making compatible possible msrpc tangramcom separate project wine focusing implementing dcom linux-based smartphones samba team also implementing dcom over-the-wire interoperability purposes unlike wine team currently interested binary-interoperability samba msrpc implementation far binary-interoperable microsoft msrpc | [
7149,
7879,
3937,
3263,
6420,
714,
378,
2198,
720,
3957,
1460,
6096,
4685,
2928,
7907,
1475,
5747,
7553,
7195,
5410,
7564,
2953,
6840,
422,
6844,
1126,
6136,
1128,
2245,
435,
5442,
4377,
4017,
3340,
5090,
6504,
7602,
4022,
4026,
7607,
1... | Test |
6,990 | 6 | Ncdu:ncdu ncdu ncurses disk usage disk utility unix systems name refers similar purpose du utility ncdu uses text-based user interface n curses programming library users navigate list using arrow keys delete files taking much space pressing 'd key version 1.09 later export file listing json format ncdu developed yoran heling learn c serve disk usage analyzer remote systems ssh | [
7214,
5571,
6404,
578,
1435
] | Validation |
6,991 | 2 | ActiveX:activex activex software framework created microsoft adapts earlier component object model com object linking embedding ole technologies content downloaded network particularly world wide web microsoft introduced activex 1996 principle activex dependent microsoft windows operating systems practice activex controls run windows also require client running x86-based computer activex controls contain compiled code activex still supported windows 10 internet explorer 11 activex supported default web browser microsoft edge different incompatible extension system compatible new chromium-based microsoft edge using ie mode activex one major technologies used component-based software engineering compared javabeans activex supports programming languages javabeans supports platforms activex supported many rapid application development technologies active template library delphi javabeans microsoft foundation class library qt visual basic windows forms wxwidgets enable application developers embed activex controls products many microsoft windows applications—including many microsoft internet explorer microsoft office microsoft visual studio windows media player—use activex controls build feature-set also encapsulate functionality activex controls embedded applications internet explorer also allows embedding activex controls web pages faced complexity ole 2.0 poor support com mfc microsoft simplified specification rebranded technology activex 1996 even simplification users still required controls implement six core interfaces response complexity microsoft produced wizards atl base classes macros c++ language extensions make simpler write controls starting internet explorer 3.0 1996 microsoft added support host activex controls within html content browser encountered page specifying activex control via codice_1 tag would automatically download install control little user intervention made web richer provoked objections since controls practice ran windows separate controls required supported platform one windows 3.1/windows nt 3.51 one windows nt/95 one macintosh f68k/powerpc security risks especially given lack user intervention microsoft subsequently introduced security measures make browsing including activex safer example activex controversial start microsoft claimed programming ease good performance compared java applets marketing materials critics activex quick point security issues lack portability making impractical use outside protected intranets activex security model relied almost entirely identifying trusted component developers using code signing technology called authenticode developers register verisign us 20 per year individuals 400 corporations sign contract promising develop malware identified code would run inside web browser full permissions meaning bug code potential security issue contrasts sandboxing already used java time october 1996 microsoft released beta version activex software development kit sdk macintosh including plug-in netscape navigator mac announced plan support activex solaris later year six months two beta releases later yet commercially available macintosh activex plugins 1997 ncompass labs cooperation microsoft released plug-in netscape navigator support activex documentation activex core technology resides open group may downloaded free despite microsoft previous efforts make activex cross-platform activex controls work platforms using activex controls implement essential functionality web page restricts usefulness south korea started remove technology public websites order make web site accessible platforms microsoft made significant effort push cross-platform aspect activex way publishing api ultimately cross-platform effort failed due activex controls written c c++ compiled intel x86 assembly language making executable windows machines call standard win32 apis microsoft dropped activex support windows store edition internet explorer 10 windows 8 2015 microsoft released microsoft edge replacement internet explorer support activex marked end technology microsoft web browser development may always possible use internet explorer execute activex content e.g. wine installation may user want microsoft developed large number products software platforms using activex objects still used e.g. websites still use asp | [
7149,
7879,
5721,
3937,
3263,
6420,
714,
4674,
378,
2198,
720,
3955,
5378,
1460,
6096,
1840,
7176,
2928,
3290,
5745,
1475,
5747,
7907,
2577,
7553,
4704,
7195,
5410,
7564,
2953,
6840,
422,
61,
6844,
1128,
1499,
2245,
5432,
435,
6495,
685... | Test |
6,992 | 6 | PowerArchiver:powerarchiver powerarchiver proprietary file archiver microsoft windows developed conexware inc supports full read-write access several different archive formats including zip 7z tar additionally read-only decompression support includes rar ace various disk image formats evaluation version program remains functional 40 days personal licenses currently permitted free lifetime updates future versions software business license valid two major versions powerarchiver first public release made march 1999 advertised free archiving solution written borland delphi turned shareware june 2001 version 7 prior powerarchiver software known easyzip command line version microsoft outlook plugin also provided powerarchiver user interface translated 15 languages latest release powerarchiver fully supports windows 7 provides user option use ribbon gui featured microsoft office 2007 windows 7 users revert old-style toolbar wish 2011 softpedia gave five stars praising wide support various compressed file types ftp backup feature pointing lack complete support vhd files later 2013 download.com gave five stars | [
4213,
7058,
985,
4759,
1352,
5571,
658,
4700,
1955,
7746,
3032,
7201,
7387,
3219,
510,
8126,
1127,
2334,
4360,
6940,
4732,
5256,
73,
3152,
169,
1139,
5349,
4461,
2897,
619
] | Test |
6,993 | 8 | Geliyoo:geliyoo geliyoo bilişim turkish multinational corporation specializing internet-related services products include search cloud computing software online advertising technologies geliyoo founded hakan atabaş graduated odtü fatih arslan m.s students texas tech university enhance search technologies turkey goal geliyoo developed team turkish engineers also geliyoo wants gain love turkish people leading field incorporated geliyoo privately held company april 5 2012 mission statement organize secure world information make globally accessible useful unofficial motto new technology geliyoo known €741,000 spent developed geliyoo without income ads till 2012 first award given two categories e-innovation e-telecommunication informatics association turkey geliyoo search web search engine company popular service geliyoo developed search engine crawler geliyoo spider geliyoobot/1.0 developed geliyoo first turkish search engine bot geliyoobot/1.0 builds searchable index geliyoo search engine webmaster wishes restrict information site available geliyoobot another well-behaved spider appropriate directives robots.txt file adding meta tag codice_1 web page geliyoo spider requests web servers identifiable user-agent string containing geliyoobot host address containing geliyoo.com geliyoo directory project gmoz gmoz.geliyoo.com original domain name multilingual open content directory world wide web links owned geliyoo constructed maintained community volunteer editors gmoz uses hierarchical ontology scheme organizing site listings listings similar topic grouped categories include smaller categories gmoz helps geliyoo search results geliyoo news free news aggregator provided operated geliyoo selecting up-to-date information thousands publications automatic aggregation algorithm service covers news articles appearing within past 30 days various news websites geliyoo maps web mapping service application technology provided geliyoo powers many map-based services including geliyoo maps website includes traffic offers street maps route planner traveling car geliyoo maps uses tom tom base maps geliyoo also develops first turkish web browser called geliyoo browser offers powerful browsing together built-in media downloading sharing features geliyoo browser based chromium technology platform supports torrent files tells geliyoo browser combines oracle java semantic web web 3.0 technologies | [
2961,
84
] | Test |
6,994 | 2 | TRON_project:tron project tron acronym real-time operating system nucleus open architecture real-time operating system kernel design project started prof. dr. ken sakamura university tokyo 1984 project goal create ideal computer architecture network provide society needs industrial tron itron derivative one world used operating systems 2003 present billions electronic devices mobile phones appliances even cars although mainly used japanese companies garnered interest worldwide however dearth quality english documentation said hinder broader adoption tron project integrated t-engine forum 2010 today supported popular ssl/tls libraries wolfssl tron specify source code kernel instead set interfaces design guidelines creating kernel allows different companies create versions tron based specifications suited different microprocessors specification tron publicly available implementations proprietary discretion implementer tron framework defines complete architecture different computing units 1984 tron project officially launched 1985 nec announced first itron implementation based itron/86 specification 1986 tron kyogikai unincorporated tron association established hitachi announced itron implementation based itron/68k specification first tron project symposium held 1987 fujitsu announced itron implementation based itron/mmu specification mitsubishi electric announced itron implementation based itron/32 specification hitachi introduced gmicro/200 32bit microprocessor based tron vlsi cpu specification 2004 governor tokyo shintaro ishihara mentioned tron killed former minister international trade industry hashimoto time pressure united states story supported article website dedicated tron project citing microsoft lobbying result threat super-301 complete stop import based section 301 omnibus trade competitiveness act 1988 everything related tron led many companies dropping tron fear lose possibility export united states tron project administered tron association integrated t-engine forum 2010 tron project activities taken continued t-engine forum t-engine forum non-profit organization develops open specifications itron t-kernel ubiquitous id architecture chair t-engine forum dr. ken sakamura july 2011 266 members t-engine forum executive committee members includes top japanese giants like fujitsu hitachi ntt docomo denso a-level members involved design development specifications t-engine t-kernel ubiquitous id technology include companies esol nec yamaha corporation b-level members involved development product using t-engine specification t-kernel include companies like arm freescale mips technologies mitsubishi robert bosch gmbh sony corporation toshiba xilinx supporting members academic members involved forum include many universities university tokyo japan dalian maritime university china microscript programming language graphically-oriented high-level programming language created personal media corporation tron similar apple computer hypertalk intended mainly end users little programming experience yet also used development tool professional btron programmers port software tron variants easily quickly write device drivers hardware devices microscript based makes extensive use tron basic text editor basic figure editor | [
7605,
3169,
4482,
5110,
5822,
5571,
4336,
224,
6918,
4890,
6922,
238,
7396,
4631,
3664,
861,
771,
7312,
7950
] | Test |
6,995 | 9 | Programming_Computable_Functions:programming computable functions computer science programming computable functions pcf typed functional language introduced gordon plotkin 1977 based previous unpublished material dana scott considered extended version typed lambda calculus simplified version modern typed functional languages ml haskell fully abstract model pcf first given milner 1977 however since milner model essentially based syntax pcf considered less satisfactory ong 1995 first two fully abstract models employing syntax formulated 1990s models based game semantics hyland ong 2000 abramsky jagadeesan malacaria 2000 kripke logical relations o'hearn riecke 1995 time felt neither models completely satisfactory since effectively presentable however ralph loader demonstrated effectively presentable fully abstract model could exist since question program equivalence finitary fragment pcf decidable types pcf inductively defined context list pairs x σ x variable name σ type variable name duplicated one defines typing judgments terms-in-context usual way following syntactical constructs relatively straightforward semantics language scott model model model fully abstract pcf fully abstract language obtained adding parallel operator pcf p. 293 hyland ong 2000 reference | [
7009,
4405,
2740,
1274,
7707,
3895,
2778
] | Test |
6,996 | 7 | SparkleShare:sparkleshare sparkleshare open-source cloud storage file synchronization client app default uses git storage backend sparkleshare comparable dropbox cloud storage provided user server hosted solution github advantage self-hosting user retains absolute control data simplest case self-hosting requires ssh git sparkleshare support android ios devices hold due lack developer resources | [
4594,
7214,
3172,
5571,
7848,
578,
5889
] | Test |
6,997 | 8 | CURL:curl curl pronounced 'curl computer software project providing library libcurl command-line tool curl transferring data using various protocols first released 1997 name stands client url original author lead developer swedish developer daniel stenberg libcurl free client-side url transfer library supporting cookies dict ftp ftps gopher http/1 http/2 support http post http put http proxy tunneling https imap kerberos ldap pop3 rtsp scp smtp library supports file uri scheme sftp telnet tftp file transfer resume ftp uploading http form-based upload https certificates ldaps proxies user-plus-password authentication libcurl library portable builds works identically many platforms including aix amigaos android beos blackberry tablet os blackberry 10 openvms darwin dos freebsd hp-ux hurd ios irix linux macos netbsd netware openbsd os/2 qnx neutrino risc os solaris symbian tru64 ultrix unixware microsoft windows libcurl library free thread-safe ipv6 compatible bindings available 40 languages including c/c++ java php python libcurl library support axtls gnutls mbed tls nss qsossl ibm schannel windows secure transport macos ios ssl/tls openssl wolfssl curl command-line tool getting sending data including files using url syntax since curl uses libcurl supports range common network protocols currently including http https ftp ftps scp sftp tftp ldap dap dict telnet file imap pop3 smtp rtsp last four versions newer 7.20.0 9 february 2010 curl supports https performs ssl certificate verification default secure protocol specified https curl connects remote server via https obtain remote server certificate check ca certificate store validity remote server ensure remote server one claims curl packages bundled ca certificate store file several options specify ca certificate -- cacert -- capath -- cacert option used specify location ca certificate store file windows platform ca certificate file specified curl look ca certificate file name “ curl-ca-bundle.crt ” following order curl return error message remote server using self-signed certificate remote server certificate signed ca listed ca cert file -k -- insecure option used skip certificate verification alternatively remote server trusted remote server ca certificate added ca certificate store file basic use curl involves simply typing curl command line followed url output retrieve curl defaults displaying output retrieves standard output specified system usually terminal window running command would systems display www.example.com source-code terminal window -o flag used store output file instead options change tool behavior available | [
363,
1812,
6088,
1460,
7537,
6458,
1140,
80,
4387,
4759,
2999,
6531,
5480,
6908,
5138,
3383,
7272,
1213,
3417,
5181,
1989,
8039,
4464,
900,
5570,
5571,
578,
3797,
5234,
5942,
7765,
4547,
5965,
1710,
2086,
2811,
3172,
2467,
2834,
8189,
4... | Validation |
6,998 | 4 | Domain_Based_Security:domain based security domain based security abbreviated dbsy model-based approach help analyse information security risks business context provide clear direct mapping risks security controls needed manage variant approach used uk government hmg infosec standard no.1 technical risk-assessment method dbsy registered trade mark qinetiq ltd. dbsy developed late 1990s defence evaluation research agency dera model-based approach information assurance describes requirements security organisation taking account business needs supported model based around concept security domain represents logical place people work information using computer system connections security domains necessary support business activity hence focus information needs protection people work people exchange information model also describe physical environments people work system boundaries major system security measures placed systematic method applied model identify describe risks valuable information assets exposed specify security measures effective managing risks dbsy origins late 1990s developed defence evaluation research agency dera ministry defence mod initially called domain based approach developed alongside purple penelope support mod increasing need interconnections systems operating different security levels recognised risks associated connections directly related nature information exchange needed effective model understanding managing risks would need take account business needs information sharing also recognised controlled release information system handling secret information sometimes referred time 'down grading 'sanitisation adequately described existing models information security notably bell-lapadula biba associated information flow models information flow models found unhelpful understanding risks information shared people systems entirely trusted effective model understanding managing risks would need take account business needs exchanging information within outside organisation modelling technique applied major projects mod result experience graphical modelling techniques revised rigorous risk assessment method based concepts compromise paths developed approach security documentation project lifecycle also created domain based security conferences held qinetiq malvern june 2005 june 2006 promoting discussion could widely used defence commercial systems variant dbsy method subsequently developed incorporated uk government hmg infosec standard no.1 technical risk assessment method standard method used security risk assessments government information technology systems dbsy approach uses simple models represent requirements security organisation using two different related viewpoints infosec business model represents security aspects business infosec infrastructure model represents logical provision strong boundaries enforce separation combined make infosec architecture model model forms basis conducting systematic rigorous risk assessment infosec business model defines security domains connections model specifies limits information processed exchanged security domains forms set security requirements business particular connections explicitly modelled permitted required occur security domain characterised set information assets may valuable organisation well people work information applications services act behalf connections domains characterised nature interaction required interpersonal messages shared access database sensitivity integrity requirements information exchange model also represent kinds physical environment domain accessed infosec infrastructure model defines islands computing infrastructure required logically separate information exchanged except identifiable manageable points connection referred causeways island characterised strength separation islands people manage computing infrastructure infosec architecture model combines business infrastructure views showing security domains supported islands infrastructure connections security domains hosted different islands connections must supported appropriate causeway dbsy method uses rational risk framework describing risks information assets exposed similar kinds assets grouped together focus interest risk assessment process applied focus interest turn key factors determining risk particular focus interest risk framework applied systematic fashion organisation-specific infosec architecture model representing security-relevant features organisation business systems process set compromise paths systematically described relative effectiveness different countermeasures assessed dbsy differs risk management methods primary focus people business drivers organisation way business works rather technical security measures analyst required systematically define groups people pose threat ways might cause harm providing rigorous business-oriented framework concepts threat vulnerability aim understand analyse information security risks faced organisation especially risks appear conflict needs business efficiency across organisation dealings customers business partners | [
2384,
429,
3932,
7815,
5568,
8091,
8191,
6189,
3112
] | Test |
6,999 | 5 | Venturi_Transport_Protocol:venturi transport protocol venturi transport protocol vtp patented proprietary transport layer protocol designed transparently replace tcp order overcome inefficiencies design tcp related wireless data transport owned venturi wireless protocol employed various wireless broadband internet service providers verizon wireless unwired unwired calls venturi client application provides transparent vtp connectivity unwired optimizer order speed network overcome latency issues | [
7148,
456,
6879,
2281,
6521,
6976,
3775,
3855,
2644,
7170,
6531,
1462,
2650,
7637,
2119,
6908,
7091,
3383,
3640,
2219,
3797,
2043,
3312,
2057,
3819,
3820,
3821,
7214,
7217,
7765,
259,
5880
] | Validation |
7,000 | 2 | System_Integrity_Protection:system integrity protection system integrity protection sip sometimes referred rootless security feature apple macos operating system introduced os x el capitan comprises number mechanisms enforced kernel centerpiece protection system-owned files directories modifications processes without specific entitlement even executed root user user root privileges sudo apple says root user significant risk factor system security especially systems single user account user also administrator system integrity protection enabled default disabled apple says system integrity protection necessary step ensure high level security one wwdc developer sessions apple engineer pierre-olivier martel described unrestricted root access one remaining weaknesses system saying piece malware one password vulnerability away taking full control device stated installations macos one user account necessarily carries administrative credentials means users grant root access program asks whenever user system prompted enters account password – martel says often weak non-existent – security entire system potentially compromised restricting power root unprecedented macos instance versions macos prior mac os x leopard enforce securelevel security feature originates bsd derivatives upon macos partially based system integrity protection comprises following mechanisms system integrity protection protects system files directories flagged protection happens either adding extended file attribute file directory adding file directory among protected directories symbolic links also protected although target directories protected preinstalled apple applications protected well kernel stops processes without specific entitlements modifying permissions contents flagged files directories also prevents code injection runtime attachment dtrace respect protected executables since os x yosemite kernel extensions drivers code-signed particular apple entitlement developers request developer id entitlement apple kernel refuses boot unsigned extensions present showing user prohibition sign instead mechanism called kext signing integrated system integrity protection system integrity protection disabled either wholly partly outside system partition end apple provides command-line utility executed terminal window within recovery system bootable macos installation disk adds boot argument device nvram applies setting installations el capitan macos sierra device upon installation macos installer moves unknown components within flagged system directories preventing write access system directories system file directory permissions maintained automatically apple software updates result permissions repair available disk utility corresponding operation reception system integrity protection mixed macworld expressed concern apple could take full control away users developers future releases move security policy macos slowly toward apple mobile operating system ios whereupon installation many utilities modifications requires jailbreaking applications drivers work full extent operated unless feature disabled either temporarily permanently ars technica suggested could affect smaller developers disproportionately larger ones may able work apple directly however also remarked far users including power users reason turn feature saying almost downsides | [
3932,
3940,
713,
3626,
4690,
734,
6832,
3989,
2597,
3322,
1502,
5786,
4740,
1897,
4376,
6505,
2627,
3685,
7609,
1171,
5109,
2284,
3697,
1178,
6188,
1187,
1562,
6909,
6548,
502,
6557,
2679,
1582,
6565,
2329,
3050,
163,
6582,
8037,
5535,
... | Test |
7,001 | 2 | APUS_Group:apus group apus group commonly termed apus founded june 2014 tao li chinese technology company specializing android development information services company main product apus user system also known apus launcher drawn 1 billion users globally 2016 along apus series products including apus user system apus booster+ apus browser apus message center apus flashlight etc covering 200 countries six continents according tao li ceo apus 90 percent users countries beyond china one world top 10 developers mobile applications name apus short perfect user system also refers bird species apodidae swift highly aerial bird family fastest fliers animal kingdom maximum speed june 2014 tao li founded apus group beijing month apus netted 100 million rmb series funding july 2 2014 apus launcher released google play 28 days later apus user group reached 10 million october 22 2014 apus announced 50 million user globally december 1 2014 apus published first apus global mobile application analysis report january 2015 apus picked 100 million usd series b funding become youngest unicorn companies market values usd 1 billion world january 2015 apus user group reached 100 million march 2015 apus user group reached 150 million named fifth developer world app annie may 2015 apus user group reached 300 million may 2015 apus browser released september 2015 apus announced ’ netted 250 million users globally apus user system apus launcher 510 million apus user system apus launcher apus series products time market value reached usd 1.5 billion september 2015 apus announced long-term partnership inmobi decision entry india market october 2015 apus announced entry japanese korean market december 2015 apus announced usd 45 million rs 300 crore indian mobile web companies march 2016 apus announced acquired 920 million downloads apus series products including apus user system apus booster apus browser apus browser turbo apus flashlight etc october 2016 forbes reported leading position apus group google play store praised apus group advanced business model successful monetization november 2016 apus announced fresh investment us 44 million india new research development center sales business development office gurgaon startup incubator | [
3310
] | Validation |
7,002 | 7 | IEEE_Cloud_Computing:ieee cloud computing ieee cloud computing global initiative launched ieee promote cloud computing big data related technologies provide expertise resources individuals enterprises involved cloud computing 2010 institute electrical electronics engineers ieee sponsored two cloud computing–specific conferences ieee cloud ieee cloudcom success two conferences ieee senior member ieee computer society past president steve diamond began urging organization take active role development cloud computing standards april 2011 support ieee future directions committee funding ieee new initiatives committee ieee cloud computing launched initiative designed follow multi-year plan includes focus across multiple tracks conferences education publications standards intercloud testbed web portal marketing public relations part initiative launch two new cloud computing standards development projects approved ieee p2301 draft guide cloud portability interoperability profile ieee p2302 draft standard intercloud interoperability federation siif growing need greater cloud computing interoperability federation ieee cloud computing focused development activities resources behind ieee p2302 standard ieee cloud computing continues pursue efforts provide cloud computing standards advancement cloud computing technologies educate users benefits cloud computing part ongoing effort offers variety activities products services including ieee cloud computing portal conferences events continuing education courses publications standards ieee intercloud testbed platform testing cloud computing interoperability ieee cloud computing portal serves online hub cloud computing resources site includes news information form ieee press releases well articles taken ieee third-party publications portal provides dedicated sections conferences events education careers publications standards ieee intercloud testbed innovations part mandate ieee cloud computing process developing global cloud computing standards april 2011 began working first ieee cloud computing standards ieee p2301 ieee p2302 ieee p2301 draft guide cloud portability interoperability profile ieee p2302 draft standard intercloud interoperability federation address cloud interoperability portability fragmentation ieee p2301 guide cloud portability interoperability profiles cpip working group formed february 24 2014 mandate develop guide cloud portability interoperability profiles completed guide advise cloud computing ecosystem participants cloud vendors service providers end users available standards-based choices areas like application portability management interoperability interfaces file formats operation conventions guide group choices multiple logical profiles organized address different cloud personalities john messina senior member national institute standards technology nist cloud computing program chair ieee p2301 guide cloud portability interoperability profiles working group april 4 2011 ieee p2302 draft standard intercloud interoperability federation working group formed finalized approved ieee p2302 define topology protocols functionality governance cloud-to-cloud interoperability federated operations ieee cloud computing also formed new ieee adaptive management cloud computing amcc study group december 16 2013 group purpose investigate management environments needed support dynamic nature cloud computing environments services provide customers consume services providers offering services also explore potential application adaptive policy-based management cloud based environments including adaptive management architectures environments adaptive security management auto-generation management policies business specifications auto-generation data support management functionality co-generation application management functionality joel fleck senior standards architect hp labs study group chair ieee cloud computing sponsors participates cloud computing-focused conferences events around world designed promote knowledge-sharing cloud computing events typically range one day week attract global audience conference event programs generally offer multiple educational tracks keynote speeches panel discussions roundtables led industry notables researchers engineers academics policymakers key stakeholders early january 2012 ieee cloud computing began partnering established conference develop matrix events targeted specific geographic regions ieee globecom 2013 held atlanta georgia co-located north america cloud congress initiative organizing additional cloud congresses european asia pacific latin america regions encourage greater focus cloud computing via existing well-established conference ieee signature conference computers software applications compsac ieee international conference cloud computing technology science ieee cloudcom ieee global communications conference exhibition industry forum globecom create new cloud computing-related events specific geographic regions ieee cloud computing offers continuing education courses e-learning modules videos conference section chapter talks participating societies organizations active ieee cloud computing include | [
2961
] | Test |
7,003 | 2 | History_of_IBM_mainframe_operating_systems:history ibm mainframe operating systems history operating systems running ibm mainframes notable chapter history mainframe operating systems ibm long-standing position world largest hardware supplier mainframe computers arguably operating systems ibm supplied customers use early mainframes seldom innovative except virtual machine systems beginning cp-67 company well-known reputation preferring proven technology generally given potential users confidence adopt new ibm systems fairly quickly ibm current mainframe operating systems z/os z/vm z/vse z/tpf backward compatible successors operating systems introduced 1960s although course improved many ways ibm-supplied operating systems supplied others discussed notably used ibm mainframes ibm slow introduce operating systems general motors produced general motors os 1955 gm-naa i/o 1956 use ibm computers 1962 burroughs corporation released mcp general electric introduced gecos cases use customers fact first operating systems ibm computers written ibm customers wish expensive machines us 2m mid-1950s sitting idle operators set jobs manually wanted mechanism maintaining queue jobs operating systems described ran processor models suitable scientific engineering calculations users ibm computers applications manage without operating systems one ibm smaller computers ibm 650 introduced feature later became part os/360 processing interrupted random processing error hardware glitch machine could automatically resume last checkpoint instead requiring operators restart job manually beginning general motors research division produced gm-naa i/o ibm 701 1956 prototype gm operating system developed 1955 updated 701 successor 1960 ibm user association share took produced updated version share operating system finally ibm took project supplied enhanced version called ibsys ibm 7090 ibm 7094 computers ibsys required 8 tape drives fewer system one disk drives main components card-based job control language main user interface compilers fortran cobol assembler various utilities including sort program 1958 university michigan executive system adapted gm-naa i/o produce umes better-suited large number small jobs created students umes used 1967 replaced mts timesharing system bell labs produced besys sometimes referred bellmon used mid-1960s bell also made available others without charge formal technical support ibsys ibm produced ibm 709 7090 7094 computers tape-based operating system whose sole purpose compile fortran programs—in fact fms fortran compiler tape mit fernando corbató produced first experimental time-sharing systems ctss 1957 early 1960s using slightly modified ibm 704 ibm 7090 mainframes systems based proposal john mccarthy 1960s ibm laboratories created experimental time-sharing systems using standard mainframes hardware microcode modifications support virtual memory ibm m44/44x early 1960s cp-40 1964 1967 cp-67 1967 1972 company even released cp-67 without warranty technical support several large customers 1968 1972 cp-40 cp-67 used modified system/360 cpus m44/44x based ibm 7044 earlier generation cpu different internally experimental systems late incorporated system/360 series ibm announced 1964 encouraged company add virtual memory virtual machine capabilities system/370 mainframes operating systems 1972 1968 consulting firm called computer software systems used released version cp-67 set commercial time-sharing service company technical team included 2 recruits mit see ctss dick orenstein harold feinleib grew company renamed national css modified software increase number paying users could support system sufficiently different warranted new name vp/css vp/css delivery mechanism national css services early 1980s switched ibm vm/370 see universities produced three s/360 time-sharing operating systems late 1960s early 1960s ibm low-end high-end systems incompatible programs could easily transferred one another systems often used completely different peripherals e.g disk drives ibm concluded factors increasing design production costs hardware software level unsustainable reducing sales deterring customers upgrading 1964 company announced system/360 new range computers used peripherals could run programs ibm originally intended system/360 one batch-oriented operating system os/360 least two accounts ibm later decided also produce simpler batch-oriented operating system dos/360 system/360 operating systems complex previous ibm operating systems several reasons including made development os/360 system/360 software one largest software projects anyone attempted ibm soon ran trouble huge time cost overruns large numbers bugs problems magnified develop test system/360 operating systems real hardware ibm first develop basic programming support bps bps used develop tools needed develop dos/360 os/360 well first versions tools would supply operating systems compilers fortran cobol utilities including sort assembler needed build software ibm competitors took advantage delays os/360 system/360 announce systems aimed thought vulnerable parts ibm market prevent sales system/360 collapsing ibm released four stop-gap operating systems ibm announced s/360-67 also announced timesharing operating system tss/360 would use new virtual memory capabilities 360/67 tss/360 late unreliable ibm canceled time alternative operating system cp-67 developed ibm cambridge scientific center running well enough ibm offer without warranty timesharing facility large customers cp-67 would go become vm/370 eventually z/vm traumas producing system/360 operating systems gave boost emerging discipline software engineering attempt apply scientific principles development software management software projects frederick p. brooks senior project manager whole system/360 project given specific responsibility os/360 already long overdue wrote acclaimed book mythical man-month based problems encountered lessons learned project two os/360 preferred operating system higher-end system/360 machines dos/360 usual operating system less powerful machines provided set utility programs macro assembler compilers fortran cobol support rpg came later eventually pl/i subset supported useful range file organizations access methods help using sequential isam files could store either fixed-length variable-length records types could occupy one disk volume dos/360 also offered btam data communications facility primitive hard use today standards btam could communicate almost type terminal big advantage time hardly standardization communications protocols dos/360 significant limitations compared os/360 used control larger system/360 machines ibm expected dos/360 users would soon upgrade os/360 despite limitations dos/360 became world widely used operating system dos/360 ran well system/360 processors medium-sized organizations could afford better operating systems customers result descendant z/vse still widely used today 2005 os/360 included multiple levels support single api much shared code pcp stop-gap version could run one program time mft multiprogramming fixed number tasks mvt multiprogramming variable number tasks used least late 1970s good five years successors launched unclear whether divisions among pcp mft mvt arose mvt required much memory usable mid-range machines ibm needed release multiprogramming version os mft soon possible pcp mft mvt different approaches managing memory see provided similar facilities experience indicated advisable install os/360 systems less 256 kb memory common limitation 1960s installing mft customers would specify five partitions areas memory fixed boundaries application programs could run simultaneously mft version ii mft-ii raised limit 52 mvt considerably larger complex mft therefore used powerful system/360 cpus treated memory used operating system single pool contiguous regions could allocated required indefinite number simultaneous application programs scheme flexible mft principle used memory efficiently liable fragmentation one could find although enough spare memory total run program divided separate chunks none large enough 1971 time sharing option tso use mvt added tso became widely used program development provided editor ability submit batch jobs notified completion view results without waiting printed reports debuggers programming languages used system/360 tso communicated terminals using tcam telecommunications access method eventually replaced earlier queued telecommunications access method qtam tcam name suggests ibm hoped would become standard access method data communications fact tcam used almost entirely tso largely superseded vtam late 1970s onwards system/360 hardware operating systems designed processing batch jobs extreme cases might run hours result unsuitable transaction processing thousands units work per day takes 30 seconds minutes 1968 ibm released ims handle transaction processing 1969 released cics simpler transaction processing system group ibm staff developed customer ims available os/360 successors cics also available dos/360 successors many years type product known tp teleprocessing monitor strictly speaking tp monitors operating system components application programs managed application programs 1970s 1980s several third-party tp monitors competed cics notably taskmaster shadow intercomm ibm gradually improved cics point customers abandoned alternatives 1950s airlines expanding rapidly growth held back difficulty handling thousands bookings manually using card files 1957 ibm signed development contract american airlines development computerized reservations system became known sabre first experimental system went live 1960 system took booking functions 1964 cases using ibm 7090 mainframes early 1960s ibm undertook similar projects airlines soon decided produce single standard booking system pars run system/360 computers sabre early versions pars separation application operating system components software 1968 ibm divided pars application acp operating system later versions acp named acp tpf tpf transaction processing facility non-airline businesses adopted operating system handling large volumes online transactions latest version z/tpf ibm developed acp successors mid-1960s ibm standard operating systems dos/360 os/360 batch-oriented could handle large numbers short transactions quickly enough even transaction monitors ims cics run control standard general-purpose operating systems fast enough handling reservations hundreds flights thousands travel agents last public domain version acp hence last free version acp 9.2 distributed single mini-reel accompanying manual set two dozen manuals occupied perhaps 48 lineal inches shelf space could restored ibm 3340 disk drives would thereby provide fully functional acp system acp 9.2 intended primarily bank card mastercard et al financial applications could also utilized airlines reservation systems time acp become general-purpose os indeed acp incorporated hypervisor module chyr supported virtual os ... usually vs1 possibly also vs2 ... guest program development file maintenance could accomplished concurrently on-line functions instances production work run vs2 hypervisor including possibly ims db model 20 labeled part system/360 range could connected peripherals 16-bit machine entirely program-compatible members system/360 range three operating systems developed ibm labs germany different 360/20 configurations dps—with disks minimum memory required 12 kb tps—no disk tapes minimum memory required 8 kb cps—punched-card-based minimum memory required 4 kb direct successors since ibm introduced system/3 range small business computers 1969 system/3 different internal design 360/20 different peripherals ibm mainframes another processor used system/360 peripherals different internal design 360/44 designed scientific computation using floating point numbers geological meteorological analyses internal differences specialized type work designed 360/44 operating system ps/44 emulator missing system/360 instructions allowed model 44 run os/360 360/44 ps/44 direct successors system/370 announced 1970 offered essentially facilities system/360 4 times processor speeds similarly-priced system/360 cpus 1972 ibm announced system/370 advanced functions main item future sales system/370 would include virtual memory capability could also retro-fitted existing system/370 cpus hence ibm also committed delivering enhanced operating systems could support use virtual memory new operating systems distinguished predecessors presence /vs names vs stands virtual storage ibm avoided term virtual memory allegedly word memory might interpreted imply ibm computers could forget things today ibm mainframe operating systems except z/tpf descendants included system/370 advanced functions announcement z/tpf descendant acp system ibm initially developed support high-volume airline reservations applications dos/vs successor dos/360 addition virtual memory dos/vs provided enhancements dos/vs followed significant upgrades dos/vse vse/sp 1980s vse/esa 1991 z/vse 2005 os/vs1 successor mft offered similar facilities addition virtual memory ibm released fairly minor enhancements os/vs1 1983 1984 announced would os/vs1 tss/370 ibm system/370 operating systems modern descendants special real time operating system srtos programming rpq z06751 variant os/vs1 extended support real-time computing targeted industries electric utility energy management oil refinery applications os/vs2 release 1 svs replacement mvt virtual memory many changes retained overall structure 1974 ibm released described os/vs2 release 2 major rewrite upwards-compatible earlier os/vs2 svs new system noticeable feature supported multiple virtual address spaces different applications thought using range virtual addresses new system virtual memory facilities mapped different ranges real memory addresses result new system rapidly became known mvs multiple virtual storages original os/vs2 became known svs single virtual storage ibm accepted terminology labelled mvs successors mvs/ ... distinctive features mvs main catalog vsam catalog supported tightly-coupled multiprocessing 2 cpus share memory copy operating system included system resources manager renamed workload manager later versions allowed users load additional work system without reducing performance high-priority jobs ibm released several mvs upgrades mvs/se mvs/sp version 1 mvs/xa 1981 mvs/esa 1985 os/390 1996 currently z/os 2001 vm/370 combined virtual machine facility single-user system called conversational monitor system cms combination provided time-sharing allowing user run copy cms virtual machine combination direct descendant cp/cms virtual machine facility often used testing new software normal production work continued another virtual machine cms timesharing system widely used program development vm/370 followed series upgrades vm/sepp systems extensions program product vm/bsepp basic systems extensions program product vm/sp system product vm/sp hpo high performance option vm/xa extended architecture migration aid vm/xa sf extended architecture system facility vm/xa sp extended architecture system product vm/esa enterprise systems architecture z/vm ibm also produced optional microcode assists vm successors speed hypervisor emulation privileged instructions operating systems use behalf guest operating systems part 370/extended architecture ibm added start interpretive execution sie instruction allow speedup cp hypervisor time-sharing timesharing based idea computers much faster humans one human user reading computer displayed screen computer useful work another user large time-sharing systems hundreds even thousands simultaneous users memory required programs data generally adds much physical memory attached computer time-sharing systems solve problem various combinations virtual memory memory management technique programs made work memory available actually attached computer running programs code data may scattered several areas physical memory even placed disk needed main components ibm virtual memory system functioning properly virtual memory system keeps active pages real memory inactive ones disk allows efficient execution systems workload virtual machine techniques enable several operating systems guest operating systems software run computer thinks whole computer simulated whole computers called virtual machine operating system really controls computer usually called hypervisor two major components hypervisor | [
5012,
7512,
4662,
4299,
4670,
3268,
3951,
5041,
7546,
3633,
5396,
402,
1855,
5764,
3990,
6838,
6130,
6849,
4366,
6497,
1516,
2266,
1522,
7605,
2633,
6518,
3005,
4408,
5481,
7264,
6543,
4798,
839,
4428,
5852,
6213,
850,
6586,
1994,
7331,
... | Test |
7,004 | 6 | DiskXtender:diskxtender emc diskxtender also known dx automated policy-based file system-centric product migrating inactive data higher-cost storage lower-cost disk tape optical devices hierarchical storage management diskxtender produced emc corporation supported windows linux unix environments windows version dx implements file-system filter driver intercepts user mode i/o requests intercepted requests processed dx components necessary files fetched secondary storage media passed back calling applications otherwise processing necessary filter driver nothing simply passes request stack lower level drivers applications implement similar architecture terms file system filters include anti-virus file system replication software 2003 diskxtender one three information lifecycle management offerings emc emc acquired legato system remaining products emailxtender databasextender archive email databases correspondingly diskxtender intercepting i/o operating system capable detecting inactive data migrating data secondary and/or tertiary storage lower cost/gbs still maintaining transparency applications end users applications end users full visibility migrated data access requested migrated data either redirected users applications copied back production system various times rumors end life diskxtender related products | [
4759,
578
] | Test |
7,005 | 9 | Evaluation_strategy:evaluation strategy evaluation strategies used programming languages determine evaluate argument function call function also read operation method relation kind value pass function example call value/call reference specifies function application evaluates argument proceeds evaluation function body passes two capabilities function namely ability look current value argument modify via assignment statement notion reduction strategy lambda calculus similar distinct practical terms many modern programming languages converged call-by-value/call-by-reference evaluation strategy function calls c java languages especially lower-level languages c++ combine several notions parameter passing historically call value call name date back algol 60 language designed late 1950s call reference used pl/i fortran systems purely functional languages like haskell well non-purely functional languages like r use call need evaluation strategy specified programming language definition function specific implementation strict evaluation arguments function always evaluated completely function applied church encoding eager evaluation operators maps strict evaluation functions reason strict evaluation sometimes called eager existing programming languages use strict evaluation functions applicative order leftmost innermost evaluation refers evaluation strategy arguments function evaluated left right post-order traversal reducible expressions es applicative order call-by-value evaluation call value also referred pass value common evaluation strategy used languages different c scheme call value argument expression evaluated resulting value bound corresponding variable function frequently copying value new memory region function procedure able assign values parameters local variable assigned—that anything passed function call unchanged caller scope function returns call value single evaluation strategy rather family evaluation strategies function argument evaluated passed function many programming languages common lisp eiffel java use call value evaluate function arguments left-to-right evaluate functions arguments right-to-left others scheme ocaml c leave order unspecified cases term call value problematic value passed value variable understood ordinary meaning value implementation-specific reference value effect syntactically looks like call value may end rather behaving like call reference call sharing often depending subtle aspects language semantics reason passing reference often language technically provide value representation complicated data instead represents data structure preserving semblance value appearance source code exactly boundary drawn proper values data structures masquerading often hard predict c array strings special cases data structure name array treated value reference first element array struct variable name refers value even fields vectors maple vector special case table therefore data structure list gets rendered indexed exactly way value tcl values dual-ported value representation used script level language manages corresponding data structure one required modifications made via data structure reflected back value representation vice versa description call value value reference common understood call reference another term call sharing thus behaviour call value java visual basic call value c pascal significantly different c pascal calling function large structure argument cause entire structure copied except actually reference structure potentially causing serious performance degradation mutations structure invisible caller however java visual basic reference structure copied fast mutations structure visible caller call reference also referred pass reference evaluation strategy function receives implicit reference variable used argument rather copy value typically means function modify i.e assign variable used argument—something seen caller call reference therefore used provide additional channel communication called function calling function call-by-reference language makes difficult programmer track effects function call may introduce subtle bugs simple litmus test whether language supports call-by-reference semantics possible write traditional codice_1 function language many languages support call reference form another comparatively use default fortran ii early example call-by-reference language languages c++ php visual basic .net c realbasic default call value offer special syntax call-by-reference parameters c++ additionally offers call reference const call reference simulated languages use call value n't exactly support call reference making use references objects refer objects pointers objects representing memory addresses objects languages c ml rust use technique separate evaluation strategy—the language calls value—but sometimes referred call address also referred pass address ml references type- memory- safe like rust similar effect achieved call sharing passing object mutated used languages like java python ruby purely functional languages typically semantic difference two strategies since data structures immutable possibility function modify arguments typically described call value even though implementations frequently use call reference internally efficiency benefits following example demonstrates call reference e following example call address simulates call reference c void modify int p int* q int* r int main call sharing also referred call object call object-sharing evaluation strategy first named barbara liskov et al language clu 1974 used languages python iota java object references ruby javascript scheme ocaml applescript many others however term call sharing common use terminology inconsistent across different sources example java community say java call value call sharing implies values language based objects rather primitive types i.e values boxed said pass copy reference primitives boxed passing unboxed called function semantics call sharing differ call reference particular call value mutations arguments performed called routine visible caller call reference access given variables caller merely certain objects e.g variable passed possible simulate assignment variable callee scope however since function access object caller copy made mutations objects objects mutable within function visible caller may appear differ call value semantics mutations mutable object within function visible caller object copied cloned — shared example python lists mutable def f list f print outputs codice_2 codice_3 method modifies object called assignments within function noticeable caller languages passing variable means passing access actual object referred variable access original caller variable since rebound variable exists within scope function counterpart caller retains original binding compare python mutation code binds formal argument new object def f list f print outputs codice_4 statement codice_5 reassigns new list variable rather location references immutable objects real difference call sharing call value except object identity visible language use call sharing mutable objects alternative input/output parameters parameter assigned argument overwritten object identity changed object argument mutated although term widespread usage python community identical semantics languages java visual basic often described call value value implied reference object call copy-restore also referred copy-in copy-out call value result call value return —as termed fortran community special case call reference provided reference unique caller variant gained attention multiprocessing contexts remote procedure call parameter function call reference might accessible another thread execution contents may copied new reference function call returns updated contents new reference copied back original reference restored semantics call copy-restore also differ call reference two function arguments alias one another point variable caller environment call reference writing one affect call copy-restore avoids giving function distinct copies leaves result caller environment undefined depending aliased arguments copied back first—will copies made left-to-right order entry return reference passed callee uninitialized evaluation strategy may called call result partial evaluation evaluation may continue body function applied sub-expressions contain unbound variables evaluated function applications whose argument values known may reduced presence side-effects complete partial evaluation may produce unintended results reason systems support partial evaluation tend pure expressions expressions without side-effects within functions non-strict evaluation arguments function evaluated unless actually used evaluation function body church encoding lazy evaluation operators maps non-strict evaluation functions reason non-strict evaluation often referred lazy boolean expressions many languages use form non-strict evaluation called short-circuit evaluation evaluation returns soon determined unambiguous boolean result—for example disjunctive expression true encountered conjunctive expression false encountered forth conditional expressions also usually use lazy evaluation evaluation returns soon unambiguous branch result normal-order leftmost outermost evaluation evaluation strategy outermost redex always reduced applying functions evaluating function arguments contrast call name evaluate inside body unapplied function call name evaluation strategy arguments function evaluated function called—rather substituted directly function body using capture-avoiding substitution left evaluated whenever appear function argument used function body argument never evaluated used several times re-evaluated time appears see jensen device call-by-name evaluation occasionally preferable call-by-value evaluation function argument used function call name save time evaluating argument whereas call value evaluate regardless argument non-terminating computation advantage enormous however function argument used call name often slower requiring mechanism thunk early use algol 60 today .net languages simulate call name using delegates expression parameters latter results abstract syntax tree given function eiffel provides agents represent operation evaluated needed seed7 provides call name function parameters java programs accomplish similar lazy evaluation using lambda expressions codice_6 interface call need memoized variant call name function argument evaluated value stored subsequent uses argument side-effect free produces results call name saving cost recomputing argument haskell well-known language uses call-by-need evaluation evaluation expressions may happen arbitrarily far computation haskell supports side-effects mutation via use monads eliminates unexpected behavior variables whose values change prior delayed evaluation r arguments passed call-by-need r allows arbitrary side-effects call-by-need arguments lazy evaluation commonly used implementation strategy call-by-need semantics variations exist—for instance optimistic evaluation .net languages implement call need using type codice_7 call macro expansion similar call name uses textual substitution rather capture-avoiding substitution uncautious use macro substitution may result variable capture lead undesired behavior hygienic macros avoid problem checking replacing shadowed variables parameters full β-reduction function application may reduced substituting function argument function using capture-avoiding substitution time may done even within body unapplied function call future also referred parallel call name concurrent evaluation strategy value future expression computed concurrently flow rest program one promises value future needed main program blocks future value promise one promises finishes computing already completed strategy non-deterministic evaluation occur time creation future i.e expression given use future value similar call need value computed computation may deferred value needed may started value future needed local variable function returns computation may terminated part-way implemented processes threads creating future spawn one new processes threads promises accessing value synchronize main thread terminating computation future corresponds killing promises computing value implemented coroutine .net async/await creating future calls coroutine async function may yield caller turn yielded back value used cooperatively multitasking optimistic evaluation another variant call need function argument partially evaluated amount time may adjusted runtime evaluation aborted function applied using call need approach avoids runtime expense call need still retaining desired termination characteristics | [
180,
2451,
4573,
1345,
3437,
1348,
4302,
7333,
4128,
8174,
5288,
6428,
5915,
4405,
2740,
7416,
4053,
6277,
486,
2661,
3968,
5932,
7370,
7460,
666,
6029,
43,
4070,
1114,
4164,
5855,
233,
5506,
7844,
2803,
3898,
5510,
2871,
5164,
7394,
32... | Validation |
7,006 | 9 | Overhead_code:overhead code overhead code additional excess object code generated compiler provide machine code executed specific cpu code includes translations generic instructions listed cross-platform code tailored execution specific platform architecture example overhead code would code generated handle reference counting source code written high level language example cross-platform code coverage area standalone house space taken enclosures similarly overhead code part program listed source code however needed software operate properly | [
5606,
3915,
1237,
6497,
5190
] | Test |
7,007 | 2 | Android_Donut:android donut android donut fourth version open source android mobile operating system developed google longer supported among prominent features introduced update added support cdma smartphones additional screen sizes battery usage indicator text-to-speech engine public release donut—its official dessert-themed code name convention employed google designate major android versions—carriers quick follow roll customers form over-the-air ota update compatible smartphones | [
3933,
5372,
6427,
1095,
740,
4340,
42,
3309,
3310,
7924,
2591,
5771,
6132,
5775,
6153,
7956,
5455,
6176,
5473,
474,
6183,
822,
831,
5141,
136,
2317,
2673,
6209,
1582,
2683,
855,
6937,
168,
6232,
6950,
2712,
4116,
5195,
2003,
195,
6978,
... | Test |
7,008 | 4 | Associated_Signature_Containers:associated signature containers associated signature containers asic specifies use container structures bind together one signed objects either advanced electronic signatures timestamp tokens one single digital container eidas-regulation associated signature container asic eidas data container used hold group file objects digital signatures and/or time assertions associated objects data stored asic zip format european commission implementing decision 2015/1506 8 september 2015 laid specifications relating formats advanced electronic signatures advanced seals recognised public sector bodies pursuant articles 27 37 eidas-regulation eu member states requiring advanced electronic signature advanced electronic signature based qualified certificate shall recognise xml cms pdf advanced electronic signature conformance level b lt level using associated signature container signatures comply following technical specifications technical specification asics updated standardized since april 2016 european telecommunications standards institute standard associated signature containers asic etsi en 319 162-1 v1.1.1 2016-04 updated standard required european commission implementing decision internal structure asic includes two folders electronic signature file would contain single cades object one xades signatures time assertion file would either contain one timestamp token conform ietf rfc 3161 whereas single evidence record would conform ietf rfc 4998 ietf rfc6283 one purposes electronic signature secure data attached modified done creating dataset combines signature signed data store detached signature separate resource utilize external process re-associate signature data advantageous use detached signatures prevents unauthorized modifications original data objects however risk detached signature become separated associated data happen association would lost therefore data would become inaccessible one widespread deployments asic standard estonian digital signature system use multiplatform windows linux macos osx software called digidoc using correct tool job always important using correct type asic container job hand also important container single file object associated signature time assertion file “ mimetype ” file specifies media type might also included container mimetype file included required first file asic container container type allow additional signatures added future used sign stored file objects long-term time-stamp tokens used asic archive manifest files used protect long-term time-stamp tokens tampering type container hold one signature time assertion files asic-e xades deals signature files asic-e cades deals time assertions files within asic containers apply file object sets file object might additional metadata information associated also protected signature asic-e container could designed prevent modification allow inclusion without causing damage previous signatures asic containers capable maintaining long-term availability integrity storing xades cades signatures use time-stamp tokens evidence record manifest files contained within containers asic containers must comply zip specification limitations applied zip container operates baseline requirements asic simple asic-s container also provides additional time assertion requirements additional elements may within meta-inf folder requires use “ signeddata ” variable include certificate revocation information container baselines asic-e container additional restrictions container complies asic-e baseline requirements along additional requirements restrictions use asic reduces risk electronic signature becoming separated data combining signature signed data container elements secured within asic easier distribute signature guarantee correct signature metadata used validation process also used associating time assertions including evidence records time-stamp tokens associated data | [] | Validation |
7,009 | 9 | Robin_Milner:robin milner arthur john robin gorell milner 13 january 1934 – 20 march 2010 known robin milner a. j. r. g. milner british computer scientist turing award winner milner born yealmpton near plymouth england military family awarded scholarship eton college 1947 subsequently served royal engineers attaining rank second lieutenant enrolled king college cambridge graduating 1957 milner first worked schoolteacher programmer ferranti entering academia city university london swansea university stanford university 1973 university edinburgh co-founder laboratory foundations computer science lfcs returned cambridge head computer laboratory 1995 eventually stepped although still laboratory 2009 milner sicsa advanced research fellow held part-time chair computer science university edinburgh milner died heart attack 20 march 2010 cambridge wife lucy died shortly milner generally regarded made three major contributions computer science developed lcf one first tools automated theorem proving language developed lcf ml first language polymorphic type inference type-safe exception handling different area milner also developed theoretical framework analyzing concurrent systems calculus communicating systems ccs successor pi-calculus time death working bigraphs formalism ubiquitous computing subsuming ccs pi-calculus also credited rediscovering hindley–milner type system made fellow royal society distinguished fellow british computer society 1988 milner received acm turing award 1991 1994 inducted fellow acm 2004 royal society edinburgh awarded milner royal medal bringing public benefits global scale 2008 elected foreign associate national academy engineering fundamental contributions computer science including development lcf ml ccs pi-calculus see also publications robin milner dblp | [
4573,
7707,
7717,
4405,
6995,
1746,
1381,
3470,
43,
3895,
2778,
5164,
1308,
3225,
5424,
6485,
8027,
7863,
1600,
1243,
360
] | Validation |
7,010 | 3 | Silicon_Graphics:silicon graphics silicon graphics inc. later rebranded sgi historically known silicon graphics computer systems sgcs american high-performance computing manufacturer producing computer hardware software founded mountain view california november 1981 jim clark initial market 3d graphics computer workstations products strategies market positions developed significantly time early systems based geometry engine clark marc hannah developed stanford university derived clark broader background computer graphics geometry engine first very-large-scale integration vlsi implementation geometry pipeline specialized hardware accelerated inner-loop geometric computations needed display three-dimensional images much history company focused 3d imaging major supplier hardware software market silicon graphics reincorporated delaware corporation january 1990 mid late-1990s rapidly improving performance commodity wintel machines began erode sgi stronghold 3d market porting maya platforms major event process sgi made several attempts address including disastrous move existing mips platforms intel itanium well introducing linux-based intel ia-32 based workstations servers failed market mid-2000s company repositioned supercomputer vendor move also failed april 1 2009 sgi filed chapter 11 bankruptcy protection announced would sell substantially assets rackable systems deal finalized may 11 2009 rackable assuming name silicon graphics international remains silicon graphics inc. became graphics properties holdings inc. james h. clark left position electrical engineering associate professor stanford university found sgi 1982 along group seven graduate students research staff stanford kurt akeley david j brown tom davis rocky rhodes marc hannah herb kuta mark grossman along abbey silverstone others ed mccracken ceo silicon graphics 1984 1997 years sgi grew annual revenues 5.4 million 3.7 billion addition 3d graphic capabilities pcs ability clusters linux- bsd-based pcs take many tasks larger sgi servers ate sgi core markets porting maya linux mac os x microsoft windows eroded low end sgi product line response challenges faced marketplace falling share price ed mccracken fired sgi brought richard belluzzo replace belluzzo leadership number initiatives taken considered accelerated corporate decline one initiative trying sell workstations running windows nt called visual workstations instead ones ran irix company version unix put company even direct competition likes dell making difficult justify price premium product line unsuccessful abandoned years later sgi premature announcement migration mips itanium abortive ventures ia-32 architecture systems visual workstation line ex-intergraph zx10 range sgi 1000-series linux servers damaged sgi credibility market 1999 attempt clarify current market position graphics company silicon graphics inc. changed corporate identity sgi although legal name unchanged time sgi announced new logo consisting letters sgi proprietary font called sgi created branding design consulting firm landor associates collaboration designer joe stitzlein sgi continued use silicon graphics name workstation product line later re-adopted cube logo workstation models november 2005 sgi announced delisted new york stock exchange common stock fallen minimum share price listing exchange sgi market capitalization dwindled peak seven billion dollars 1995 120 million time delisting february 2006 sgi noted could run cash end year mid-2005 sgi hired alix partners advise returning profitability received new line credit sgi announced postponing scheduled annual december stockholders meeting march 2006 proposed reverse stock split deal de-listing new york stock exchange january 2006 sgi hired dennis mckenna new ceo chairman board directors mr. mckenna succeeded robert bishop remained vice chairman board directors may 8 2006 sgi announced filed chapter 11 bankruptcy protection u.s. subsidiaries part plan reduce debt 250 million two days later u.s. bankruptcy court approved first day motions use 70 million financing facility provided group bondholders foreign subsidiaries unaffected september 6 2006 sgi announced end development mips/irix line irix operating system production would end december 29 last orders would fulfilled march 2007 support products would end december 2013 sgi emerged bankruptcy protection october 17 2006 stock symbol point sgid.pk canceled new stock issued nasdaq exchange symbol sgic new stock distributed company creditors sgid common stockholders left worthless shares end year company moved headquarters mountain view sunnyvale earlier north shoreline headquarters occupied computer history museum newer amphitheater parkway headquarters sold google locations award-winning designs studios architecture april 2008 sgi re-entered visualization market sgi virtu range visualization servers workstations re-badged systems boxx technologies based intel xeon amd opteron processors nvidia quadro graphics chipsets running red hat enterprise linux suse linux enterprise server windows compute cluster server december 2008 sgi received delisting notification nasdaq market value minimum 35 million requirement 10 consecutive trading days also meet nasdaq alternative requirements minimum stockholders equity 2.5 million annual net income continuing operations 500,000 april 1 2009 sgi filed chapter 11 announced would sell substantially assets rackable systems 25 million sale ultimately 42.5 million finalized may 11 2009 time rackable announced adoption silicon graphics international global name brand bankruptcy court scheduled continuing proceedings hearings june 3 24 2009 july 22 2009 rackable acquisition vizworld magazine published series six articles chronicle downfall sgi hewlett packard enterprise acquired sgi november 2016 allowed hpe place top500 nasa ames research center pleiades sgi ice supercomputer portfolio sgi continuous presence high performance compute silicon graphics inc. second bankruptcy phase renamed graphics properties holdings inc. gphi june 2009 2010 gphi announced significant favorable ruling litigation ati technologies amd june 2010 following patent lawsuit originally filed silicon graphics inc. era following 2008 appeal ati validity '327 silicon graphics inc voluntary dismissal '376 patent lawsuit federal circuit upheld jury verdict validity gphi u.s. patent 6,650,327 furthermore found amd lost right challenge patent validity future proceedings january 31 2011 district court entered order permits amd pursue invalidity affirmative defense trial permit sgi accuse amd radeon r700 series graphics products infringement case april 18 2011 gphi amd entered confidential settlement license agreement resolved litigation matter immaterial amount provides immunity gphi patents alleged infringement amd products including components software designs april 26 2011 court entered order granting parties agreed motion dismissal final judgment 2011-11 gphi filed another patent infringement lawsuit apple inc. delaware involving patents original patent infringement case apple last november alleged violation u.s. patents 6,650,327 '327 '145 '881 2012 gphi filed lawsuit apple sony htc corp lg electronics inc. samsung electronics co. research motion ltd. allegedly violating patent relating computer graphics process turns text images pixels displayed screens affected devices include apple iphone htc evo4g lg thrill research motion torch samsung galaxy galaxy ii sony xperia play smartphones sgi first generation products starting iris integrated raster imaging system 1000 series high-performance graphics terminals based motorola 68000 family microprocessors later iris 2000 3000 models developed full unix workstations first entries 1000 series models 1000 1200 introduced 1984 graphics terminals peripherals connected general-purpose computer digital equipment corporation vax provide graphical raster display abilities used 8 mhz motorola 68000 cpus ram disk drives booted network via excelan exos/101 ethernet card controlling computer used pm1 cpu board variant board used stanford university sun workstation later sun-1 workstation sun microsystems graphics system composed gf1 frame buffer uc3 update controller dc3 display controller bp2 bitplane 1000-series machines designed around multibus standard later 1000-series machines 1400 1500 ran 10 mhz 1.5 mb ram 1400 73 mb st-506 disk drive 1500 474 mb smd-based disk drive xylogics 450 disk controller may used pm2 cpu pm2m1 ram board 2000 series usual monitor 1000 series ran 30 hz interlaced six beta-test units 1400 workstation produced first production unit sgi first commercial computer shipped carnegie-mellon university electronic imaging laboratory 1984 sgi rapidly developed machines workstations second product line — iris 2000 series first released august 1985 sgi began using unix system v operating system five models two product ranges 2000/2200/2300/2400/2500 range used 68010 cpus pm2 cpu module later turbo systems 2300t 2400t 2500t 68020s ip2 cpu module used excelan exos/201 ethernet card graphics hardware gf2 frame buffer uc4 update controller dc4 display controller bp3 bitplane main differences cpu ram weitek floating point accelerator boards disk controllers disk drives st-506 smd available could upgraded example 2400 2400t 2500 2500t larger chassis standard 6 19 eia rack space bottom two smd disk drives weighing approximately non-turbo models used multibus cpu communicate floating point accelerator turbos added ribbon cable dedicated 60 hz monitors used 2000 series height machines using motorola cpus reached iris 3000 series models 3010/3020/3030 3110/3115/3120/3130 30s full-size rack machines used graphics subsystem ethernet 2000s could also use 12 geometry engines first widespread use hardware graphics accelerators standard monitor 19 60 hz non-interlaced unit tilt/swivel base 19 30 hz interlaced 15 60 hz non-interlaced tilt/swivel base also available iris 3130 smaller siblings impressive time complete unix workstations 3130 powerful enough support complete 3d animation rendering package without mainframe support large capacity hard drives standards day two 300 mb drives streaming tape ethernet could centerpiece animation operation line formally discontinued november 1989 3500 systems shipped 2000 3000 models combined introduction iris 4d series sgi switched mips microprocessors machines powerful came powerful on-board floating-point capability 3d graphics became popular television film time systems responsible establishing much sgi reputation sgi produced broad range mips-based workstations servers 1990s running sgi version unix system v called irix included massive onyx visualization systems size refrigerators capable supporting 64 processors managing three streams high resolution fully realized 3d graphics october 1991 mips announced first commercially available 64-bit microprocessor r4000 sgi used r4000 crimson workstation irix 6.2 first fully 64-bit irix release including 64-bit pointers secure supply future generations mips microprocessors 64-bit r4000 sgi acquired company 1992 333 million renamed mips technologies inc. wholly owned subsidiary sgi 1993 silicon graphics sgi signed deal nintendo develop reality coprocessor rcp gpu used nintendo 64 n64 video game console deal signed early 1993 later made public august year console later released 1996 rcp developed sgi nintendo operations department led engineer dr. wei yen 1997 twenty sgi employees led yen left sgi founded artx later acquired ati technologies 2000 1998 sgi relinquished ownership mips technologies inc re-ipo fully divested 2000 late 1990s much industry expected itanium replace cisc risc architectures non-embedded computers sgi announced intent phase mips systems development new mips microprocessors stopped existing r12000 design extended multiple times 2003 provide existing customers time migrate itanium august 2006 sgi announced end production mips/irix systems end year mips/irix products longer generally available sgi second generation onyx reality engine machines sgi offered access high performance 3d graphics subsystems proprietary api known iris graphics language iris gl features added years iris gl became harder maintain cumbersome use 1992 sgi decided clean reform iris gl made bold move allowing resulting opengl api cheaply licensed sgi competitors set industry-wide consortium maintain opengl standard opengl architecture review board meant first time fast efficient cross-platform graphics programs could written day opengl remains real-time 3d graphics standard portable across variety operating systems opengl-es even runs many types cell phones main competitor direct3d microsoft runs microsoft windows-based machines consoles sgi part advanced computing environment initiative formed early 1990s 20 companies including compaq digital equipment corporation mips computer systems groupe bull siemens nec netpower microsoft santa cruz operation intent introduce workstations based mips architecture able run windows nt sco unix group produced advanced risc computing arc specification began unravel little year formation sgi crimson system fsn three-dimensional file system navigator appeared 1993 movie jurassic park movie twister protagonists seen using sgi laptop computer however unit shown actual working computer rather fake laptop shell built around sgi corona lcd flat screen display 1995 film congo also features sgi laptop computer used dr. ross laura linney communicate via satellite travicom hq purple lowercased sgi logo seen beginning opening credits hbo series silicon valley taken replaced google logo intro graphics progress google leased former sgi buildings 2003 headquarters mountain view ca purchased buildings outright 2006 eight consecutive years 1995–2002 films nominated academy award distinguished achievement visual effects created silicon graphics computer systems inexpensive pcs began graphics performance close expensive specialized graphical workstations sgi core business sgi shifted focus high performance servers digital video web many sgi graphics engineers left work computer graphics companies ati nvidia contributing pc 3d graphics revolution 1995 film toy story used silicon graphics indigo2 computers create scenes movie sgi promoter free software supporting several projects linux samba opening previously proprietary code xfs filesystem open64 compiler 1995 sgi purchased alias research kroyer films wavefront technologies deal totaling approximately 500 million merged companies alias|wavefront june 2004 sgi sold business later renamed alias/wavefront private equity investment firm accel-kkr 57.1 million october 2005 autodesk announced signed definitive agreement acquire alias 182 million cash february 1996 sgi purchased well-known supercomputer manufacturer cray research 740 million began use marketing names craylink sgi-developed technology integrated sgi server line three months later sold cray business systems division responsible cs6400 sparc/solaris server sun microsystems undisclosed amount acknowledged later sun executive significantly less 100 million many cray t3e engineers designed developed sgi altix numalink technology sgi sold cray brand product lines tera computer company march 31 2000 35 million plus one million shares sgi also distributed remaining interest mips technologies spin-off effective june 20 2000 september 2000 sgi acquired zx10 series windows workstations servers intergraph computer systems rumored 100 million rebadged sgi systems product line discontinued june 2001 another attempt sgi late 1990s introduce family intel-based workstations running windows nt red hat linux see also sgi visual workstation proved financial disaster shook customer confidence sgi ’ commitment mips-based line 1998 sgi announced future generations machines would based mips processors upcoming super-chip intel code-named merced later called itanium funding high-end processors reduced planned r10000 would last mips mainstream processor mips technologies would focus entirely embedded market success sgi would longer fund development cpu since failure arc found use machines plan quickly went awry early 1999 clear itanium going delivered late would nowhere near performance originally expected production delays increased mips existing r10000-based machines grew increasingly uncompetitive eventually forced introduce faster mips processors r12000 r14000 r16000 used series models 2002 2006 sgi first itanium-based system short-lived sgi 750 workstation launched 2001 sgi mips-based systems superseded launch itanium 2-based altix servers prism workstations time later unlike mips systems ran irix itanium systems used suse linux enterprise server sgi enhancements operating system sgi used transitive corporation quicktransit software allow old mips/irix applications run emulation new itanium/linux platform server market itanium 2-based altix eventually replaced mips-based origin product line workstation market switch itanium completed sgi exited market altix powerful computer world 2006 assuming computer defined collection hardware running single instance operating system altix 512 itanium processors running single instance linux cluster 20 machines eighth-fastest supercomputer faster supercomputers clusters none many flops per machine however recent supercomputers large clusters machines individually less capable sgi acknowledged 2007 moved away massive numa model clusters although sgi continued market itanium-based machines recent machines based intel xeon processor first altix xe systems relatively low-end machines december 2006 xe systems capable itanium machines measures e.g. power consumption flops/w density flops/m cost/flops xe1200 xe1300 servers used cluster architecture departure pure numa architectures earlier itanium mips servers june 2007 sgi announced altix ice 8200 blade-based xeon system 512 xeon cores per rack altix ice 8200 installed new mexico computing applications center 14336 processors ranked number 3 top500 list november 2007 conventional wisdom holds sgi core market traditionally hollywood visual effects studios fact sgi largest revenue always generated government defense applications energy scientific technical computing one case silicon graphics largest single sale ever united states postal services usps sgi servers powered artificial intelligence ai program mechanically read tag sort mail hand-written block number usps key mail centers rise cheap yet powerful commodity workstations running linux windows mac os x availability diverse professional software effectively pushed sgi visual effects industry niche markets sgi continued enhance line servers including supercomputers based sn architecture sn scalable node technology developed sgi mid-1990s uses cache-coherent non-uniform memory access cc-numa sn system processors memory bus- memory-controller coupled together entity called node usually single circuit board nodes connected high-speed interconnect called numalink originally marketed craylink internal bus instead access processors memory i/o devices done switched fabric links routers thanks cache coherence distributed shared memory sn systems scale along several axes cpu count increases memory capacity i/o capacity system bisection bandwidth allows combined memory nodes accessed single os image using standard shared-memory synchronization methods makes sn system far easier program able achieve higher sustained-to-peak performance non-cache-coherent systems like conventional clusters massively parallel computers require applications code written re-written explicit message-passing communication nodes first sn system known sn-0 released 1996 product name origin 2000 based mips r10000 processor scaled 2 128 processors smaller version origin 200 sn-00 scaled 1 4 later enhancements enabled systems large 512 processors second generation system originally called sn-1 later sn-mips released july 2000 origin 3000 scaled 4 512 processors 1,024-processor configurations delivered special order customers smaller less scalable implementation followed called origin 300 november 2002 sgi announced repackaging sn system name origin 3900 quadrupled processor area density sn-mips system 32 128 processors per rack moving fat tree interconnect topology january 2003 sgi announced variant sn platform called altix 3000 internally called sn-ia used intel itanium 2 processors ran linux operating system kernel time released world scalable linux-based computer supporting 64 processors single system node nodes could connected using numalink technology form sgi predictably termed superclusters february 2004 sgi announced general support 128 processor nodes followed 256 512 processor versions year april 2004 sgi announced sale alias software business approximately 57 million october 2004 sgi built supercomputer columbia broke world record computer speed nasa ames research center cluster 20 altix supercomputers 512 intel itanium 2 processors running linux achieved sustained speed 42.7 trillion floating-point operations per second teraflops easily topping japan famed earth simulator record 35.86 teraflops week later ibm upgraded blue gene/l clocked 70.7 teraflops july 2006 sgi announced sgi altix 4700 system 1,024 processors 4 tb memory running single linux system image 68k mips-based models also rebadged vendors including cdc tandem computers prime computer siemens-nixdorf sgi onyx sgi indy series systems used game development nintendo 64 | [
6074,
5015,
3614,
1452,
1454,
3624,
4687,
4321,
2929,
3970,
1854,
5055,
1112,
1867,
1878,
1879,
4362,
5079,
4365,
4368,
1506,
4370,
4372,
7596,
787,
1522,
2983,
3346,
4755,
6874,
5459,
4759,
100,
5104,
3692,
3701,
2299,
7990,
1198,
836,
... | Validation |
7,011 | 2 | Apple_GS/OS:apple gs/os gs/os operating system developed apple computer apple ii personal computer uses prodos filing system provides facilities accessing file system controlling input/output devices loading running program files system allowing programs handle interrupts signals gs/os included component apple ii system software versions 4.0 6.0.1 gs/os unlike predecessor written entirely 16-bit code first true 16-bit operating system ii gs/os includes facility known file system translators fsts allows support multiple on-disk file systems manner transparent application programs feature found prodos microcomputer operating systems time usually used prodos file system one could booted gs/os also supports variety file systems including hierarchical file system used mac os file system translators addition prodos hfs include ms-dos high sierra/iso-9660 apple dos 3.3 pascal albeit read-only full read/write support planned never completed another advantage gs/os prodos 16 written 16-bit code 65816 processor used ii rather primarily 8-bit 6502 machine code take advantage ii unique features also extends prodos file system provide resource forks files similar used apple macintosh allows programs written flexible way big change previous versions prodos gs/os incorporates many features macintosh system 5 particular gs/os finder loadable fonts plug-in device drivers modem printer etc. command-line development environment called apw apple programmer workshop available much like macintosh programmer workshop | [
1522,
6788,
4214,
4575,
5101,
7814,
2294,
4320,
5571,
2300,
5660,
5579,
1654,
5232,
1656,
1657,
6113,
405,
8043,
6119,
6380,
149,
2327,
1123,
6479,
4453,
2794,
3412,
2528,
3751,
3920
] | Test |
7,012 | 2 | Nokia_N8:nokia n8 nokia n8 touchscreen-based smartphone developed nokia announced 27 april 2010 nokia n8 first device run symbian^3 mobile operating system company flagship device year released 30 september 2010 nokia online store released markets around world 1 october 2010 n8 3.5-inch amoled display 16 gigabytes mass memory features 12-megapixel camera second time camera megapixel count used first one sony ericsson satio 2009 xenon flash like nokia n82 large 1/1.83 ” sensor size larger point-and-shoot cameras time also 720p hd video recording pentaband 3.5g radio fm transmitter among connectivity features hdmi output usb on-the-go wi-fi 802.11 b/g/n n8 important device nokia bid increasing competition smartphone industry revamped symbian^3 software also important device delayed several times pushing release date several months negative impact company despite mixed views symbian software n8 hardware build camera quality well received many calling best camera phone n8 would also become nokia last flagship device running symbian due nokia lumia 800 2011 ran windows phone software n8 symbian successor nokia 808 pureview appeared 2012 previous flagship phone nseries n97 criticised initial firmware issues anssi vanjoki nokia executive vice president markets said interview software quality control would better n97 n97 reception highly negative tarnished company image market n8 first device feature symbian^3 operating system initially scheduled second quarter 2010 n8 pushed back third quarter finally released 30 september 2010 due 'final amendments n8 became product customer pre-orders nokia history point release sales q4 2010 estimated almost 4 million previous nokia phone focus photography n86 8mp 8-megapixel sensor become available june 2009 n8 second nokia capacitive touchscreen following x6 first multi-touch nokia n8 dual charging options allowing charged standard-pin nokia charger micro-usb port nokia n8 battery compartment internally contained thus battery entirely straightforwardly removable replaceable users nonetheless although procedure endorsed nokia possible correct tool careful handling change battery. bl-4d 1200 mah lithium-ion battery n8 first nokia smartphone device run symbian^3 operating system 7 february 2012 nokia belle update available n8 nokia suite august year nokia also started roll nokia belle refresh update update brought new features symbian smartphone like html 5 web apps support new set home screen widgets software function n8 smartphone anna operating system update gave communicator support usually reserved e-series devices also new push notification api corresponding app proprietary web browser latest version 7.4.2.6 belle v.111.030.0609 official firmware including video-capturing feature complemented mini hdmi port located top side phone normally mirrors phone screen allows applications built-in video player nokia big screen app selected games output content resolutions 720p corresponding cable provided retail box regions nokia mobile tv headset provides dvb-h tv applications developed using nokia qt framework highlight capabilities nokia n8 camera nokia created short film commuter october 2010 directed mchenry brothers starring dev patel ed westwick charles dance pamela anderson seven-minute film shot entirely phone 720p camera spanish promotion phone also created short video featuring luminescent puppets called www.techfashy.com/2014/11/nokia-launches-their-first-android_18.html love knot phone also used film drums death wo n't long music video using cellscope technology nokia also released another film called dot marketed world smallest stop-motion animation character device also appeared popular showtime tv show dexter bbc tv series hustle well film also phone sarah lund uses third series killing .. asian countries promoted differently fictional character pier roxas nokia project gener8 young rubicam philippines also appeared gma talk show startalk promote device nokia shorts 2011 competition involved 8 short films shot nokia n8 winner splitscreen love story independent film olive first feature-length film 90 minutes made entirely cell phone uses nokia n8 along old fashioned video camera attachment 35 mm lens made exclusively device trick audience realizing made nokia n8 | [
1066,
372,
7521,
3615,
1453,
3952,
6092,
2922,
23,
2564,
7545,
5044,
740,
6465,
5062,
3653,
5068,
3657,
4726,
768,
1129,
76,
2271,
6517,
463,
3694,
472,
4407,
118,
3703,
7261,
484,
5493,
1202,
3029,
5499,
139,
3039,
1582,
8024,
520,
6... | Validation |
7,013 | 7 | Livedrive:livedrive livedrive online cloud backup sync storage service owned j2 global company provides users unlimited backup space 2,000 gb sync storage livedrive enables users access data mobile phones tablets currently livedrive apps ios android windows macos chrome os livedrive founded late 2008 andrew michael another investor company nicholas cowell may 2009 three months product launched business offered £100 million buy-out company turned offer stating wanted build company october 2009 livedrive entered us market place via distribution agreement lifeboat distribution international speciality software distribution security application lifecycle virtualization network infrastructure products april 2011 livedrive created april fools video falsely stated company storing files paper using qr codes story picked several press sources true story including cbs money watch february 10 2014 livedrive purchased j2 global livedrive part j2 business cloud services division includes efax evoice fusemail campaigner keepitsafe shutting hundreds user accounts “ excessive bandwidth/storage ” livedrive reported august 2014 facing legal action discontented customers september 2010 livedrive added personal music movie streaming accounts gave users ability listen music collections watch movies remote computer transcoding handled livedrive company also gave users ftp access unlimited versioning | [
4594,
7102,
4759,
5571,
7083,
3943,
1589
] | Validation |
7,014 | 3 | PlayStation_2_sales:playstation 2 sales sony playstation 2 best-selling video game console time console sold slightly 500,000 units first day november 2000 marked industry record fastest-selling game console sony planned ship 100,000 units per week remainder year total 1.3 million end year planned ship three million units end march following year sony shipped 10 million consoles north america may 2002 holiday 2002 sales strong 8.5 million units november december 24 previous year sony expected shipments 2003 slip previous years sony projected shipments 20 million versus 22.5 year sony shipped 60 million units september 2003 26.4 million units went north america 19.4 million europe vast majority remaining 14.2 went japan 2004 although console took hit holiday 2003 sales previous year lifetime sales reached 70 million november 29 2005 playstation 2 became fastest game console reach 100 million units shipped accomplishing feat within 5 years 9 months launch achievement occurred faster predecessor playstation took 9 years 6 months reach benchmark europe ps2 sold 6 million units 2006 3.8 million 2007 according estimates ea 2007 ps2 sold 3.97 million units us according npd group 816,419 units japan according enterbrain 2008 ps2 sold 480,664 units japan according enterbrain october 2008 system sold 21 million units japan 150 million units ps2 hardware sold worldwide end 2010 although gameinformer noted units sold retail companies playstation 2 shipments japan ended december 28 2012 week later january 4 2013 sony computer entertainment formally discontinued console last week availability japan december 24 december 30 2012 playstation 2 sold 2,078 units country 928 units week remarkably playstation 2 managed sell better japan week xbox 360 1,986 units well nintendo ds 704 units ps2 sold 158 million units worldwide january 2013 europe sold 56 million units january 2013 according sony computer entertainment europe north america sold 53.65 million units january 2013 japan ps2 sold 23.18 million units january 2013 according famitsu /enterbrain | [
450,
6330,
2177,
7514,
4761,
6621,
481,
746,
2873,
424,
253,
4011,
5446,
4748
] | Test |
7,015 | 5 | Camino_(web_browser):camino web browser camino spanish word meaning path discontinued free open source gui-based web browser based mozilla gecko layout engine specifically designed os x operating system place xul-based user interface used mozilla-based applications camino used mac-native cocoa apis may 30 2013 camino project announced browser longer developed camino aim integrate well possible os x used aqua user interface integrated number os x services features keychain password management bonjour scanning available bookmarks across local network notable features included integrated pop-up blocker ad blocker tabbed browsing included overview feature allowing tabs viewed pages browser developed camino project community organization mike pinkerton technical lead camino project since dave hyatt moved safari team apple inc. mid-2002 late 2001 mike pinkerton vidur apparao started project within netscape prove gecko could embedded cocoa application early 2002 dave hyatt one co-creators firefox called phoenix joined team built chimera small lightweight browser wrapper around work chimera mythological beast parts taken various animals new browser represented early example carbon/c++ code interacting cocoa/objective-c code name must seemed apt first downloadable build chimera 0.1 released february 13 2002 early releases became popular due fast page-loading speeds compared then-dominant mac browser microsoft internet explorer version 5 omnigroup omniweb used cocoa text system rendering engine hyatt hired apple computer mid-2002 start work would become safari meanwhile chimera developers got small team together within netscape dedicated development qa put together netscape-branded technology preview january 2003 macworld conference however two days show aol management decided abandon entire project despite setback skeleton crew qa developers released camino 0.7 march 3 2003 name changed chimera camino legal reasons roots greek mythology chimera popular choice name hypermedia systems one first graphical web browsers called chimera researchers university california irvine also developed complete hypermedia system name spanish path road el camino real aka royal road name chosen continue navigator motif version 0.7 primarily netscape-driven release kept afloat end open source version 0.8 according lead developer pinkerton triumph open source open process people around world helped patches qa bug triage localization artwork evangelism march 2005 camino web site moved mozilla foundation domain mozilla.org camino project domain caminobrowser.org september 2005 pinkerton accepted position google worked closely google firefox team continued work camino twenty percent time camino 1.0 released february 14 2006 first browser mozilla family appear universal binary thanks largely efforts mark mentovai another camino developers camino 2.0 released november 18 2009 introduced many new interface features browser including movable tabs tab preview first camino release acid2-compliant release camino 2.1 2011 developers announced plans transition webkit future versions mozilla dropped support gecko embedding final release 2.1.2 released march 14 2012 may 30 2013 stuart morgan announced camino blog camino reached end longer developed camino 2.0 released november 18 2009 introduced many new interface features browser including moveable tabs tab preview first camino release acid2-compliant current release 2.1.2 scores 99/100 acid3 test camino current html5 support via html5 test standards testbed limited camino 2.1.2 available following languages | [
4655,
6802,
5378,
2205,
7537,
6809,
393,
1847,
3291,
2574,
2577,
6452,
6458,
3655,
4352,
1496,
4725,
4357,
1502,
1136,
7587,
5786,
6858,
2261,
84,
445,
1152,
1525,
4755,
7975,
7628,
5821,
5127,
1190,
6540,
3383,
8006,
8009,
5506,
3043,
... | Validation |
7,016 | 5 | CCSO_Nameserver:ccso nameserver ccso name-server ph protocol early form database search internet common form used look information telephone numbers email addresses today service largely replaced ldap used mainly early-to-middle 1990s name-server developed steve dorner university illinois urbana–champaign university computing communications services office ccso also exists outlook plugin standalone application known outlookph name-server directories frequently organized gopher hierarchies tools ph qi two components system ph client queried qi server ph protocol formally defined september 1998 however memo issued time references prior use unspecified period time date defines sixteen keywords used server side define record properties also defines clients access records server responses server give ph server communication takes place tcp port 105 commands response initially assumed us-ascii encoding historical reasons unless client explicitly asks 8-bit iso-8859-1 encoding result characters 0x20 0x7e initially sent server raw form characters present entries escaped using defined quoted-printable encoding initial request client text base keyword optionally followed one parameters defined server responds request following example response status request provided rfc memo command defined memo consists keyword followed needed one parameters key words separated spaces tabs end line line must terminated cr+lf style following commands command takes parameters simply asks server report status returns information server version mail domain contact password issues authentication methods list available entry fields server specified name names causes server log specified information current user id without login sets specified option server value used without parameters lists current server settings actual login/logout commands server alias must users ph alias logging allows user change entry view certain fields flag restricted access client normally uses one send password information login command sent one recognized server end session command closing connection distributed nameserver backed flat file database early 1990s indiana university software developer larry hughes implemented version qi called phd written perl backed relational database code distributed open-source license several years prior university transition ldap | [
4655,
5983,
5542,
6802,
7628,
2205,
7537,
7637,
3291,
3548,
7094,
6462,
7015,
3043,
4352,
348,
5887,
1057,
2261,
2804,
445
] | Test |
7,017 | 9 | Orthogonality_(programming):orthogonality programming computer programming orthogonality means operations change one thing without affecting others term most-frequently used regarding assembly instruction sets orthogonal instruction set orthogonality programming language means relatively small set primitive constructs combined relatively small number ways build control data structures language associated simplicity orthogonal design fewer exceptions makes easier learn read write programs programming language meaning orthogonal feature independent context key parameters symmetry consistency example pointer orthogonal concept example ibm mainframe vax highlights concept ibm mainframe two different instructions adding contents register memory cell another register statements shown first case contents codice_1 added contents memory cell result stored codice_1 second case contents codice_1 added contents another register codice_4 result stored codice_1 contrast set statements vax one statement addition case two operands codice_6 codice_7 registers memory cells combination instruction adds contents codice_6 contents codice_7 storing result codice_6 vax ’ instruction addition orthogonal instructions provided ibm hence easier programmer remember use one provided vax design c language may examined perspective orthogonality c language somewhat inconsistent treatment concepts language structure making difficult user learn use language examples exceptions follow though concept first applied programming language orthogonality since become recognized valuable feature design apis even user interfaces small set composable primitive operations without surprising cross-linkages valuable leading systems easier explain less frustrating use | [
6507,
7999,
3166,
6511,
7303,
7863,
1600,
7921,
5424,
6774,
3115,
4508,
2265,
1041,
360
] | Test |
7,018 | 3 | SimpleLinux:simplelinux simplelinux linux distribution uses lzma compression compress system files project started 2007 group malaysian developers simplelinux slackware-based distribution comes live cd persistence version installed medium simplelinux comes multi-tasking operating system runs x window k desktop environment used primary graphical user interface current version k desktop environment used simplelinux kde 3.5 stable extended use compiz fusion also integrated newest simplelinux version simplelinux uses slackpkg install remove upgrade packages network moreover simplelinux provides optional lzm packages official repository applications provided repository compressed lzma | [
7075,
3559,
352,
3751,
4603,
5232,
788
] | Validation |
7,019 | 3 | Ninja_JaJaMaru-kun:ninja jajamaru-kun released nintendo japanese virtual console december 26 2006 pal regions september 21 2007 part ninja week hanabi festival promotion released north american virtual console october 22 2007 first time game made release outside japan respective regions primary inspiration behind robot ninja haggleman 8-bit style game retro game challenge nintendo ds game stars brother ninja-kun ninja-kid princess sakura kidnapped damazu-dayuu ninja-kun away journey task falls young jajamaru-kun game player starts three lives run jump throw shurikens game divided stages four floors eight ghost-like enemies japanese folklore names displayed stage begins sakura-hime damazu placed unreachable top screen enemies use various projectiles one cause player lose life jajamaru-kun lands top enemy simply temporarily stunned vice versa enemy defeated offscreen spirit appear ascend top screen collected disappeared receive points vary depending enemy among eight enemies one top floor tougher beat others player need careful deal sakura sometimes drop petals player collect damazu sometimes run around dropping bombs advance next stage player must defeat eight enemies using shurikens bricks yield items include three types power-ups collected gamapa-kun giant frog summoned jajamaru-kun riding completely invincible able eat enemies three sakura petals collected player go bonus stage jajamaru-kun bottom damazu top damazu drops bombs player throws shurikens upward player manages hit damazu bonus points awarded jajamaru-kun hit bomb goes next stage | [] | Test |
7,020 | 2 | BatteryMAX_(idle_detection):batterymax idle detection batterymax idle detection system used computer power management operating system control developed digital research inc. european development centre edc hungerford uk created address new genre portable personal computers laptops ran battery power also integral part novell palmdos 1.0 operating system tailored early palmtops 1992 power saving laptop computers traditionally relied hardware inactivity timers determine whether computer idle would typically take several minutes computer could identify idle behavior switch lower power consumption state monitoring software applications within operating system batterymax able reduce time taken detect idle behavior minutes microseconds moreover switch power states around 18 times second user keystrokes technique named dynamic idle detection includes halting stopping cpu periods microseconds hardware event occurs restart dr dos 5.0 first personal computer operating system incorporate idle detection system power management invented british engineers roger gross john p. constant august 1989 us patent describing idle detection system filed 9 march 1990 granted 11 october 1994 despite taking early lead protection patent batterymax enjoy significant commercial success sidelined disarray followed integration digital research novell inc. 1991 1992 three years invention software power management operating system control became ubiquitous following launch advanced power management apm microsoft intel batterymax uses technique dynamic idle detection provide power savings detecting application whether idle switching power states entering low power mode therefore extending battery life product batterymax employs layered model detection software encapsulated dos character device driver called idle contains hardware-dependent code support dynamic idle detection either linked dr-dos operating system bios loaded dynamically using config.sys device directive overloading built-in default driver versions dr-dos since version 5.0 contained dynamic idle detection support inside operating system kernel operating system believes application idle calls idle bios/driver layer executes custom code written computer manufacturer third parties verify request switch power states using device driver concept batterymax integrated hardware-related power management facilities might provided underlying hardware including interfacing apm acpi system bioses power states computer dependent vary manufacturer manufacturer power savings made number ways including slowing/stopping processor clock speed shutting power complete sub-systems switching power states codice_1 driver uses available hardware assistance detect application accessing components system example application may polling serial port updating graphics screen case device driver determines application fact idle overrides kernel call switch power states passing information back layers allowing application execution resume application idle waiting external event occur example keystroke mouse movement fixed amount time pass dr-dos kernel monitors dos api calls building profile applications behavior certain combinations api calls suggest application idle codice_1 driver able make subtle distinction program genuinely idle instance one polling keyboard tight loop one active also polling keyboard test abort key pressed driver makes distinction monitoring time taken go idle time within specified period driver assumes program idle e.g polling tight loop key pressed time outside specified limit driver assumes processing occurred polling keyboard allows application execution resume without switching power states local variable idle_cntdn specifies time actual time taken go idle compared value variable dynamically calculated initialization recalculated periodically idle detection technique first used improve multi-tasking single-tasking dos applications digital research multi-tasking/multi-user concurrent dos 386 cdos386 operating system programs written single-tasking operating systems ms-dos/pc dos go endless loops interrupted example waiting user press key whilst problem process waiting run wastes valuable processor time could used programs multi-tasking/multi-user environment like cdos386 applications designed multi-tasking environment use api calls sleep idle period time normal dos applications idle detection must used concurrent dos 386 release included idle detection function operating system kernel monitored dos api calls determine whether application useful work fact idle idle process suspended allowing dispatcher schedule another process execution batterymax idle detection patent played important role alleged patent infringement relating software power management operating system control 15 may 2009 st. clair intellectual property consultants inc. filed civil action 09-354 united states district court d. delaware defendants acer inc. dell inc. gateway inc. lenovo group inc. 18 september 2009 filed civil action 09-704 apple inc. toshiba corporation inc actions alleged infringement several u.s. patents owned relating software power management operating system control st. clair asserted henry fung invented software power management operating system control alleged companies infringed st. clair patents therefore owed st. clair royalty payments microsoft intervened behalf defendants filed declaratory judgment st. clair 7 april 2010 seeking judgments non-infringement invalidity fung patents d.i 1 c.a 10-282 intel corporation filed intervention behalf defendants granted 4 june 2010 d.i 178 c.a 09-354 seattle law firm perkins coie llp acting defendants discovered batterymax gross idle detection patent prior art search gross patent earlier priority date fung patents proven would undermine st. clair case 28 february 2011 gross hired intel subject matter expert provide expert witness testimony defendants case gross provided evidence expert report fung invented software power management operating system control sited idle detection patent existence batterymax proof st clair filed motion exclude opinions concerning batterymax attempt gross expert report dismissed 29 march 2013 district court denied st. clair motion declaring gross testimony defendants admissible stating court agrees defendants sufficient corroborating evidence batterymax available public prior fung patents priority date court concludes even batterymax predate fung patents mr gross testimony … would relevant helpful fact finder obviousness inquiry ” | [
364,
4843,
2280,
2010,
8087,
5571,
126,
3210,
7032,
3664,
1052,
1894,
2160,
6496,
972,
8043,
4745
] | Test |
7,021 | 6 | Working_directory:working directory computing working directory process directory hierarchical file system dynamically associated process sometimes called current working directory cwd e.g bsd function current directory process refers file using simple file name relative path opposed file designated full path root directory reference interpreted relative current working directory process example process working directory /rabbit-shoes asks create file foo.txt end creating file /rabbit-shoes/foo.txt computer file systems every directory entry usually named points directory dos unix command shells well microsoft windows command line interpreters cmd.exe windows powershell working directory changed using cd chdir commands unix shells pwd command outputs full pathname current working directory equivalent command dos windows cd chdir without arguments whereas unix cd used without arguments takes user back his/her home directory environment variable pwd unix/linux shells pseudo-environment variables cd windows command.com cmd.exe os/2 dos _cwd _cwds _cwp _cwps 4dos 4os2 4nt etc used scripts one need start external program microsoft windows file shortcuts ability store working directory command.com dr-dos 7.02 higher provides echos variant echo command omitting terminating linefeed used create temporary batchjob storing current directory environment variable like cd later use example alternatively multiuser dos dr-dos 7.02 higher various internal external commands support parameter /b batch modifies output commands become suitable direct command line input redirecting batch file usage parameter commands using input another command chdir would issue directory path like codice_1 command like chdir /b would issue codice_2 instead chdir /b retdir.bat would create temporary batchjob allowing return directory later current working directory also displayed p token codice_3 command keep prompt short even inside deep subdirectory structures dr-dos 7.07 command.com supports w token display deepest subdirectory level default prompt p g would result f.e codice_4 codice_5 prompt n w g would instead yield codice_6 codice_7 respectively similar facility using w w added 4dos well dos absolute paths current working directories volumes internaly stored array-like data structure called current directory structure cds gets dynamically allocated boot time hold necessary number slots drives defined lastdrive structure imposes length-limit 66 characters full path current working directory thus implicitly also limits maximum possible depth subdirectories dos plus older issues dr dos dr dos 6.0 1991 limitation due implementation using dos emulation top concurrent dos- thus cp/m-86- derived kernel internally organized subdirectories relative links parent directories instead absolute paths since palmdos dr dos 6.0 since 1992 higher switched use cds maximum compatibility dos programs well faced limitations present doses programming languages provide interface file system functions operating system including ability set change working directory program c language posix function codice_8 effects system call changes working directory argument text string path new directory either absolute relative old one available called process set working directory function languages visual basic usually spelled codice_9 unlike windows api posix c function neither java programming language java virtual machine supports codice_8 directly change request remained open decade team responsible java considered alternatives though 2008 request denied limited support introduced affecting first codice_11 later codice_12 | [
3431,
1254,
4759,
7718,
4771,
5480,
5571,
126,
5942,
3033,
7662,
3137,
3491,
5783,
3417,
2528,
6952,
4017,
1435,
4020
] | Test |
7,022 | 1 | Imieliński-Lipski_algebra:imieliński-lipski algebra imieliński-lipski algebras extension relational algebra onto tables different types null values used operate relations incomplete information imieliński-lipski algebras defined satisfy precise conditions semantically meaningful extension usual relational operators projection selection union join operators relations operators relations various kinds null values conditions require system safe sense incorrect conclusion derivable using specified subset f relational operators complete sense valid conclusions expressible relational expressions using operators f fact derivable system example well known 3-valued logic approach deal null values supported treatment nulls values sql complete see ullman book show let take sql query q sql query q return empty set results 3-valued semantics currently adopted variants sql case sql null never equal constant – case neither “ spring ” “ fall ” “ winter ” winter semester school codice_1 evaluate maybe codice_2 disjunction maybe maybe evaluates maybe true thus igor part answer course neither rohit igor returned answer indeed regardless semester igor took networks class matter unknown value null selection condition true “ igor ” missed sql sql answer ’ complete according completeness requirements specified tomasz imieliński witold lipski 'incomplete information relational databases also argued 3-valued logic true false maybe never provide guarantee complete answer tables incomplete information three algebras satisfy conditions safety completeness defined imielinski-lipski algebras codd-tables algebra v-tables algebra conditional tables c-tables algebra codd-tables algebra based usual codd singe null values table example codd-table codd-table algebra supports projection positive selections also demonstrated il84 possible correctly extend relational operators codd-tables example basic operation join extendable codd-tables possible define selections boolean conditions involving negation preserve completeness example queries like query q supported order able extend relational operators expressive form null value representation needed tables called v-table v-tables algebra based many different marked null values variables allowed appear table v-tables allow show value may unknown different tuples example table gaurav igor order unknown beer two unknown bars may may different – remain unknown gaurav jane frequent unknown bad y1 thus instead one null value use indexed variables skolem constants v-tables algebra shown correctly support projection positive selection negation occurring selection condition union renaming attributes allows processing arbitrary conjunctive queries desirable property enjoyed v-table algebra relational operators tables performed exactly way case usual relations example conditional table c-table shown additional column “ con ” boolean condition involving variables null values – v-tables following table c-table conditional tables algebra mainly theoretical interest supports projection selection union join renaming closed world assumption also handle operator difference thus support relational operators imieliński-lipski algebras introduced tomasz imieliński witold lipski jr. 'incomplete information relational databases | [
1449,
7248,
5209,
1730,
3951,
3776,
3011,
4950,
6543,
2124,
6462,
2054,
7205,
684,
7303,
4274,
1891,
4457,
1792,
784
] | Test |
7,023 | 4 | Oulu_University_Secure_Programming_Group:oulu university secure programming group oulu university secure programming group ouspg research group university oulu studies evaluates develops methods implementing testing application system software order prevent discover eliminate implementation level security vulnerabilities pro-active fashion focus implementation level security issues software security testing ouspg active independent academic research group computer engineering laboratory department electrical information engineering university oulu since summer 1996 ouspg known participation protocol implementation security testing called robustness testing using protos mini-simulation method protos co-operated project vtt number industrial partners project developed different approaches testing implementations protocols using black-box i.e functional testing methods goal support pro-active elimination faults information security implications promote awareness issues develop methods support customer driven evaluation acceptance testing implementations improving security robustness products attempted supporting development process notable result protos project result c06-snmp test suite discovered multiple vulnerabilities snmp work done protos continued protos-genome applies automatic structure inference combined domain specific reasoning capabilities enable automated black-box program robustness testing tools without prior knowledge protocol grammar work resulted large number vulnerabilities found archive file antivirus products group produced two spin-off companies codenomicon continues work protos clarified networks work frontier | [
3932,
2747,
1471,
2219
] | Train |
7,024 | 2 | Basic_telecommunications_access_method:basic telecommunications access method basic telecommunications access method btam low-level programming interface specified ibm use ibm system/360 start-stop binary synchronous telecommunications terminals later ibm specified higher-level interfaces qtam tcam btam superseded vtam systems network architecture sna devices btam continued supported later iterations system architecture ibm finally withdrew support 2000 btam requires application program transaction processing system handle almost every detail protocol harder using higher-layer protocol permits interfacing non-standard devices non-standard ways btam access method interactively communicating remote terminals usually connected front end processor 270x although support local channel-attached 3270 terminals included btam dynamically builds channel command words ccws reading writing polling terminals deals specific responses terminals according success failure communication channel btam key component ibm early transaction processing systems mtcs cics ims underpinned rise online transaction processing many large commercial banks insurance companies unusual btam later developed access methods vtam co-exist supporting different devices simultaneously transaction processing system material section taken ibm system/360 operating system basic telecommunications access method gc30-2004-6 btam programming requires detailed knowledge characteristics specific terminals used dcb macro used define communications line group br codice_1 br codice_2 coded specify binary synchronous bisync line many operands specify unique characteristics attached terminals terminal list specified codice_3 macro identifies terminals attached line macro specifies line characteristics—start-stop bisync point-to-point multipoint leased line dial — type polling required— wrap around open polling characters telephone number used identify specific remote device line coded codice_4 macro used modify information specific device list execution wrap-around polling list cause device list polled sequentially channel response received reduces load cpu continuous polling programmer specify buffer pool data structure used hold messages transmitted terminals btam construct pool automatically programmer construct pool various ways build macro format pool static dynamic storage previously acquired codice_5 macro acquire format storage automatically read operations btam automatically obtain one buffers pool store received message write operation programmer needs code codice_6 obtain number buffers necessary build output message either case codice_7 used free buffers completion read write tha codice_8 codice_9 include translation tables translate non ebcdic character codes standard os/360 codice_10 codice_11 macros used initiate terminate processing btam line codice_12 macro reinitialize line whatever reason failed open successfully btam provides large number options codice_13 codice_14 macros depending line terminal types current status operations read initial reset read conversational read repeat write initial write break write continue transparent specified codes codice_15 read initial read write operation executed asynchronously channel following read write codice_16 codice_17 macro required wait completion retrieve ending status codice_18 macro cancels outstanding read and/or stops polling line amongst many devices supported btam handles | [
7331,
3951,
4145,
7003,
1851,
3209,
839,
7783,
1022,
5852,
7661,
2596,
607,
5081,
3233,
7040,
2438
] | Test |
7,025 | 1 | Hong_Kong_shipping_register:hong kong shipping register port hong kong deep water port located southern china one hub ports serving south-east east asia region gateway mainland china city hong kong began colony united kingdom free port became international trade center connecting land sea transport china countries port mature infrastructure well-developed air-sea-land transport helps hong kong maintain position international trade centre transshipment hub part 1997 transfer sovereignty hong kong britain china ship registration system made adjustments 1990 marine department set separate system hong kong shipping register ordinance hong kong ship registration amended accordingly new measures reduce operation cost ship management also improve service quality new system increased hong kong competitive advantage attracting ships port january 2009 hong kong registered ships reached 40.56 million tons 1,380 vessels | [
3787
] | Test |
7,026 | 7 | FMOD:fmod fmod proprietary sound effects engine authoring tool video games applications developed firelight technologies play mix sounds diverse formats many operating systems fmod sound system supplied programmer api authoring tool similar digital audio workstation fmod consists following technologies legacy products fmod sound system advanced plugin architecture used extend support audio formats develop new output types e.g streaming fmod available multiple license schemes fmod written portable c++ thus run many different pc mobile gaming console platforms including microsoft windows x86 x86-64 macos ios linux x86 x86-64 android blackberry wii wii u 3ds nintendo switch xbox xbox 360 xbox one playstation 2 playstation 3 playstation 4 playstation portable playstation vita google native client fmod contains support amd trueaudio sound blaster hardware acceleration fmod play back following audio formats aiff asf asx dls flac fsb fmod sample bank format m3u midi mod mp2 mp3 ogg vorbis pls s3m vag ps2/psp format wav wax windows media audio redirector wma xm xma xbox 360 well raw audio data fmod integrated primary sound-effects system following video game engines fmod used many high-profile commercial games since release partial list | [
1544,
1659,
5632,
4759,
5571,
5970,
352,
578,
5709,
2085
] | Test |
7,027 | 7 | Bytemark:bytemark bytemark uk-based server hosting datacentre provider headquartered york united kingdom founded 2002 bytemark computer consulting ltd bytemark first provider virtual machines cloud hosting user-mode linux 2003 2012 bytemark launched bigv public cloud platform designed completely in-house using open source software 2013 bytemark moved £1.2 million datacentre headquarters york yo26 2017 bigv platform renamed bytemark cloud september 2018 bytemark acquired iomart group plc yo26 datacentre uses fresh-air cooling common uk shortlisted innovation medium data center datacenterdynamics awards emea 2013 bytemark servers built using efficient power supplies certified 80plus scheme requires power supplies least 80 efficient 100 rated load reduce bias found traditional recruitment processes bytemark developed anonymous recruitment process 2015 2014 bytemark named one top 50 fastest grown tech companies north northern tech awards revenue growth 44 financially bytemark turned £2.5 million 2013 2014 grew £3 million 2015 bytemark awarded fair tax mark bytemark history contributing supporting free software bytemark offers ongoing discount least 5 free software publishers bytemark support libreoffice provision build server 2009 bytemark became supporter xbmc 2012 bytemark started supporting cyanogenmod build servers 2013 bytemark contributed hosting services worth £150,000 debian project used debian since company founded bytemark also supports openstreetmap dns services servers support version control mailing lists help pages bytemark also support projects social good including sponsoring servers mysociety including fixmystreet theyworkforyou whatdotheyknow | [
2961
] | Test |
7,028 | 7 | Firefox_Sync:firefox sync firefox sync originally branded mozilla weave browser synchronization feature allows users partially synchronize bookmarks browsing history preferences passwords filled forms add-ons last 25 opened tabs across multiple computers keeps user data mozilla servers according mozilla data encrypted way third party even mozilla access user information also possible user host firefox sync servers indeed entity firefox sync originally add-on mozilla firefox 3.x seamonkey 2.0 built-in feature since firefox 4.0 seamonkey 2.1 firefox sync built top firefox accounts firefox 29 therefore firefox 29 later sync firefox 28 earlier firefox home companion application iphone ipod touch based firefox sync technology allowed users either device access firefox browsing history bookmarks recent tabs also included firefox awesomebar location bar firefox home browser application launches pages either webkit web viewer safari mozilla pulled firefox home app store september 2012 stating would focus resources projects company subsequently released source code firefox home underlying synchronization software december 2014 mozilla announced designing version firefox ios due apple application review policies firefox use built-in ios webkit-based rendering framework instead gecko browser able sync firefox browsing history bookmarks recent tabs mozilla also offers synchronization server application use firefox sync users businesses prefer host synchronization data | [
1152,
6788,
4755,
893,
5549,
7975,
6802,
5571,
1190,
3548,
6368,
6458,
7015,
2049,
5506,
4352,
7028,
340,
6312,
5699,
3915,
7587,
5263,
5887,
445,
4287
] | Validation |
7,029 | 2 | Network_Driver_Interface_Specification:network driver interface specification network driver interface specification ndis application programming interface api network interface cards nics jointly developed microsoft 3com corporation mostly used microsoft windows however open-source ndiswrapper project evil driver wrapper projects allow many ndis-compliant nics used linux freebsd netbsd magnussoft zeta derivative beos supports number ndis drivers ndis forms logical link control llc sublayer upper sublayer osi data link layer layer 2 therefore ndis acts interface media access control mac sublayer lower sublayer data link layer network layer layer 3 ndis library functions often referred wrapper hides underlying complexity nic hardware serves standard interface level 3 network protocol drivers hardware level mac drivers ndis versions supported various windows versions follows traffic accepted nic controlled ndis miniport driver various protocols tcp/ip implemented ndis protocol drivers single miniport may associated one protocols means traffic coming miniport may received parallel several protocol drivers example winpcap adds second protocol driver selected miniport order capture incoming packets furthermore possible simulate several virtual nics implementing virtual miniport drivers send receive traffic single physical nic one example virtual miniport driver usage add virtual nics different virtual lan implementations assume drivers received buffers one must treat incoming buffers read driver changes packet content must allocate buffers miniport type hardware driver part windows driver model usb audio scsi network card adapters usually source binary compatible windows 98 windows 2000 hardware specific control access hardware specific bus class driver another driver type ndis intermediate driver intermediate drivers sit in-between mac ip layers control traffic accepted nic practice intermediate drivers implement miniport protocol interfaces miniport driver protocol driver actually communicate corresponding miniport protocol interfaces reside intermediate driver design enables adding several chained intermediate drivers miniport protocol drivers therefore driver vendors assume interface send traffic implemented last driver chain order write applications using ndis one use samples accompany microsoft windows driver kit wdk passthru sample good starting point intermediate drivers implements necessary details required driver type passes traffic next driver chain | [
7149,
1813,
6420,
714,
720,
1460,
1093,
2928,
7907,
5747,
5760,
1119,
2953,
6840,
422,
4017,
6504,
4022,
4026,
7607,
1526,
458,
3687,
4759,
7621,
2283,
5479,
7263,
5492,
5850,
7657,
150,
6933,
519,
3052,
4448,
3407,
1232,
2702,
7687,
19... | Test |
7,030 | 2 | Bada:bada bada stylized bada korean discontinued operating system mobile devices smartphones tablet computers developed samsung electronics name derived bada meaning ocean sea korean ranges mid- high-end smartphones foster adoption bada os since 2011 samsung reportedly considered releasing source code open-source license expanding device support include smart tvs samsung announced june 2012 intentions merge bada tizen project would meanwhile use bada operating system parallel google android os microsoft windows phone smartphones devices running bada branded wave name unlike samsung devices branded name galaxy encompass whole range samsung devices running android 25 february 2013 samsung announced would stop developing bada moving development tizen instead bug reporting finally terminated april 2014 announcement bada wave s8500 would eventually turn first bada-based phone first shown public mobile world congress 2010 barcelona february 2010 alongside bada applications running bada exhibited including mobile videogames like gameloft asphalt 5 samsung wave s8500 released april year sold one million handsets first four weeks market according samsung companies twitter ea capcom gameloft blockbuster revealed support bada platform arranged development partnerships samsung since launch shared insights vision future mobile apps bada would play role showcase could heard series events held across world year 2010 called developer days addition made public announcement incoming bada developer challenge total prize 2,700,000 usd throughout launch event may 2010 samsung released beta bada software development kit sdk making available general public done partners previous december entice potential developers applications platform august 2010 samsung released version 1.0 bada sdk year later august 2011 version 2.0 bada sdk released samsung s8500 wave launched version 1.0 bada operating system samsung soon released version 1.0.2 included minor fixes european users latest version 1.2 released samsung s8530 wave ii phone alpha-version bada 2.0 introduced 15 february 2011 samsung s8530 wave ii handset current flagship bada handset samsung wave 3 s8600 running bada 2.0 release samsung wave samsung opened international application store samsung apps bada platform samsung apps 2400 applications store also available android samsung feature phones samsung remove bada brand market new os tizen apps store new store around 1000 applications tizen bada samsung defines operating system platform kernel configurable architecture allows using either proprietary real-time operating system hybrid rtos kernel linux kernel according copyrights displayed samsung wave s8500 uses code freebsd netbsd openbsd despite numerous suggestions known bada device date running linux kernel similarly evidence bada uses similar graphics stack tizen os particular efl device layer provides core functions graphics protocols telephony security service layer provides service-centric features sms mapping in-app-purchasing provide features so-called bada server top layer framework layer provides application programming interface api c++ application developers use bada provides various ui controls developers provides assorted basic ui controls listbox color picker tab web browser control based open-source webkit features adobe flash supporting flash 9 10 11 flash lite 4 actionscript 3.0 support bada 2.0 webkit flash embedded inside native bada applications bada supports opengl es 2.0 3d graphics api offers interactive mapping point interest poi features also embedded inside native applications supports pinch-to-zoom tabbed browsing cut copy paste features bada supports many mechanisms enhance interaction incorporated applications include various sensors motion sensing vibration control face detection accelerometer magnetometer tilt global positioning system gps multi-touch native applications developed c++ bada sdk eclipse based integrated development environment ide gnu-based tool chains used building debugging applications ide also contains ui builder developers easily design interface applications dragging dropping ui controls forms testing debugging ide contains emulator run apps publications criticized bada 1.x following issues bada 2.0 version shown ifa 2011 berlin released end december 2011 lot new functions improvements compared version 1.2 introducing features end 2011 samsung released three new models preloaded bada 2.0 ending list devices running short-lived bada chart show global sales bada smartphones second quarter 2010 second quarter 2013 canalys technology market analysis company estimated samsung shipped 3.5 million phones running bada q1 2011 rose 4.5 million phones q2 2011 according gartner q1 2012 bada gained grow index +43 rose 2.7 market share 1.9 q1 2011 south korea fiscal year calendar year | [
1522,
5803,
3081,
2187,
1921,
4400,
3097,
474,
2017,
2564,
5391,
2300,
5486,
5571,
5579,
740,
1659,
5236,
42,
3559,
5062,
1399,
3039,
1582,
5068,
2503,
2240,
6132,
424,
4819,
5872,
2520,
7126,
4549,
2071,
349,
3751,
4912,
7871,
5794,
61... | Train |
7,031 | 4 | Dwight_Agnew:dwight agnew dwight merle agnew january 1 1902 – october 4 1969 united states navy officer fredericktown ohio destroyer commander world present attack pearl harbor later received navy cross tactical acumen guadalcanal campaign post-war led destroyer squadron 10 later worked national security agency 1956 moved retired list made tombstone admiral agnew married thelma marie biegler daughter united states army officer medal honor recipient george w. biegler dwight agnew born fredericktown ohio january 1 1902 murray agnew emma louise agnew née follin graduating fredericktown high school briefly attended denison university entering united states naval academy graduated naval academy 1926 commissioned ensign prior world war ii agnew held variety shipboard postings serving aboard time nevada number four gun turret crew – leadership – trenchard medal excellence gunnery japanese attack pearl harbor december 7 1941 agnew family – dwight brother henry sisters brothers-in-law latter also navy officers – stationed hawaii time agnew serving commanding officer uss trever destroyer minesweeper like many american ship captains agnew aboard vessel attack began 0755 december 7 command junior officers uss trever sounded general alarm 0757 began returning fire japanese forces seven minutes later successfully downing imperial japanese navy air service aircraft strafing pearl city yacht club well second aircraft maneuvering attack ship frantic orders sortie fleet resulted agnew left behind aboard trever instead putting sea commander helm following attack wasmuth rendezvoused trever agnew rejoined ship trever depth charges already armed set agnew ordered magnetic sweep harbor taking defensive station harbor mouth protect feared second wave attack materialize following week december 14 agnew led trever rescue crew passengers torpedoed norwegian freighter ms høegh merchant høegh merchant sunk japanese submarine attempting navigate safe port following outbreak hostilities august 1942 agnew promoted captain continuing commanding officer agnew received navy cross tactical brilliance repelling attack imperial japanese navy upon trever task unit leading guadalcanal campaign according citation 1943 transferred san francisco california oversee outfitting new subsequently commanding ship engagements pacific received bronze star agnew given command attack transport 1945 commanded battle iwo jima following world war ii agnew held variety staff assignments navy – including naval representative joint american military mission aid turkey – january 1952 february 1953 commanding officer destroyer squadron 10 united states atlantic fleet final three years military career 1956 retirement assigned national security agency upon retirement advanced rank rear admiral died october 4 1969 october 1929 agnew married thelma marie biegler daughter army officer george w. biegler following outbreak world thelma agnew son dwight agnew jr evacuated san diego stay dwight agnew mother living city agnew brother henry also alumnus u.s naval academy instructor academy also held several shipboard assignments world given command post-war period sisters dorothy elizabeth married naval officers | [] | Validation |
7,032 | 9 | Scheme_(programming_language):scheme programming language scheme programming language supports multiple paradigms including functional imperative programming one three main dialects lisp alongside common lisp clojure unlike common lisp scheme follows minimalist design philosophy specifying small standard core powerful tools language extension scheme created 1970s mit ai lab released developers guy l. steele gerald jay sussman via series memos known lambda papers first dialect lisp choose lexical scope first require implementations perform tail-call optimization giving stronger support functional programming associated techniques recursive algorithms also one first programming languages support first-class continuations significant influence effort led development common lisp scheme language standardized official ieee standard de facto standard called revised report algorithmic language scheme r n rs widely implemented standard r5rs 1998 new standard r6rs ratified 2007 scheme diverse user base due compactness elegance minimalist philosophy also caused wide divergence practical implementations much scheme steering committee calls world unportable programming language family dialects rather single language scheme started 1970s attempt understand carl hewitt actor model purpose steele sussman wrote tiny lisp interpreter using maclisp added mechanisms creating actors sending messages scheme originally called schemer tradition lisp-derived languages planner conniver current name resulted authors use operating system limited filenames two components six characters currently schemer commonly used refer scheme programmer new language standardization process began 2003 scheme workshop goal producing r6rs standard 2006 process broke earlier r n rs approach unanimity r6rs features standard module system allowing split core language libraries number drafts r6rs specification released final version r5.97rs successful vote resulted ratification new standard announced august 28 2007 currently newest releases various scheme implementations support r6rs standard portable reference implementation proposed implicitly phased libraries r6rs called psyntax loads bootstraps properly various older scheme implementations feature r6rs record-type descriptor rtd rtd created used record type representation show memory layout also calculated object field bit mask mutable scheme object field bit masks helped garbage collector know fields without traversing whole fields list saved rtd rtd allows users expand basic rtd create new record system r6rs introduces numerous significant changes language source code specified unicode large subset unicode characters may appear scheme symbols identifiers minor changes lexical rules character data also specified unicode many standard procedures moved new standard libraries form large expansion standard containing procedures syntactic forms formerly part standard new module system introduced systems exception handling standardized syntax-rules replaced expressive syntactic abstraction facility syntax-case allows use scheme macro expansion time compliant implementations required support scheme full numeric tower semantics numbers expanded mainly direction support ieee 754 standard floating point numerical representation r6rs standard caused controversy seen departed minimalist philosophy august 2009 scheme steering committee oversees standardization process announced intention recommend splitting scheme two languages large modern programming language programmers small version subset large version retaining minimalism praised educators casual implementors two working groups created work two new versions scheme scheme reports process site links working groups charters public discussions issue tracking system ninth draft r7rs small language made available april 15 2013 vote ratifying draft closed may 20 2013 final report available since august 6 2013 describing 'small language effort therefore considered isolation successor r6rs scheme primarily functional programming language shares many characteristics members lisp programming language family scheme simple syntax based s-expressions parenthesized lists prefix operator followed arguments scheme programs thus consist sequences nested lists lists also main data structure scheme leading close equivalence source code data formats homoiconicity scheme programs easily create evaluate pieces scheme code dynamically reliance lists data structures shared lisp dialects scheme inherits rich set list-processing primitives codice_1 codice_2 codice_3 lisp progenitors scheme uses strictly dynamically typed variables supports first class procedures thus procedures assigned values variables passed arguments procedures section concentrates mainly innovative features language including features distinguish scheme lisps unless stated otherwise descriptions features relate r5rs standard examples provided section notation === result used indicate result evaluating expression immediately preceding line convention used r5rs subsection describes features scheme distinguished programming languages earliest days aspects scheme strongly influence product scheme language aspects versions scheme programming language 1973 onward share scheme simple language much easier implement many languages comparable expressive power ease attributable use lambda calculus derive much syntax language primitive forms instance 23 s-expression-based syntactic constructs defined r5rs scheme standard 14 classed derived library forms written macros involving fundamental forms principally lambda r5rs says r5rs sec 3.1 fundamental variable binding constructs lambda expression variable binding constructs explained terms lambda expressions example macro implement codice_4 expression using codice_5 perform variable bindings define-syntax let thus using codice_4 defined scheme implementation would rewrite codice_7 codice_8 reduces implementation task coding procedure instantiations 1998 sussman steele remarked minimalism scheme conscious design goal rather unintended outcome design process actually trying build something complicated discovered serendipitously accidentally designed something met goals much simpler intended ... realized lambda calculus—a small simple formalism—could serve core powerful expressive programming language like modern programming languages unlike earlier lisps maclisp scheme lexically scoped possible variable bindings program unit analyzed reading text program unit without consideration contexts may called contrasts dynamic scoping characteristic early lisp dialects processing costs associated primitive textual substitution methods used implement lexical scoping algorithms compilers interpreters day lisps perfectly possible reference free variable inside procedure refer quite distinct bindings external procedure depending context call impetus incorporate lexical scoping unusual scoping model early 1970s new version lisp came sussman studies algol suggested algol-like lexical scoping mechanisms would help realize initial goal implementing hewitt actor model lisp key insights introduce lexical scoping lisp dialect popularized sussman steele 1975 lambda paper scheme interpreter extended lambda calculus adopted concept lexical closure page 21 described ai memo 1970 joel moses attributed idea peter j. landin alonzo church mathematical notation lambda calculus inspired lisp use lambda keyword introducing procedure well influencing development functional programming techniques involving use higher-order functions lisp early lisps suitable expressions lambda calculus treatment free variables formal lambda system axioms complete calculation rule helpful analysis using mathematical logic tools system calculation seen directional deduction syntax lambda calculus follows recursive expressions x z ... parentheses spaces period symbol λ function lambda calculation includes first serve starting point powerful mathematical logic second reduce requirement programmers consider implementation details use imitate machine evaluation finally lambda calculation created substantial meta-theory introduction lexical scope resolved problem making equivalence forms lambda notation practical expression working programming language sussman steele showed new language could used elegantly derive imperative declarative semantics programming languages including algol fortran dynamic scope lisps using lambda expressions simple procedure instantiations control structures environment modifiers introduced continuation-passing style along first description scheme first lambda papers subsequent papers proceeded demonstrate raw power practical use lambda calculus scheme inherits block structure earlier block structured languages particularly algol scheme blocks implemented three binding constructs codice_4 codice_10 codice_11 instance following construct creates block symbol called codice_12 bound number 10 let var 10 blocks nested create arbitrarily complex block structures according need programmer use block structuring create local bindings alleviates risk namespace collision otherwise occur one variant codice_4 codice_10 permits bindings refer variables defined earlier construct thus variant codice_11 designed enable mutually recursive procedures bound one another === 1 0 1 0 2 1 2 2 3 2 3 3 4 4 5 4 5 5 procedures bound single codice_11 may refer one another name well values variables defined earlier codice_11 may refer values defined later codice_11 variant codice_4 named let form identifier codice_4 keyword binds let variables argument procedure whose name given identifier whose body body let form body may repeated desired calling procedure named let widely used implement iteration example simple counter === 1 2 3 4 5 6 7 8 9 10 like procedure scheme procedure created named let first class object scheme iteration construct codice_21 idiomatic scheme use tail recursion express iteration standard-conforming scheme implementations required optimize tail calls support unbounded number active tail calls r5rs sec 3.5 —a property scheme report describes proper tail recursion —making safe scheme programmers write iterative algorithms using recursive structures sometimes intuitive tail recursive procedures named codice_4 form provide support iteration using tail recursion === 0 1 4 9 16 25 36 49 64 81 continuations scheme first-class objects scheme provides procedure codice_23 also known codice_24 capture current continuation packing escape procedure bound formal argument procedure provided programmer r5rs sec 6.4 first-class continuations enable programmer create non-local control constructs iterators coroutines backtracking continuations used emulate behavior return statements imperative programming languages following function codice_25 given function codice_26 list codice_27 returns first element codice_28 codice_27 codice_30 returns true === 7 === f following example traditional programmer puzzle shows scheme handle continuations first-class objects binding variables passing arguments procedures let* yin executed code displays counting sequence codice_31 contrast common lisp data procedures scheme share common namespace whereas common lisp functions data separate namespaces making possible function variable name requiring special notation referring function value sometimes known lisp-1 vs. lisp-2 distinction referring unified namespace scheme separate namespaces common lisp scheme primitives used manipulate bind data used bind procedures equivalent common lisp codice_32 codice_33 primitives define f 10 f === 10 set f f f 6 f === 26 set f lambda n n 12 === 18 set f f 1 f === 13 apply 1 2 3 4 5 6 === 21 === 101 102 103 subsection documents design decisions taken years given scheme particular character direct outcomes original design scheme specifies comparatively full set numerical datatypes including complex rational types known scheme numerical tower r5rs sec 6.2 standard treats abstractions commit implementor particular internal representations numbers may quality exactness exact number produced sequence exact operations involving exact numbers—inexactness thus contagious standard specifies two implementations must produce equivalent results operations resulting exact numbers r5rs standard specifies procedures codice_34 codice_35 used change exactness number codice_35 produces exact number numerically closest argument codice_34 produces inexact number numerically closest argument r6rs standard omits procedures main report specifies r5rs compatibility procedures standard library rnrs r5rs 6 r5rs standard scheme implementations required implement whole numerical tower must implement coherent subset consistent purposes implementation spirit scheme language r5rs sec 6.2.3 new r6rs standard require implementation whole tower exact integer objects exact rational number objects practically unlimited size precision implement certain procedures ... always return exact results given exact arguments r6rs sec 3.4 sec 11.7.1 example 1 exact arithmetic implementation supports exact rational complex numbers define x 1/3 1/4 -1/5 -1/3i 405/50+2/3i x === 509/60+1/3i exact x === example 2 arithmetic implementation supports neither exact rational numbers complex numbers accept real numbers rational notation define xr 1/3 1/4 -1/5 405/50 define xi -1/3 2/3 xr === 8.48333333333333 xi === 0.333333333333333 exact xr === f === f implementations conform r5rs standard second conform r6rs implement full numerical tower scheme supports delayed evaluation codice_38 form procedure codice_39 === 22 === 70 === 22 lexical context original definition promise preserved value also preserved first use codice_39 promise ever evaluated primitives produce handle values known promises used implement advanced lazy evaluation constructs streams r6rs standard longer primitives instead provided part r5rs compatibility library rnrs r5rs 6 r5rs suggested implementation codice_38 codice_39 given implementing promise procedure arguments thunk using memoization ensure ever evaluated irrespective number times codice_39 called r5rs sec 6.4 srfi 41 enables expression finite infinite sequences extraordinary economy example definition fibonacci sequence using functions defined srfi 41 define fibs stream-ref fibs 99 === 218922995834555169026 lisps specify order evaluation procedure arguments scheme order evaluation—including order expression operator position evaluated—may chosen implementation call-by-call basis constraint effect concurrent evaluation operator operand expressions constrained consistent sequential order evaluation r5rs sec 4.1.3 === 3 ev procedure describes argument passed returns value argument contrast lisps appearance expression operator position first item scheme expression quite legal long result expression operator position procedure calling procedure add 1 2 expressions ev ev 1 ev 2 may evaluated order long effect evaluated parallel thus following three lines may displayed order standard scheme example code executed although text one line may interleaved another would violate sequential evaluation constraint r5rs standard also later reports syntax scheme easily extended via macro system r5rs standard introduced powerful hygienic macro system allows programmer add new syntactic constructs language using simple pattern matching sublanguage r5rs sec 4.3 prior hygienic macro system relegated appendix r4rs standard high level system alongside low level macro system treated extensions scheme rather essential part language implementations hygienic macro system also called codice_44 required respect lexical scoping rest language assured special naming scoping rules macro expansion avoids common programming errors occur macro systems programming languages r6rs specifies sophisticated transformation system codice_45 available language extension r5rs scheme time define-syntax invocations macros procedures bear close resemblance—both s-expressions—but treated differently compiler encounters s-expression program first checks see symbol defined syntactic keyword within current lexical scope attempts expand macro treating items tail s-expression arguments without compiling code evaluate process repeated recursively macro invocations remain syntactic keyword compiler compiles code evaluate arguments tail s-expression evaluate variable represented symbol head s-expression call procedure evaluated tail expressions passed actual arguments scheme implementations also provide additional macro systems among popular ones syntactic closures explicit renaming macros codice_46 non-hygienic macro system similar codice_47 system provided common lisp inability specify whether macro hygienic one shortcomings macro system alternative models expansion scope sets provide potential solution prior r5rs scheme standard equivalent codice_48 procedure ubiquitous lisps although first lambda paper described codice_49 similar lisp function eval first revised report 1978 replaced codice_50 took two arguments second third fourth revised reports omitted equivalent codice_48 reason confusion scheme lexical scoping result evaluating expression depends evaluated instance clear whether result evaluating following expression 5 6 evaluated outer environment codice_52 defined result sum operands evaluated inner environment symbol bound value procedure result product two operands r5rs resolves confusion specifying three procedures return environments providing procedure codice_48 takes s-expression environment evaluates expression environment provided r5rs sec 6.5 r6rs extends providing procedure called codice_54 programmer specify exactly objects import evaluation environment dialects lisp including common lisp convention value codice_55 evaluates value false boolean expression scheme since ieee standard 1991 values except f including codice_55 equivalent scheme written evaluate value true boolean expression r5rs sec 6.3.1 constant representing boolean value true codice_57 lisps scheme codice_58 scheme primitive datatypes disjoint one following predicates true scheme object codice_59 codice_60 codice_61 codice_62 codice_63 codice_64 codice_65 codice_66 codice_67 r5rs sec 3.2 within numerical datatype contrast numerical values overlap example integer value satisfies codice_68 codice_69 codice_70 codice_71 codice_62 predicates time r5rs sec 6.2 scheme three different types equivalence arbitrary objects denoted three different equivalence predicates relational operators testing equality codice_73 codice_74 codice_75 type dependent equivalence operations also exist scheme codice_83 codice_84 compare two strings latter performs case-independent comparison codice_85 codice_86 compare characters codice_87 compares numbers r5rs standard standard comment scheme semicolon makes rest line invisible scheme numerous implementations supported alternative conventions permitting comments extend single line r6rs standard permits two entire s-expression may turned comment commented preceding codice_88 introduced srfi 62 multiline comment block comment may produced surrounding text codice_89 codice_90 scheme input output based port datatype r5rs sec 6.6 r5rs defines two default ports accessible procedures codice_91 codice_92 correspond unix notions standard input standard output implementations also provide codice_93 redirection input standard output supported standard standard procedures codice_94 codice_95 implementations provide string ports similar redirection capabilities enabling many normal input-output operations performed string buffers instead files using procedures described srfi 6 r6rs standard specifies much sophisticated capable port procedures many new types port following examples written strict r5rs scheme example 1 output defaulting current-output-port example 2 1 using optional port argument output procedures example 3 1 output redirected newly created file let hello0 lambda display hello world newline example 4 2 explicit file open port close send output file example 5 2 using call-with-output-file send output file similar procedures provided input r5rs scheme provides predicates codice_96 codice_97 character input output codice_98 codice_99 codice_100 codice_101 provided writing reading scheme expressions scheme provides codice_102 codice_103 read operation result returned end-of-file object input port reached end file tested using predicate codice_104 addition standard srfi 28 defines basic formatting procedure resembling common lisp codice_105 function named scheme procedures bound variables r5rs language standard formally mandated programs may change variable bindings built-in procedures effectively redefining r5rs language changes example one may extend codice_106 accept strings well numbers redefining set === 6 === 123 r6rs every binding including standard ones belongs library exported bindings immutable r6rs sec 7.1 redefinition standard procedures mutation forbidden instead possible import different procedure name standard one effect similar redefinition standard scheme procedures convert one datatype another contain character string name predicates end procedures change value already-allocated data end conventions often followed scheme programmers formal contexts scheme standards word procedure used preference function refer lambda expression primitive procedure normal usage words procedure function used interchangeably procedure application sometimes referred formally combination lisps term thunk used scheme refer procedure arguments term proper tail recursion refers property scheme implementations perform tail-call optimization support indefinite number active tail calls form titles standards documents since r3rs revised report algorithmic language scheme reference title algol 60 standard document revised report algorithmic language algol 60 summary page r3rs closely modeled summary page algol 60 report language formally defined standards r5rs 1998 r6rs 2007 describe standard forms keywords accompanying syntax provide control structure language standard procedures perform common tasks table describes standard forms scheme forms appear one row easily classified single function language forms marked l table classed derived library forms standard often implemented macros using fundamental forms practice making task implementation much easier languages note codice_107 defined library syntax r5rs expander needs know achieve splicing functionality r6rs longer library syntax following two tables describe standard procedures r5rs scheme r6rs far extensive summary type would practical procedures appear one row easily classified single function language string character procedures contain -ci names perform case-independent comparisons arguments upper case lower case versions character taken equal implementations take two arguments defined left optional r5rs scheme minimalism many common procedures syntactic forms defined standard order keep core language small facilitate standardization extensions scheme community scheme request implementation srfi process extension libraries defined careful discussion extension proposals promotes code portability many srfis supported scheme implementations srfis fairly wide support different implementations include elegant minimalist design made scheme popular target language designers hobbyists educators small size typical interpreter also popular choice embedded systems scripting resulted scores implementations differ much porting programs one implementation another quite difficult small size standard language means writing useful program great complexity standard portable scheme almost impossible r6rs standard specifies much broader language attempt broaden appeal programmers almost implementations provide traditional lisp-style read–eval–print loop development debugging many also compile scheme programs executable binary support embedding scheme code programs written languages also common relative simplicity scheme implementations makes popular choice adding scripting capabilities larger systems developed languages c. gambit chicken bigloo scheme interpreters compile scheme c makes embedding particularly easy addition bigloo compiler configured generate jvm bytecode also features experimental bytecode generator .net implementations support additional features example kawa jscheme provide integration java classes scheme c compilers often make easy use external libraries written c allowing embedding actual c code scheme source another example pvts offers set visual tools supporting learning scheme scheme widely used number schools particular number introductory computer science courses use scheme conjunction textbook structure interpretation computer programs sicp past 12 years plt run programbydesign formerly teachscheme project exposed close 600 high school teachers thousands high school students rudimentary scheme programming mit old introductory programming class 6.001 taught scheme although 6.001 replaced modern courses sicp continues taught mit textbook design programs matthias felleisen currently northeastern university used institutes higher education introductory computer science courses northeastern university worcester polytechnic institute use scheme exclusively introductory courses fundamentals computer science cs2500 introduction program design cs1101 respectively rose-hulman uses scheme advanced programming language concepts course indiana university introductory class c211 taught entirely scheme introductory class uc berkeley cs 61a 2015 taught entirely scheme save minor diversions logo demonstrate dynamic scope course materials including lecture webcasts available online free charge self-paced version course cs 61as continues use scheme introductory computer science courses yale grinnell college also taught scheme programming design paradigms mandatory course computer science graduate students northeastern university also extensively uses scheme introductory computer science course university minnesota twin cities csci 1901 also uses scheme primary language followed course introduces students java programming language software industry tata consultancy services asia largest software consultancy firm uses scheme month-long training program fresh college graduates scheme is/was also used following | [
2176,
7878,
1445,
4302,
1820,
4669,
3944,
5019,
1450,
6796,
6087,
1825,
2915,
5731,
6428,
1086,
5734,
3968,
1476,
5397,
1478,
1854,
2218,
4704,
4705,
1804,
5757,
6116,
5056,
1114,
1116,
6471,
7204,
5420,
7573,
2600,
5077,
1885,
3664,
1889... | Test |
7,033 | 2 | Mklivecd:mklivecd mklivecd script linux distributions allows one compile snapshot current hard drive partition data resides settings applications documents bookmarks etc compress iso 9660 cd-image allows easy backup user data also makes easy create customized linux-distribution linux-distributions like pclinuxos include graphical frontend easier script usage | [
3919,
2228,
788
] | Test |
7,034 | 7 | Apcera:apcera apcera american cloud infrastructure company provides container management platform deploy orchestrate govern containers applications across on-premises cloud-based infrastructure apcera founded 2012 san francisco derek collison previously technology leader google tibco vmware designed first open platform-as-a-service paas cloud foundry apcera ’ primary offering apcera cloud platform provides governance security policy driven model allowing safe deployment management cloud-native applications microservices legacy applications well resources network services access user permissions according forbes tech apcera cloud platform enables clients manage migration legacy infrastructure newer approaches ... allows achieve significantly faster time-to-market … critical deployments without sacrificing crucial security requirements ” september 2014 ericsson acquired majority stake apcera cloud policy compliance apcera cloud platform available two forms community edition enterprise edition community edition free used deployment single infrastructure enterprise edition functionality deploy workloads multiple infrastructures apcera cloud platform allows user create set rules control available resources container level addition allows user connect back-end services outside platform maintaining governance allows users build workload move around container without re-writing code — needs connections made containers apcera also develops provides support several open source software projects including nats cloud-native enterprise messaging system kurma container runtime extensibility flexibility libretto golang virtual machine provisioning library public private clouds apcera ’ customers include nextsource ericsson qualcomm cygate rodan fields | [
993,
6874
] | Test |
7,035 | 6 | FAT_filesystem_and_Linux:fat filesystem linux linux several filesystem drivers file allocation table fat filesystem format commonly known names used codice_1 command invoke particular drivers kernel msdos vfat umsdos linux filesystem drivers support three fat types namely fat12 fat16 fat32 differ provision support long filenames beyond 8.3 filename structure original fat filesystem format provision unix file semantics exist standard fat filesystem format file permissions filesystem drivers mutually exclusive one used mount given disk volume given time thus choice among determined long filenames unix semantics support use one wants make disk volume msdos filesystem driver provides extra unix file semantics long filename support fat disk filesystem mounted using driver 8.3 filenames visible long filenames accessible long filename data structures kind disk volume maintained vfat filesystem driver provides long filename support using disk data structures microsoft windows uses vfat long filename support fat format volumes support extra unix file semantics umsdos filesystem driver provides long filename support extra unix file semantics however using on-disk data structures recognized filesystem drivers operating systems linux key advantage umsdos three provides full unix file semantics therefore used situations desirable install linux run fat disk volume require semantics available however linux installed running disk volume slower linux installed running disk volume formatted example ext2 filesystem format unless utility program regularly run every time one switches running windows running linux certain changes made files directories disk windows cause error messages inaccessible files linux vfat whilst lacking full unix file semantics lacking ability linux installed running fat disk volume aforementioned disadvantages umsdos comes simply sharing data fat disk volume linux operating systems windows data structures used windows vfat long filenames require running synchronization utility order prevent windows linux data structures becoming disjointed reason appropriate linux fat filesystem drivers use majority situations mentioned previously linux filesystem drivers support three file allocation table sizes 12-bit 16-bit 32-bit common features support various linux mounting options specified codice_2 option codice_1 command umsdos fat filesystem driver stores extra information relating unix file semantics another fat filesystem driver appears normal file directory subdirectory named codice_14 absence file given directory thus default umsdos filesystem driver provides semantics msdos filesystem driver directory 8.3 filenames extra unix file semantics enable umsdos driver extra abilities necessary create file directory synchronize internal data normal fat data existing entries already directory done tool called codice_15 utility program run across every directory disc volume every time one switches running windows running linux order umsdos filesystem driver incorporate changes made files directories windows private data structures codice_14 file default codice_15 tool creates codice_14 files directories already exist resulting file every directory disc volume switching windows linux behaviour often considered desirable therefore normal mode operation invoking codice_15 switching windows linux usually done running tool linux boot time startup script employ codice_20 option command prevents creation new codice_14 files directories already possess mentioned umsdos permits installing linux bootstrapping running fat format disc volume advantage permits use linux computer dos already installed without requiring hard disc repartitioned linux bootstrapped directly volume boot record scenario instead dos first bootstrapped loadlin linld used bootstrap linux dos convention installation linux root directory subdirectory actual root directory dos boot volume e.g codice_22 various linux top-level directories thus dos directories codice_23 codice_24 codice_25 codice_26 codice_27 codice_28 forth umsdos filesystem driver automatically prepends codice_29 pathnames location linux root directory supplied umsdos filesystem driver first place via option codice_30 command example aforegiven root directory codice_30 would invoked command line loadlin c \linux\boot\vmlinuz rw root=c \linux installation linux directory first place simply involves unpacking files archive directory subdirectories installation also generally requires use swap file rather swap partition linux however related desire repartition hard disc unrelated umsdos filesystem driver per se major linux distributions including redhat suse debian employ umsdos permit installation linux fat disc volume distributions however include distributions phat linux installs codice_32 dos unpacking zip file booted running command.com script named codice_33 zipslack umsdos project started 1992 jacques gelinas made available net january 1994 patch included standard distribution starting kernel 1.1.36 umsdos removed linux 2.6.11 kernel lack maintenance uvfat extension umsdos use windows data structures long filenames instead discontinued release work 2.4.x kernels earlier linux distributions used umsdos mulinux monkey linux winlinux 2000 although filesystem drivers kernel make possible access files directories fat formatted volumes normal manner also possible without kernel driver support using utility programs form mtools utility suite like vfat fat filesystem driver mtools provides long filename support using disc data structures microsoft windows uses alternately one fuse filesystem drivers may used—fatfuse fusefat mountlo modern equivalent umsdos posix overlay filesystem posixovl works fuse | [
3599,
2547,
7161,
4672,
3626,
6117,
3664,
6854,
5437,
6857,
4375,
6500,
6505,
5457,
4759,
460,
1534,
7976,
4406,
821,
7258,
5130,
126,
1561,
836,
5843,
6558,
2683,
5859,
5865,
4444,
5518,
6231,
869,
2704,
1605,
6952,
174,
2710,
1624,
59... | Validation |
7,036 | 9 | JOVIAL:jovial jovial high-level computer programming language similar algol specialized development embedded systems specialized computer systems designed perform one dedicated functions usually embedded part complete device including mechanical parts jovial developed new high-order programming language beginning 1959 team system development corporation sdc headed jules schwartz compose software electronics military aircraft name jovial acronym jules version international algorithmic language international algorithmic language ial name originally proposed algol 58 according schwartz language originally called ovial met opposition various reasons jovial suggested meaning attached j somewhat jokingly suggested language named schwartz since chairing meeting unofficial name stuck 1960s jovial part us military l-project series particular 465l saccs project due lack real-time processing languages available 95 percent saccs project managed itt software primarily written sdc written jovial software project took two years fewer 1400 programmer years less half equivalent time sage l-project late 1970s early 1980s u.s. air force adopted standardized cpu mil-std-1750a subsequent jovial programs built processor several commercial vendors provided compilers related tools build jovial processors mil-std-1750a including advanced computer techniques act tld systems proprietary software systems pss others jovial standardized 1973 mil-std-1589 revised 1984 mil-std-1589c still much used update maintain software older military vehicles aircraft three dialects common use j3 j3b-2 j73 jovial longer maintained distributed usaf jovial program office jpo software previously distributed jpo still available commercial resources software engineering associates inc. sea combinations host/target processors including microsoft windows linux mac os x powerpc sparc vax 1750a powerpc ti-9989 zilog z800x motorola 680x0 ibm system 360/system 370/system z addition ddc-i acquired parts advanced computer techniques also still lists jovial compilers related tools software implemented jovial mission critical maintenance getting difficult december 2014 reported software derived jovial code produced 1960s involved major failure united kingdom air traffic control infrastructure agency uses train staff jovial could maintain software scheduled replacement 2016 conversion jovial code new platforms therefore becoming common jovial rehosting retargeting currently done software engineering associates conversions jovial languages currently done semantic designs whose dms software reengineering toolkit used convert jovial mission software b-2 bomber c. languages influenced jovial include coral sympl space programming language spl extent cms-2 interactive subset jovial called tint similar joss developed 1960s jovial includes features found standard algol records arrays records inline assembly language notable systems using jovial include airborne radar systems embedded jovial software include apg-70 apg-71 apg-73 following example taken computer programming manual jovial j73 language proc retrieve code value example defines procedure named codice_1 takes unsigned integer input argument codice_2 floating-point output argument codice_3 searches 1000-element array codice_4 entry matches codice_2 sets floating-point variable codice_3 element array codice_7 matching array index matching element found codice_3 set codice_9 | [
6507,
3509,
4759,
7800,
578,
7990,
7273,
1114,
8117,
8137,
7305,
1237,
6497,
7043,
1989,
971,
1435
] | Test |
7,037 | 7 | Salesforce.com:salesforce.com salesforce.com inc. usually abbreviated sf sfdc american cloud-based software company headquartered san francisco california though bulk revenue comes customer-relationship management crm service salesforce training also sells complementary suite enterprise applications focused customer service marketing automation analytics application development salesforce ranked first fortune 100 best companies work 2018 company founded 1999 former oracle executive marc benioff parker harris dave moellenhoff frank dominguez company specializing software service saas harris moellenhoff dominguez three software developers previously consulting firm left coast software introduced benioff friend former oracle colleague bobby yazdani harris team wrote initial sales automation software launched first customers sept-nov 1999 june 2004 company initial public offering new york stock exchange stock symbol crm raised us 110 million early investors include larry ellison magdalena yesil halsey minor stewart henderson mark iscaro igor sill geneva venture partners july 2012 salesforce applied trademark term social enterprise united states european union jamaica term widespread use describe businesses primarily social purpose successfully challenged campaign called notinourname launched social enterprise uk resulting salesforce.com withdrawing trademark application agreeing use term future marketing october 2014 salesforce announced development customer success platform tie together salesforce services including sales service marketing analytics community mobile apps october 2017 salesforce launched facebook analytics tool business-to-business marketers september 2018 salesforce partnered apple intended improving apps businesses salesforce.com customer-relationship management crm service comprises several broad categories commerce cloud sales cloud service cloud data cloud including jigsaw marketing cloud community cloud including chatter analytics cloud app cloud iot 100,000 customers salesforce primary enterprise offering within salesforce platform provides companies interface case management task management system automatically routing escalating important events salesforce customer portal provides customers ability track cases includes social networking plug-in enables user join conversation company social networking web sites provides analytical tools services including email alert google search access customers entitlement contracts lightning platform also known force.com platform service paas allows developers create add-on applications integrate main salesforce.com application third-party applications hosted salesforce.com infrastructure force.com applications built using declarative tools backed lightning apex proprietary java-like programming language force.com lightning visualforce framework includes xml syntax typically used generate html force.com platform typically receives three complete releases year platform provided service developers every single development instance also receives updates spring 2015 release new framework building user interfaces – lightning components – introduced beta lightning components built using open-source aura framework support apex server-side language instead aura javascript dependency described alternative necessarily replacement visualforce pages according september 2009 gartner group report force.com 1,000 customer accounts 2013 force.com platform 1.4 million registered developers community cloud provides salesforce customers ability create online web properties external collaboration customer service channel sales custom portals instance salesforce tightly integrated sales cloud service cloud app cloud community cloud quickly customized provide wide variety web properties work.com previously rypple social performance management platform helps managers employees improve work performance continuous coaching real-time feedback recognition marketed solution sales performance customer service marketing service employed human resource departments work.com known rypple founded daniel debow david stein wanted create simple way asking feedback anonymously work company formed may 2008 client list included mozilla facebook linkedin gilt groupe rypple 'reverses onus demand feedback getting employees build manage coaching networks september 2011 rypple announced hired bohdan zabawskyj chief technology officer 2011 rypple developed formalized management methodology called okr objectives key results spotify rypple also partnered facebook create loops short feedback loops gathers feedback co-workers thank progress goals coaching supervisors one channel rich robust continuous performance review december 2011 salesforce.com announced would acquire rypple transaction completed 2012 rypple rebranded work.com september 2012 launched 2005 salesforce appexchange online application marketplace third-party applications run force.com platform applications available free well via yearly monthly subscription models applications available range integrations sharepoint mobile approval management june 2016 features 2,948 applications driven 3+ million installs appexchange also place customers search cloud consulting partners help implement technology organization cloud consulting partners salesforce include large companies like ibm bluewolf accenture well smaller ones like cloudreach announced 2017 launched 2019 salesforce mytrailhead online training platform customized specific needs customers platform extends functionality salesforce built provide users training content specific usage salesforce enables users create publish training content programs announced may 29 2019 salesforce launched blockchain platform facilitate building blockchain network apps integrated crm data.com previously known jigsaw cloud-based automated system acquiring managing crm records within user salesforce.com account data.com also online business directory companies business professionals built maintained accessed worldwide community million subscribers. information consisted commonly found business card data.com competitors included services dun bradstreet/avention zoominfo data.com made three products data.com connect data.com clean data.com prospector april 2018 salesforce announced would retire data.com connect may 4 2019 salesforce also announced wind data.com clean data.com prospector services close july 31 2020 desk.com saas help desk customer support product accessible cloud desk.com owned salesforce.com previously known assistly desk.com headquartered san francisco california acquired salesforce.com 50 million 2011 assistly re-branded desk.com 2012 customer support software desk.com saas customer service application product differentiates salesforce service platform desk.com specifically targets small businesses features functions desk.com integrates variety products third-party applications including salesforce crm salesforce iq atlassian jira mailchimp apps desk.com also supports 50 languages salesforce announced retirement desk.com replacing service cloud lightning march 13 2018 new desk.com licenses sold retirement date announced march 13 2020 do.com cloud-based task management system small groups businesses introduced 2011 discontinued 2014 salesforce offer reason shutting service however provided export tool save data entered within do.com interface do.com domain sold startup 2014 salesforce users configure crm application system tabs contacts reports accounts tab contains associated information configuration done tab adding user-defined custom fields configuration also done platform level adding configured applications salesforce instance adding sets customized novel tabs specific vertical- function-level finance human resources etc features addition web interface salesforce offers soap/rest web service application programming interface api enables integration systems salesforce works model–view–controller architecture apex proprietary programming language provided force.com platform developers similar java c strongly typed object-oriented case-insensitive programming language following dot-notation curly-brackets syntax apex used execute programmed functions processes force.com platform including custom buttons links event handlers record insertion update deletion via scheduling via custom controllers visualforce pages due multitenant nature platform language strictly imposed governor limitations guard code monopolizing shared resources salesforce provides series asynchronous processing methods apex allow developers produce longer-running complex apex code 2014 salesforce made public front end platform called lightning component-based framework salesforce mobile app built salesforce built framework 2015 releasing lightning design system html style framework default css styling built framework allows customers build components either use internal instances sell appexchange salesforce lightning app builder tool rapid application development responsive web interfaces interface allows different screens put together based lightning components used layouts records specific applications lightning experience new redesigned interface salesforce processes enhancement released 2016 since apps available appexchange need lightning built classic migrate lightning classic updated salesforce platform offers option developers employ migration techniques enable new user interface switch lightning salesforce headquartered san francisco regional headquarters morges switzerland covering europe middle east africa singapore india covering asia pacific minus japan tokyo covering japan major offices toronto chicago new york city london sydney dublin hyderabad san mateo california indianapolis hillsboro oregon salesforce.com services translated 16 different languages july 31 2011 104,000 customers 2.1 million subscribers salesforce move midwest regional headquarters indianapolis 2017 standard poor included salesforce time fastenal p 500 index september 2008 following federal takeover fannie mae freddie mac removal index fiscal year 2018 salesforce reported earnings us 127 million annual revenue us 10.480 billion increase 24.9 previous fiscal cycle salesforce shares traded 131 per share market capitalization us 102.5 billion october 2018 salesforce ranked 285 2018 fortune 500 list largest united states companies revenue salesforce migrated dell servers advanced micro devices processors running linux sun fire e25k servers sparc processors running solaris 2008 company uses momentum platform message systems allow customers send large amounts email 2012 salesforce announced plans build data center uk handle european citizens personal data 2013 salesforce oracle announced nine-year partnership salesforce use oracle linux oracle exadata oracle database java platform power salesforce applications saas platform 2016 salesforce announced use amazon web services hosting countries restrictive data residency requirements salesforce data centers operating july 2017 first salesforce instance went live canada salesforce announcing enabled signing number canadian customers following list acquisitions salesforce november 2007 successful phishing attack salesforce employee compromised contact information number salesforce customers used send highly targeted phishing emails salesforce stated phisher tricked someone disclosing password intrusion stem security flaw salesforce.com application database phishing breach cited example crm industry needs greater security users threats spam crowd-sourced method building business contacts proven popular recruiters marketers sales professionals also raised questions privacy site database entered without permission person listed data.com however make easy remove business information request noted december 2009 techcrunch however recipients messages regard spam least one complaint receiving spam attempting remove one address noted 2017 def con salesforce director offensive security security engineer fired conference room floor front several attendees executive company giving talk word rapidly spread two speakers released event presentation initially signed company however salesforce management team unexplained sudden change heart hour event salesforce director offensive security turned phone prior presentation unable receive communication salesforce prior presentation reaction firings swift electronic frontier foundation providing representation fired employees members security community opining salesforce undermined credibility security community significant degree perceived security community n't top list things care presented meatpistol tool anticipated released open source time presentation salesforce continues hold back releasing code developers public terminated employees continued call company open-source software not-for-profit organization refugee immigrant center education legal services raices rejected us 250,000 philanthropic donation salesforce company contracts customs border patrol sic executive director raices jonathan ryan tweeted comes supporting oppressive inhumane illegal policies want clear right action stop reference rejected donation salesforce ceo marc benioff responded official statement company employees dont work cbp regarding separation families cbp customer follows tos dont agreement ice 'm proud men women protect serve country every day 'm proud ohana reported change acceptable-use policy salesforce barring customers using system sell semiautomatic guns firearms march 2019 salesforce faced lawsuit 50 anonymous women claiming victims survivors sex trafficking abuse rape alleges company profited knowingly facilitated sex trafficking web site backpage.com defunct since april 2018 lawsuit also pointed ironically salesforce publicly promoting anti-human trafficking campaign time work backpage 2009 response financial crisis 2007–2008 resulting decline venture funding salesforce began investing digital companies used integrated salesforce platform. ref name= peterson bi 8/18/2018 /ref eventually became salesforce ventures headed john somorjai since various funds created focus specific areas — september 2014 sfv set salesforce1 fund aimed start-ups creating applications primarily mobile phones december 2018 salesforce ventures announced launch japan trailblazer fund focused japanese startups august 2018 salesforce ventures reported investments totaling 1.2 billion 275 companies covering wide range business models including cloud storage cloudcraze artificial intelligence figure eight online fraud prevention forter accounting project software financialforce many areas five largest investments domo data-visualization software surveymonkey online survey software twilio cloud-communication dropbox cloud storage docusign secure e-signature company account nearly half portfolio. ref name= peterson bi 11/14/2018 /ref | [
3261,
370,
2186,
7523,
5728,
7165,
3954,
3958,
6433,
6806,
22,
3627,
5385,
2212,
2570,
4714,
3309,
49,
754,
5064,
2961,
7213,
1514,
7608,
1913,
1160,
2988,
7613,
7629,
1550,
3706,
5131,
6906,
5135,
3027,
3028,
2317,
842,
4431,
1964,
729... | Validation |
7,038 | 6 | Readahead:readahead readahead system call linux kernel loads file contents page cache prefetches file subsequently accessed contents read main memory ram rather hard disk drive hdd resulting much lower file access latencies many linux distributions use readahead list commonly used files speed booting setup kernel booted profile boot parameter record file accesses bootup write new list files read later boot sequences make additional installed services start faster included default readahead list linux distributions use systemd readahead binary part boot sequence replaced systemd-readahead however support readahead removed systemd version 217 described unmaintained unable provide expected performance benefits certain experimental page-level prefetching systems developed improve performance | [
3256,
2182,
3613,
7528,
7532,
2559,
5744,
6443,
2942,
7555,
6117,
4341,
5762,
412,
415,
3666,
2970,
7956,
5453,
5803,
5460,
7242,
1535,
1924,
6892,
1176,
1933,
5829,
5842,
1208,
6211,
4435,
5865,
7669,
3404,
1227,
1596,
165,
7312,
1607,
... | Test |
7,039 | 4 | Typhoid_adware:typhoid adware typhoid adware type computer security threat uses man-in-the-middle attack inject advertising web pages user visits using public network like wifi hotspot researchers university calgary identified issue require affected computer adware installed order display advertisements computer researchers said threat yet observed described mechanism potential countermeasures environment threat work area non-encrypted wireless connection wireless internet cafe wifi hotspots typhoid adware would trick laptop recognize wireless provider inserts route wireless connection computer actual provider adware may insert various advertisements data stream appear computer browsing session way even video stream e.g. youtube may modified adware may run infested computer whose owner would see manifestations yet affect neighboring ones latter peculiarity named analogy typhoid mary mary mallon first identified person never experienced symptoms yet spread infection time running antivirus software affected computer useless since adware installed implemented proof concept described article written march 2010 daniel medeiros nunes de castro eric lin john aycock mea wang typhoid adware variant well-known man-in-the-middle attack researchers point number new important issues protection video content growing availability public wireless internet access well-monitored researchers say annoying advertisements tip iceberg serious danger may come e.g. promotions rogue antivirus software seemingly coming trusted source suggested countermeasures include approaches investigated earlier contexts | [
429,
3932,
2119,
943,
558,
4208,
1805,
3426
] | Test |
7,040 | 2 | Telecommunications_Access_Method:telecommunications access method telecommunications access method tcam access method ibm os/360 successors computer operating systems ibm system/360 later provides access terminals units within teleprocessing network tcam provides similar functionality qtam replaced access method initial version time sharing option tso advent ibm sna tcam eventually superseded vtam tcam said following enhancements qtam tcam consists message control program mcp zero application programs mcp handles communications terminals identifies input messages starts application programs process required similar concept much later internet service daemon inetd unix systems also similar qtam application programs called message processing programs mpp mcp assembled user installation set macros supplied ibm macros define lines terminals comprising system datasets required procedures used process received transmitted messages application programs incorporating logic process various messages supplied installation use standard os/360 data management macros codice_1 codice_2 either basic macros codice_3 codice_4 codice_5 queued macros codice_6 codice_7 use sam macros allows application programs tested batch processing environment tcam initially supported support 3270 terminals soon added | [
8159,
7331,
5105,
7264,
7003,
1851,
3874,
3209,
1022,
5852,
7661,
6213,
2596,
7024,
607,
5081,
3233,
4647,
7783,
1994
] | Test |
7,041 | 3 | Mobile-ITX:mobile-itx mobile-itx smallest 2009 x86 compliant motherboard form factor presented via technologies december 2009 motherboard size cpu module computer ports cpu module necessary use i/o carrier board design intended medical transportation military embedded markets mobile-itx form factor announced via technologies computex june 2007 motherboard size first prototypes design intended ultra-mobile computing smartphone umpc prototype boards shown date include x86-compliant 1 ghz via c7-m processor 256 512 megabytes ram modified version via cx700 chipset called cx700s interface cellular radio module demonstration boards contain cdma radio dc-dc electrical converter various connecting interfaces announcement ultra-mobile pc reference design shown running windows xp embedded | [
7212,
1759,
4974,
6478,
2744,
352,
7484,
6089,
740,
2147
] | Test |
7,042 | 2 | Yum_(software):yum software yellowdog updater modified yum free open-source command-line package-management utility computers running linux operating system using rpm package manager though yum command-line interface several tools provide graphical user interfaces yum functionality yum allows automatic updates package dependency management rpm-based distributions like advanced package tool apt debian yum works software repositories collections packages accessed locally network connection hood yum depends rpm packaging standard digital distribution software automatically uses hashes digisigs verify authorship integrity said software unlike app stores serve similar function neither yum rpm provide built-in support proprietary restrictions copying packages end-users yum implemented libraries python programming language small set programs provide command-line interface gui-based wrappers yum extender yumex also exist rewrite yum named dnf replaced yum default package manager fedora 22 dnf created improve yum several ways improved performance better resolution dependency conflicts easier integration software applications original package manager yellowdog updater yup developed 1999-2001 dan burcaw bryan stillwell stephen edie troy bengegerdes terra soft solutions leadership ceo kai staats back-end engine graphical installer yellow dog linux.. full rewrite yup yum evolved primarily update manage red hat linux systems used duke university department physics seth vidal michael stenner vidal continued contribute yum death durham north carolina bicycle accident 8 july 2013 2003 robert g. brown duke published documentation yum subsequent adopters included fedora centos many rpm-based linux distributions including yellow dog linux yum replaced original yup utility — last updated sourceforge 2001 2005 estimated use half linux market 2007 yum considered tool choice rpm-based linux distributions yum aimed address perceived deficiencies old apt-rpm restrictions red hat up2date package management tool yum superseded up2date red hat enterprise linux 5 later authors refer yum yellowdog update manager suggest update manager would appropriate basic knowledge yum often included requirement linux system-administrator certification gnu general public license yum allows free open-source software freely distributed modified without royalty terms license honored codice_1 perform operations 2.x versions yum feature additional interface programming extensions python allows behavior yum altered certain plug-ins installed default commonly installed package codice_2 contains commands use yum api many plugins graphical user interfaces known front-ends allow easier use yum packagekit yum extender yumex two examples information packages opposed packages known metadata metadata combined information package determine resolve possible dependencies among packages hope avoid situation known dependency hell separate tool codice_3 sets yum software repositories generating necessary metadata standard xml format sqlite metadata given -d option codice_4 tool formerly known yam help creation maintenance repositories yum xml repository built input many developers quickly became standard rpm-based repositories besides distributions use yum directly suse linux 10.1 added support yum repositories yast open build service repositories use yum xml repository format metadata yum automatically synchronizes remote meta data local client tools opting synchronize requested user automatic synchronization means yum fail due user failing run command correct interval | [
8055,
1621,
2091,
5200,
5017,
5545,
6609,
1723,
1260,
5726,
7619,
4675,
5912,
3366,
5480,
3863,
4778,
5571,
578,
2034,
4603,
4059,
7092,
2581,
7555,
6743,
3559,
2771,
326,
2680,
2594,
4441,
1406,
6663,
1684,
952,
4991,
523,
163,
5965,
6... | Test |
7,043 | 3 | MIL-STD-1750A:mil-std-1750a mil-std-1750a 1750a formal definition 16-bit computer instruction set architecture isa including required optional components described military standard document mil-std-1750a 1980 since august 1996 inactive new designs addition core isa definition defines optional instructions fpu mmu importantly standard define implementation details 1750a processor 1750a supports 2 16-bit words memory core standard standard defines optional memory management unit allows 2 16-bit words memory using 512 page mapping registers i/o space defining separate instruction data spaces keyed memory access control instructions 16 bits although 16-bit extension standard computer 16 general purpose 16-bit registers 0 15 registers 1 15 used index registers registers 12 15 used base registers 16 registers could used stack pointer sjs urs instructions stack jump subroutine unstack return subroutine register 15 used stack pointer pshm popm instructions push multiple pop multiple computer instructions 16 32-bit binary arithmetic well 32 48 bit floating point i/o generally via i/o instructions xio vio separate 2 16-bit word address space may specialized bus mil-std-1750a define implementation details 1750a products available wide variety companies form component board system-level offerings implemented myriad technologies often advanced exotic respective periods e.g gaas ecl sos particular interest fact 1750a systems often offer high levels radiation hazardous environment protection making particularly suited military aviation space applications examples mil-std-1750a implementations include processors based mil-std-1750a usually programmed jovial high-level programming language defined united states department defense derived algol 58 lesser extent ada used also c compilers example cleanscape xtc-1750a older versions gnu gcc contain support mil-std-1750a declared obsolete version 3.1 removed subsequent versions addition ddc-i provides score integrated development environment ide ada95 c compilers tads tartan ada development system ada83 development environment targeting processors based mil-std-1750a u.s. air force defined standard order common computing architecture thereby reduce costs software computer systems military computing needs includes embedded tasks aircraft missile control systems well mundane general military computing needs advantages concept recognized outside usaf 1750a adopted numerous organizations european space agency nasa israeli aircraft industries many projects academia examples military aircraft using 1750a include fully space rated implementations make 1750a one types computers applicable use deep space applications example spacecraft use 1750a | [
3347,
7036,
304,
6922,
1646,
1435
] | Test |
7,044 | 7 | Cloud_Elements:cloud elements cloud elements cloud api integration platform enables developers publish integrate aggregate manage apis unified platform using cloud elements developers quickly connect entire categories cloud services e.g. crm documents finance using uniform apis simply synchronize data multiple cloud services e.g salesforce zendesk quickbooks using innovative integration toolkit founded october 2012 cloud elements purpose built developers help organize world apis one-to-many approach ‘ visionary ’ api management according gartner inc. cloud elements headquartered denver co serves customers worldwide information found www.cloud-elements.com cloud elements accelerates api integrations innovative api hub technology providing uniform apis developers use easily make apis work together past years developers published millions unique apis one island data bigger challenge integrate apis together order synchronize data build new apps faster october 2012 cloud elements founded ceo mark geene cto vineet joshi vp product development atul barve three shared vision help developers build cloud applications faster lower cost ... since start company cloud elements grown 100 employees work together bring api integrations business sizes july 18 2014 company announced receiving 3.1 million series funding round investors include virginia-based grotech ventures california-based icon venture partners along galvanize ventures january 9 2017 company announced receiving 13 million funding reach series b funding led harbert growth partners allow cloud elements continue revenue increase nearly 40 percent quarter-over-quarter sapphire 2018 sap launched sap cloud platform open connectors purpose built api integration platform leveraging cloud elements catalog feature-rich connectors 150 leading enterprise saas applications cloud elements created offer cloud applications hubs provide restful apis json payloads cloud elements differentiates one-to-many api lets developers integrate maintain several services elements category within hubs connector “ elements ” provide variety advanced features built cloud elements ’ api integration platform puts data center company application ecosystem provide virtual data hub puts data model center integration strategy making easier manage integrate data additionally cloud elements provides normalized consistent apis across entire catalog elements eliminate need experts every endpoint finally platform allows service embedded app customers convenience virtual data resources vdr provide canonicalized view data objects eliminating need point-to-point mapping data every new application putting data models center application ecosystem enables management company ’ data enriched api models maintained cloud elements make easier map defined resources required endpoints traditional integration platforms point-to-point meaning new application needs connected directly every application ecosystem point-to-point integration best solution external integration embedded platform makes difficult scale effectively use ce ’ vdr created ui easily maps domain model cloud services use allow directly write integrations also offer vdr templates pre-written templates common resources used customers pre-mapping multiple endpoints | [] | Test |
7,045 | 5 | Digital_Signal_Designation:digital signal designation digital signal designation classification digital bit rates digital multiplex hierarchy used transport signals one location another telecommunications see sonet information | [
5714
] | Test |
7,046 | 6 | List_of_file_copying_software:list file copying software article provides list inbuilt third party file copying moving software utilities software used part computer file management explicitly move copy files data demand one location another storage device file copying fundamental operation data storage popular operating systems linux windows macos well smartphone operating systems android contain built-in file copying functions well command line cli graphical gui interfaces filing system copy move functions cases replaced supplemented third party software different extended improved functionality article lists inbuilt well external software designed purpose software designed copy clone image author entire storage devices cds dvds blu-ray disks hard drives storage device partitions back data copiers work storage devices logical unit general file managers utilities related file copying software please see examples comparable operating functionality seen across file copying programs generic differentiators functions software gizmo freeware published basic comparison reviews range well-known third party file copying software windows july 2012 fastcopy given top place reviewers highest speed also light system resources author states uses cache avoid slowing software win32 api c runtime rather mfc ultracopier recognised well-developed gui interface unstoppable copier well regarded niche copier designed best results damaged media files cost speed teracopy also mentioned also worth considering third-party file transfer software include | [
980,
1812,
1254,
4386,
4759,
1537,
7438,
3626,
5571,
4955,
1281,
578,
740,
6289,
7110,
1688,
3827,
7306,
6857,
5354,
4379
] | Validation |
7,047 | 8 | Typosquatting:typosquatting typosquatting also called url hijacking sting site fake url form cybersquatting possibly brandjacking relies mistakes typos made internet users inputting website address web browser user accidentally enter incorrect website address may led url including alternative website owned cybersquatter typosquatter url usually one five kinds similar victim site address e.g example.com similar abuses typosquatter site user may also tricked thinking fact real site use copied similar logos website layouts content spam emails sometimes make use typosquatting urls trick users visiting malicious sites look like given bank site instance several different reasons typosquatters buying typo domain many companies including verizon lufthansa lego garnered reputations aggressively chasing typosquatted names lego example spent roughly us 500,000 taking 309 cases udrp proceedings celebrities also frequently pursued domain names singers star athletes prominent examples include basketball player dirk nowitzki udrp dirkswish.com actress eva longoria udrp evalongoria.org since 2006 typosquatted variant google called 'goggle.com existed considered phishing/fraud site later ca 2011–2012 url redirected google.com 2018 check revealed redirect users adware pages another example corporate typosquatting yuube.com targeting youtube users programmed redirect malicious website page asks users add security check extension really malware similarly www.airfrance.com typosquatted www.arifrance.com diverting users website peddling discount travel examples equifacks.com equifax.com experianne.com experian.com tramsonion.com transunion.com three typosquatted sites registered comedian john oliver show last week tonight users trying visit popular internet-based game agar.io may misspell said url agor.io visiting site known produce jumpscare screamer popular creepypasta jeff killer flashed rapidly produced loud noise original site taken 2017 linked randomly-themed phishing websites united states 1999 anticybersquatting consumer protection act acpa contains clause section 3 amending 15 usc 1117 include sub-section 2 b ii aimed combatting typosquatting however april 17 2006 evangelist jerry falwell failed get u.s. supreme court review decision allowing christopher lamparello use www.fallwell.com relying plausible misspelling falwell name lamparello gripe site presents misdirected visitors scriptural references intended counter fundamentalist preacher scathing rebukes homosexuality lamparello v. falwell high court let stand 2005 fourth circuit finding use mark domain name gripe site criticizing markholder constitute cybersquatting uniform domain-name dispute-resolution policy udrp trademark holders file case world intellectual property organization wipo typosquatters cybersquatters general complainant show registered domain name identical confusingly similar trademark registrant legitimate interest domain name domain name used bad faith | [
2086,
2697,
2043,
5151,
782
] | Test |
7,048 | 4 | Payment_Card_Industry_Security_Standards_Council:payment card industry security standards council payment card industry security standards council originally formed american express discover financial services jcb international mastercard visa inc. 7 september 2006 goal managing ongoing evolution payment card industry data security standard council claims independent various card vendors make council pci council formed body security standards known payment card industry data security standard pci dss standards consist twelve significant requirements including multiple sub-requirements contain numerous directives businesses may measure payment card security policies procedures guidelines also manage payment application data security standard pa-dss formerly referred payment application best practices pabp recently collaborated emvco provide security requirements testing procedures assessor training support emv 3-d secure v2.0 standard members pci security standards council currently consist five major payment brands visa mastercard american express discover jcb executives management pci ssc also filled employees aforementioned payment brands interested parties participate development pci security standards registration participating organization participants organized special interest groups tasked recommending revisions development various security standards maintained council | [
2513,
4247,
297
] | Validation |
7,049 | 2 | NSLU2:nslu2 nslu2 network storage link usb 2.0 disk drives network-attached storage nas device made linksys introduced 2004 discontinued 2008 makes usb flash memory hard disks accessible network using smb protocol also known windows file sharing cifs superseded mainly nas200 enclosure type storage link another sense wrt600n wrt300n/350n combine wi-fi router storage link device runs modified version linux default formats hard disks ext3 filesystem firmware upgrade linksys adds ability use ntfs fat32 formatted drives device better windows compatibility device web interface various advanced features configured including user group permissions networking options device two usb 2.0 ports connecting hard disks uses arm-compatible intel xscale ixp420 cpu models manufactured prior around april 2006 linksys underclocked processor 133 mhz though simple hardware modification remove restriction possible later models circa may 2006 clocked rated speed 266 mhz device includes 32 mb sdram 8 mb flash memory also 100 mbit/s ethernet network connection nslu2 fanless making completely silent stock device runs customised version linux linksys required release source code per terms gnu general public license due availability source code nslu2 use well-documented commodity components relatively low price several community projects centered around including hardware modifications alternative firmware images alternative operating systems varying degrees reconfiguration unofficial hardware modifications include two main replacement firmware images available device first unslung based official linksys firmware improvements features added optware packages available expand functionality slugos/be formerly openslug based openembedded framework slugos/be allows users re-flash device minimal linux system including ssh server allow remote access installed operating system must moved attached hard disk due lack space available flash memory done wide range additional packages available installed internet repository also possible run openwrt debian gentoo freebsd netbsd openbsd ubuntu device ability run unrestricted operating system device opens whole new range uses common uses web server mail server daap server itunes xlink kai upnp av mediaservers bittorrent client freeswitch asterisk pbx network router attachment usb network interface/usb modem german programmer boris pasternak developed weather server program/server meteohub inexpensive way gather weather sensor data personal weather stations pws allow posted number online weather services including weather underground weatherbug citizens weather observation program cwop many others nslu2 unslung firmware interfaced topfield tf5800 personal video recorder pvr allow electronic programme guide epg automatically downloaded internet transferred pvr nslu2 innovative networking reader award tom hardware 2004 awards | [
1066,
1521,
2538,
4759,
1534,
1167,
289,
3524,
4317,
5571,
6443,
578,
1284,
1202,
5236,
7919,
6378,
5241,
4627,
3734,
1973,
2338,
7214,
5876,
1237,
1702,
5797
] | Test |
7,050 | 4 | List_of_security_hacking_incidents:list security hacking incidents timeline computer security hacker history covers important noteworthy events history security hacking cracking | [
2173,
5798,
2724,
6256,
7799,
7066,
2379,
6092,
6526,
4404,
6004,
5125,
651,
3864,
2566,
5482,
5571,
1376,
4786,
4699,
6018,
6020,
2667,
744,
2491,
4521,
4522,
1576,
5064,
7848,
1774,
5600,
3486,
2693,
6393,
860,
69,
1691,
2791,
1056,
8... | Test |
7,051 | 3 | Commodity_computing:commodity computing commodity computing also known commodity cluster computing involves use large numbers already-available computing components parallel computing get greatest amount useful computation low cost computing done commodity computers opposed high-cost superminicomputers boutique computers commodity computers computer systems manufactured multiple vendors incorporating components based open standards systems said based commodity components since standardization process promotes lower costs less differentiation among vendors products standardization decreased differentiation lower switching exit cost given vendor increasing purchasers leverage preventing lock-in governing principle commodity computing preferable low-performance low-cost hardware working parallel scalar computing e.g amd x86 cisc fewer high-performance high-cost hardware items e.g ibm power7 sun-oracle sparc risc point number discrete systems cluster greater mean time failures mtbf hardware platform matter reliable fault tolerance must built controlling software purchases optimized cost-per-unit-of-performance absolute performance-per-cpu cost first computers large expensive proprietary move towards commodity computing began dec introduced pdp-8 1965 computer relatively small inexpensive enough department could purchase one without convening meeting board directors entire minicomputer industry sprang supply demand 'small computers like pdp-8 unfortunately many different brands minicomputers stand software little hardware compatibility brands first general purpose microprocessor introduced 1974 immediately began chipping away low end computer market replacing embedded minicomputers many industrial devices process accelerated 1977 introduction first commodity-like microcomputer apple ii development visicalc application 1979 microcomputers broke factory began entering office suites large quantities still back door ibm pc introduced 1981 immediately began displacing apple iis corporate world commodity computing know today truly began compaq developed first true ibm pc compatible pc-compatible microcomputers began coming big companies front door commodity computing well established 1980s microcomputers began displacing larger computers serious way first price key justification late 1980s early 1990s vlsi semiconductor technology evolved point microprocessor performance began eclipse performance discrete logic designs traditional designs limited speed-of-light delay issues inherent cpu larger single chip performance alone began driving success microprocessor-based systems mid-1990s nearly computers made based microprocessors majority general purpose microprocessors implementations x86 instruction set architecture although time every traditional computer manufacturer proprietary micro-based designs manufacturers non-commodity computer systems today today fewer fewer general business computing requirements met off-the-shelf commodity computers likely low-end supermicrocomputer genre continue pushed upward increasingly powerful commodity microcomputers | [
5453,
6707,
6092,
7171,
2467,
2845,
3542,
6748,
1867,
7924,
2683,
352,
971,
4839,
2536
] | Validation |
7,052 | 5 | Multiple_Access_with_Collision_Avoidance_for_Wireless:multiple access collision avoidance wireless multiple access collision avoidance wireless macaw slotted medium access control mac protocol widely used ad hoc networks furthermore foundation many mac protocols used wireless sensor networks wsn ieee 802.11 rts/cts mechanism adopted protocol uses rts-cts-ds-data-ack frame sequence transferring data sometimes preceded rts-rrts frame sequence view provide solution hidden node problem although protocols based macaw s-mac use carrier sense addition rts/cts mechanism macaw make use carrier sense assume node data transfer node b. node initiates process sending request send frame rts node b destination node node b replies clear send frame cts receiving cts node sends data successful reception node b replies acknowledgement frame ack node send one data fragment wait random time successful data transfer compete adjacent nodes medium using rts/cts mechanism node overhearing rts frame example node f node e illustration refrains sending anything cts received waiting certain time captured rts followed cts maximum waiting time rts propagation time destination node turnaround time node node c node e overhearing cts frame refrains sending anything time data frame ack received solving hidden terminal problem plus random time rts cts frames contain information length data frame hence node uses information estimate time data transmission completion sending long data frame node sends short data-sending frame ds provides information length data frame every station overhears frame knows rts/cts exchange successful overhearing station node f might received rts ds cts defers transmissions ack frame received plus random time sum successful data transfer b consists following sequence frames macaw non-persistent slotted protocol meaning medium busy example cts message station waits random time start time slot sending rts results fair access medium example nodes b c data fragments send busy period chance access medium since transmission range node unaware ongoing data transfer node node b. node data send node c transmission range node d. initiates process sending rts frame node c. node c already deferred transmission completion current data transfer node node b avoid co-channel interference node b hence even though receives rts node reply back cts node assumes rts successful collision hence proceeds back using exponential backoff algorithm multiple data fragments send instant node successfully initiate data transfer small gaps node completed data transfer completion node b next cts node next data transfer request however due node backoff time period probability capture medium small time interval high increase per-node fairness macaw introduces new control message called request request send rrts node c reply earlier due ongoing transmission node node b sends rrts message node next contention period recipient rrts node immediately responds rts normal message exchange commenced nodes overhearing rrts defer two time slots long enough hear successful rts–cts exchange occurs summarize transfer may case consist following sequence frames node c additional back-off algorithms developed researched improve performance basic principle based use sequencing techniques node wireless network maintains counter limits number attempts less equal sequence number use wireless channel states control access probabilities node good channel state higher probability contention success reduces number collisions macaw generally solve exposed terminal problem assume node g data send node f example node g information ongoing data transfer b initiates process sending rts signal node f. node f transmission range node hear rts node g since exposed co-channel interference node g assumes rts successful collision hence backs tries case solution provided rrts mechanism improve situation much since data frames sent b rather long compared frames probability f exposed transmission rather high node f idea node interested initiating data transfer g happens transmit rts transmissions furthermore macaw might behave normally multicasting | [
1618,
6071,
823,
5387,
7824,
3724,
2061,
1974,
4093,
1988
] | Test |
7,053 | 0 | Artificial_grammar_learning:artificial grammar learning artificial grammar learning agl paradigm study within cognitive psychology linguistics goal investigate processes underlie human language learning testing subjects ability learn made-up grammar laboratory setting developed evaluate processes human language learning also utilized study implicit learning general sense area interest typically subjects ability detect patterns statistical regularities training phase use new knowledge patterns testing phase testing phase either use symbols sounds used training phase transfer patterns another set symbols sounds surface structure many researchers propose rules artificial grammar learned implicit level since rules grammar never explicitly presented participants paradigm also recently utilized areas research language learning aptitude structural priming investigate brain structures involved syntax acquisition implicit learning apart humans paradigm also used investigate pattern learning species e.g cottontop tamarins starlings half century ago george a. miller established paradigm artificial grammar learning order investigate influence explicit grammar structures human learning designed grammar model letters different sequences research demonstrated easier remember structured grammar sequence random sequence letters explanation learners could identify common characteristics learned sequences accordingly encode memory set predicted subjects could identify letters likely appear together sequence repeatedly letters would subjects would use information form memory sets memory sets served participants strategy later memory tests reber doubted miller explanation claimed participants could encode grammar rules productive memory sets able verbalize strategy detail conducted research led development modern agl paradigm research used synthetic grammar learning model test implicit learning agl became used tested model field original paradigm developed miller participants asked memorize list letter strings created artificial grammar rule model test phase participants told set rules behind letter sequences memorized instructed categorize new letter strings based set rules previously exposed classified new letter strings grammatical constructed grammar rule vs. randomly constructed sequences subjects correctly sorted new strings chance level could inferred subjects acquired grammatical rule structure without explicit instruction rules reber found participants sorted new strings chance level reported using strategies sorting task could actually verbalize strategies subjects could identify strings grammatically correct could identify rules composed grammatical strings research replicated expanded upon many others conclusions studies congruent reber hypothesis implicit learning process done intentional learning strategies studies also identified common characteristics implicitly acquired knowledge modern agl paradigm used investigate explicit implicit learning although often used test implicit learning typical agl experiment participants required memorize strings letters previously generated specific grammar length strings usually ranges 2-9 letters per string example grammar shown figure 1 figure 1 example artificial grammar rule order compose grammatically ruleful string letters according predetermined grammar rule subject must follow rules pairing letters represented model figure 1 observing violation grammatical rule system composes string considered unruleful randomly constructed string case standard agl implicit learning task subjects told strings based specific grammar instead simply given task memorize letter strings memory learning phase subjects told letter strings presented learning phase based specific rules explicitly told rules test phase subjects instructed categorize new letter strings ruleful unruleful dependent variable usually measured percentage correctly categorized strings implicit learning considered successful percentage correctly sorted strings significantly higher chance level significant difference found indicates existence learning process involved memorizing presented letter strings mechanism behind implicit learning hypothesized occur people engage artificial grammar learning statistical learning specifically bayesian learning bayesian learning takes account types biases prior probability distributions individuals contribute outcome implicit learning tasks biases thought probability distribution contains probability possible hypothesis likely correct due structure bayesian model inferences output model form probability distribution rather single probable event output distribution posterior probability distribution posterior probability hypothesis original distribution probability hypothesis true given data probability data given hypothesis true bayesian model learning fundamental understanding pattern detection process involved implicit learning therefore mechanisms underlie acquisition artificial grammar learning rules hypothesized implicit learning grammar involves predicting co-occurrences certain words certain order example dog chased ball sentence learned grammatically correct implicit level due high co-occurrence chase one words follow dog sentence like dog cat ball implicitly recognized grammatically incorrect due lack utterances contain words paired specific order process important teasing apart thematic roles parts speech grammatical processing see grammar labeling thematic roles parts speech explicit identification words parts speech implicit traditional approaches agl claim stored knowledge obtained learning phase abstract approaches argue stored knowledge concrete consists exemplars strings encountered learning phase chunks exemplars case assumed information stored memory retrieved test phase used aid decisions letter strings 3 main approaches attempt explain agl phenomena research amnesia patients suggests dual factor approach may accurate model series experiments amnesiac patients support idea agl involves abstract concepts concrete exemplars amnesiacs able classify stimuli grammatical vs. randomly constructed well participants control group able successfully complete task amnesiacs able explicitly recall grammatical chunks letter sequence control group able explicitly recall performing task grammar rules different sequence letters previously tested amnesiacs control group able complete task although performance better task completed using set letters used training results experiment support dual factor approach artificial grammar learning people use abstract information learn rules grammars use concrete exemplar-specific memory chunks since amnesiacs unable store specific chunks memory completed task using abstract set rules control group able store specific chunks memory evidenced recall store examples memory later reference agl research criticized due automatic question agl considered automatic process encoding see encoding memory performance automatic sense occurring without conscious monitoring without conscious guidance performer ’ intentions case agl claimed implicit learning automatic process due fact done intention learning specific grammar rule complies classic definition automatic process fast unconscious effortless process may start unintentionally aroused continues without ability stop ignore consequences definition challenged many times alternative definitions automatic process given reber presumption agl automatic could problematic implying unintentional process automatic process essence focusing agl tests issues need addressed process complex contains encoding recall retrieval encoding retrieval could interpreted automatic processes since encoded learning stage necessary task intentionally performed test stage researchers need differentiate implicitness referring process learning knowledge encoding also referring performance test phase knowledge retrieval knowledge encoded training may include many aspects presented stimuli whole strings relations among elements etc. contribution various components performance depends specific instruction acquisition phase requirements retrieval task therefore instructions every phase important order determine whether stage require automatic processing phase evaluated automaticity separately one hypothesis contradicts automaticity agl mere exposure effect mere exposure effect increased affect towards stimulus result nonreinforced repeated exposure stimulus results 200 experiments effect indicate positive relationship mean goodness rating frequency stimulus exposure stimuli experiments included line drawings polygons nonsense words types stimuli used agl research experiments exposed participants stimulus 25 times following exposure participants asked rate degree stimulus suggested good vs. bad effect 7-point scale addition main pattern results also found several experiments participants rated higher positive affect previously exposed items novel items since implicit cognition reference previous study episodes effects affect ratings observed processing stimuli truly implicit results experiments suggests different categorization strings may occur due differences affect associated strings due implicitly learned grammar rules since advent computers artificial intelligence computer programs adapted attempt simulate implicit learning process observed agl paradigm ai programs first adapted simulate natural artificial grammar learning used following basic structure early model ai grammar learning wolff snpr system program acquires series letters pauses punctuation words sentences program examines string subsets looks common sequences symbols defines chunks terms sequences chunks akin exemplar-specific chunks described agl model acquires chunks exposure chunks begin replace sequences unbroken letters chunk precedes follows common chunk model determines disjunctive classes terms first set example model encounters the-dog-chased the-cat-chased classifies dog cat members class since precede chase model sorts chunks classes explicitly define groups e.g. noun verb early ai models grammar learning ignored importance negative instances grammar effect grammar acquisition also lacking ability connect grammatical rules pragmatics semantics newer models attempted factor details unified model attempts take factors account model breaks grammar according cues languages mark case roles using five possible cue types word order case marking agreement intonation verb-based expectation see grammar influence cue language grammar determined cue strength cue validity values determined using formula except cue strength defined experimental results cue validity defined corpus counts language databases formula cue strength/validity follows cue availability proportion times cue available times needed cue reliability proportion times cue correct total occurrences cue incorporating cue reliability along cue availability unified model able account effects negative instances grammar since takes accuracy frequency account result also accounts semantic pragmatic information since cues produce grammar appropriate context low cue strength cue validity macwhinney model also simulates natural grammar learning attempts model implicit learning processes observed agl paradigm contemporary studies agl attempted identify structures involved acquisition grammar implicit learning agrammatic aphasic patients see agrammatism tested agl paradigm results show breakdown language agrammatic aphasia associated impairment artificial grammar learning indicating damage domain-general neural mechanisms sub serving language sequential learning de vries barth maiworm knecht zwitserlood flöel found electrical stimulation broca area enhances implicit learning artificial grammar direct current stimulation may facilitate acquisition grammatical knowledge finding potential interest rehabilitation aphasia petersson vasiliki hagoort examine neurobiological correlates syntax processing structured sequences comparing fmri results artificial natural language syntax argue chomsky hierarchy directly relevant neurobiological systems agl testing | [] | Test |
7,054 | 5 | TCP_tuning:tcp tuning tcp tuning techniques adjust network congestion avoidance parameters transmission control protocol tcp connections high-bandwidth high-latency networks well-tuned networks perform 10 times faster cases however blindly following instructions without understanding real consequences hurt performance well bandwidth-delay product bdp term primarily used conjunction tcp refer number bytes necessary fill tcp path i.e equal maximum number simultaneous bits transit transmitter receiver high performance networks large bdps give practical example two nodes communicating geostationary satellite link round-trip delay time round-trip time rtt 0.5 seconds bandwidth 10 gbit/s 0.5×10 bits i.e. 5 gbit 625 mb unacknowledged data flight despite much lower latencies satellite links even terrestrial fiber links high bdps link capacity large operating systems protocols designed recently years ago networks slower tuned bdps orders magnitude smaller implications limited achievable performance original tcp configurations supported tcp receive window size buffers 65,535 64 kib 1 bytes adequate slow links links small rtts larger buffers required high performance options described buffering used throughout high performance network systems handle delays system general buffer size need scaled proportionally amount data flight time high performance applications sensitive network delays possible interpose large end end buffering delays putting intermediate data storage points end end system use automated scheduled non-real-time data transfers get data final endpoints maximum achievable throughput single tcp connection determined different factors one trivial limitation maximum bandwidth slowest link path also less obvious limits tcp throughput bit errors create limitation connection well rtt computer networking rwin tcp receive window amount data computer accept without acknowledging sender sender received acknowledgement first packet sent stop wait wait exceeds certain limit may even retransmit tcp achieves reliable data transmission even packet loss network windowing limit throughput tcp transmits data window size waiting acknowledgements full bandwidth network may always get used limitation caused window size calculated follows formula_1 rwin tcp receive window rtt round-trip time path given time window advertised receive side tcp corresponds amount free receive memory allocated connection otherwise would risk dropping received packets due lack space sending side also allocate amount memory receive side good performance even data sent network sending side must hold memory acknowledged successfully received case would retransmitted receiver far away acknowledgments take long time arrive send memory small saturate block emission simple computation gives optimal send memory size receive memory size given packet loss occurs network additional limit imposed connection case light moderate packet loss tcp rate limited congestion avoidance algorithm limit calculated according formula mathis et al formula_2 mss maximum segment size p probability packet loss packet loss rare tcp window becomes regularly fully extended formula n't apply number extensions made tcp years increase performance fast high-rtt links long fat networks lfns tcp timestamps rfc 1323 play double role avoid ambiguities due 32-bit sequence number field wrapping around allow precise rtt estimation presence multiple losses per rtt improvements becomes reasonable increase tcp window beyond 64 kb done using window scaling option rfc 1323 tcp selective acknowledgment option sack rfc 2018 allows tcp receiver precisely inform tcp sender segments lost increases performance high-rtt links multiple losses per window possible path mtu discovery avoids need in-network fragmentation increasing performance presence packet loss | [
7148,
456,
5456,
6879,
4759,
2281,
6521,
6976,
3775,
3855,
2644,
7170,
6531,
1462,
2650,
7637,
2119,
6908,
7091,
3383,
2219,
3640,
3797,
2043,
5850,
3312,
3315,
2057,
3819,
3820,
3821,
7214,
7217,
7765,
259,
79,
5880,
4561
] | Validation |
7,055 | 3 | University_of_Bristol:university bristol university bristol simply referred bristol university abbreviated bris post-nominal letters uob red brick research university located bristol united kingdom received royal charter 1909 although like university west england university bath trace roots merchant venturers technical college founded school 1595 society merchant venturers key predecessor institution university college bristol existence since 1876 bristol organised six academic faculties composed multiple schools departments running 200 undergraduate courses largely situated tyndalls park area city university total income £642.7 million 2017/18 £164.0 million research grants contracts. ref name= bristol financial statement 17/18 /ref largest independent employer bristol university bristol ranked 44th qs world university rankings 2018 ranked amongst top 10 uk universities qs arwu highly selective institution average 6.4 sciences faculty 13.1 medicine dentistry faculty applicants undergraduate place ranked 9th uk amongst multi-faculty institutions quality gpa research research power 2014 research excellence framework current academics include 21 fellows academy medical sciences 13 fellows british academy 13 fellows royal academy engineering 44 fellows royal society university associated 13 nobel laureates throughout history including paul dirac sir william ramsay cecil frank powell sir winston churchill dorothy hodgkin hans albrecht bethe max delbrück gerhard herzberg sir nevill francis mott sir paul nurse harold pinter jean-marie gustave le clézio recently 2015 economics nobel prize winner angus deaton bristol member russell group research-intensive british universities european-wide coimbra group worldwide universities network university previous vice-chancellor eric thomas chairman 2005 2007 addition university holds erasmus charter sending 500 students per year partner institutions europe earliest antecedent university engineering department merchant venturers technical college founded school early 1595 became engineering faculty bristol university university also preceded bristol medical school 1833 university college bristol founded 1876 first lecture attended 99 students university able apply royal charter due financial support wills fry families made fortunes tobacco plantations chocolate respectively wills family made vast fortune tobacco industry gave generously city university royal charter gained may 1909 288 undergraduates 400 students entering university october 1909 henry overton wills iii became first chancellor university college first institution country admit women basis men however women forbidden take examinations medicine 1906 since founding university 1909 grown considerably one largest employers local area although smaller student numbers nearby university west england bristol campus spread considerable geographic area activities however concentrated area city centre referred university precinct member russell group research-led uk universities coimbra group leading european universities worldwide universities network wun founding university college 1876 government support began 1889 mergers bristol medical school 1893 merchant venturers technical college 1909 funding allowed opening new medical school engineering school—two subjects remain among university greatest strengths 1908 gifts fry wills families particularly £100,000 henry overton wills iii £6m today money provided endow university bristol west england provided royal charter could obtained within two years december 1909 king granted charter erected university bristol henry wills became first chancellor conwy lloyd morgan first vice-chancellor wills died 1911 tribute sons george harry built wills memorial building starting 1913 finally finishing 1925 today houses parts academic provision earth sciences law graduation ceremonies held great hall wills memorial building grade ii* listed building 1920 george wills bought victoria rooms endowed university students union building houses department music grade ii* listed building point foundation university required provide local community mission behind creation department extra-mural adult education 1924 provide courses local community mission continues today new admissions policy specifically caters 'bs postcode area bristol among famous names associated bristol early period paul dirac graduated 1921 degree engineering obtaining second degree mathematics 1923 cambridge subsequent pioneering work quantum mechanics awarded 1933 nobel prize physics later 1920s h.h wills physics laboratory opened ernest rutherford since housed several nobel prize winners cecil frank powell 1950 hans albrecht bethe 1967 sir nevill francis mott 1977 laboratory stands site today close bristol grammar school city museum sir winston churchill became university third chancellor 1929 serving university capacity 1965 succeeded richard haldane held office 1912 following death henry wills world war ii wills memorial bombed destroying great hall organ housed along 7,000 books removed king college london safe keeping since restored former glory complete oak panelled walls new organ 1946 university established first drama department country year bristol began offering special entrance exams grants aid resettlement servicemen returning home student numbers continued increase faculty engineering eventually needed new premises become queen building 1955 substantial building housed university engineers 1996 department electrical engineering department computer science moved road new merchant venturers building make space rapidly expanding fields today queen building caters teaching needs faculty provides academic space heavy engineering subjects civil mechanical aeronautical unprecedented growth 1960s particularly undergraduate numbers student union eventually acquired larger premises new building clifton area city 1965 building spacious victoria rooms given department music new union provides many practice performance rooms specialist rooms well three bars bar 100 mandela also known ar2 avon gorge whilst spacious union building thought many ugly character compared architecture rest clifton area mentioned bbc poll find worst architectural eyesores britain university proposed relocating union central location part development 'masterplan recently plans redevelopment current building proposed 1960s time considerable student activism united kingdom bristol exception 1968 many students marched support anderson report called higher student grants discontent culminated 11-day sit-in senate house administrative headquarters university series chancellors vice-chancellors led university decades henry somerset 10th duke beaufort taking churchill chancellor 1965 succeeded dorothy hodgkin 1970 spent next 18 years office age mass higher education dawned bristol continued build student numbers various undergraduate residences repeatedly expanded recently postgraduate residences constructed recent ventures funded run external companies agreement university since 1988 three chancellors sir jeremy morse chairman lloyds bank handed 2003 brenda hale first female law lord sir paul nurse succeeded lady hale chancellor 1 january 2017 one centres deaf studies united kingdom established bristol 1981 followed 1988 norah fry centre research learning difficulties also 1988 2004 students union agm voted disaffiliate national union students nus occasions however subsequent referendum students reversed decision bristol remains affiliated nus 2002 university involved argument press intrusion details then-prime minister tony blair son application university published national newspapers number postgraduate students grown particularly numbers pursuing taught master degrees eventually became need separate representation university bodies postgraduate union pgu established 2000 universities increasingly expected exploit intellectual property generated research activities 2000 bristol established research enterprise division red cause particularly technology-based businesses 2001 university signed 25-year research funding deal ip2ipo intellectual property commercialisation company 2007 research activities expanded opening advanced composites centre innovation science accis bristol institute public affairs bipa 2002 university opened new centre sports exercise health heart university precinct cost local residents also able use facilities expansion teaching research activities continues 2004 faculty engineering completed work bristol laboratory advanced dynamics engineering blade £18.5m project intended study dynamics advanced facility europe built extension queen building officially opened queen elizabeth ii march 2005 january 2005 school chemistry awarded £4.5m higher education funding council england create bristol chemlabs centre excellence teaching learning cetl additional £350k announced capital part project february 2006 bristol chemlabs stands bristol chemical laboratory sciences chemistry cetl uk september 2009 saw opening university centre nanoscience quantum information £11 million building known quietest building world technologically sophisticated features self-cleaning glass advanced research quantum computing nanotechnology materials disciplines undertaken building also plan significantly redevelop centre university precinct coming years first step began september 2011 start construction state-of-the-art life sciences building time heavy financial pressures universities £50 million project clear statement bristol committed world class research teaching facilities 2018 building work underway fry building building caught fire university regarded elitist commentators taking 41 undergraduate students non-state schools according recent 2009/2010 figures despite fact pupils make 7 population 18 16+ year old pupils across uk intake state school pupils bristol lower many oxbridge colleges high ratio undergraduates non-state school led tension university late february early march 2003 bristol became embroiled row admissions policies private schools threatening boycott based claims effort improve equality access university discriminating students claims hotly denied university august 2005 following large-scale survey independent schools council publicly acknowledged evidence bias applicants schools represented university new admissions policy lays considerable detail basis greater lesser weight may given particular parts applicant backgrounds – particular account may taken school applicant hails new policy also encourages greater participation locally resident applicants university bristol buildings date pre-charter days university college bristol buildings designed charles hansom younger brother joseph hansom joseph inventor hansom cab buildings suffered built stages due financial pressure george oatley added tower memory albert fry still seen university road first large scale building project university bristol undertook gaining charter wills memorial building hoped would symbol academic permanence university memorial chief benefactor university henry overton wills requested architect george oatley building built last least 400 years site purchased top park street suffered awkward slope desirability link building museum art gallery situated adjacent plot architecture critic roger gill stated building remarkable size noted ambience medieval university strangely lacking goes criticise building sham folly armorials founder window represent interests present founding university bristol including wills fry families tyndalls park estate royal fort house also purchased trustees tyndall family allowing university expand many departments faculty arts housed large victorian houses converted teaching goldney gardens entered property university bristol george wills hoped build all-male hall residence prevented due moral objection warden clifton hall house objected idea male female residences close proximity university records show miss starvey prepared resign issue support chancellor conwy lloyd morgan eventually land purchased stoke bishop allowing wills hall bought allowing building described quasi-oxbridge hall added dame monica wills chapel george wills widow death burwalls mansion house side avon gorge used halls residence past home sir george oatley building used house centre continuing education many modern buildings including senate house newer parts hh wills physics laboratory designed ralph brentnall funds university grants committee also responsible extension wills memorial building library completed standard realise extension original building brentnall oversaw rebuilding great hall wills memorial building partly destroyed bristol blitz world war ii buildings st michael hill rebuilt using hundreds old photographs recreate original houses flats goldney hall designed michael grice received award civic trust design bristol university owns best examples georgian architecture city best examples royal fort house clifton hill house goldney hall despite additions victoria rooms house music department designed charles dyer seen good example greek revival movement british architecture tympanum building depicts scene advent morning designed jabez tyley major feature large organ since destroyed fire november 2016 university announced plans build £300 million temple quarter campus c. 5,000 students next bristol temple meads railway station within bristol temple quarter enterprise zone new campus include business school digital research facilities student village expected open 2021 existing campus plans remodel tyndall avenue pedestrianise surrounding area build new library resource hub common uk universities bristol headed formally chancellor currently sir paul nurse led day-to-day basis vice-chancellor currently hugh brady academic leader chief executive four pro vice-chancellors three ceremonial pro-chancellors chancellor may hold office ten years pro-chancellors three unless university court determines otherwise vice-chancellor pro-vice-chancellors term limits vice-chancellor supported deputy vice-chancellor responsibility running university held executive level vice-chancellor council body recommend changes university statutes charter exception academic ordinances made consent senate chief academic body university also holds responsibility teaching learning examinations research enterprise chancellor pro chancellors nominated council appointed formally court whose additional powers limited appointments others including lay members council finally convocation body staff ceremonial officers graduates university returns 100 members court one member council otherwise principally forum discussion ensure graduates stay touch university university made number schools departments organised six faculties university specifies mix cambridge oxford academic dress part uses oxford-style gowns cambridge-style hoods required 'university red see logo top page 2004 university unveiled new crest icons crest sun wills family dolphin colston horse fry ship-and-castle medieval seal city bristol also used coat arms shape whole crest represents open book learning crest replaced university arms shown arms continue used specific historical ceremonial requirement arms comprise argent cross quadrate gules arms city bristol pale sun splendour wills open book proper leaved clasped inscribed words nisi quia dominus fesse sinister dolphin embowed colston dexter horse courant fry third inscription book latin opening 124th psalm lord side ... bristol 8th highest average entry qualification undergraduates uk university 2015 new students averaging 485 ucas points equivalent aaaaa a-level grades competition places high average 7.7 applications per place according 2014 sunday times league tables making joint 11th competitive university uk university gives offers admission 67.3 applicants 8th lowest amongst russell group according 2017 times sunday times good university guide approximately 40 bristol undergraduates come independent schools 2016-17 academic year university domicile breakdown 78:5:17 uk eu non-eu students respectively female male ratio 55:45 bristol ranked 10th overall sunday times 10-year 1998–2007 average ranking british universities based consistent league table performance member 'sutton 13 top ranked universities uk internationally 2016 qs world university rankings placed bristol 41st overall world 2012 2013 rankings also placed bristol 15th world terms reputation employers placing higher several american ivy league universities including princeton university cornell upenn bristol chosen ninth best university uk quality graduates according recruiters uk major companies another international ranking shanghai jiao tong university academic ranking world universities placed bristol 64th globally 2013 times higher education world university ranking placed bristol 66th 2011 bristol ranked 47th world 6th uk 2016 round university ranking 2017 u.s. news world report ranks bristol 76th world 2019 ranked 120th among universities around world scimago institutions rankings according data published sunday times bristol sixth-highest percentage good honours uk university 2010 centre higher education development excellence rankings bristol one four uk universities oxford ucl manchester rated excellent seven departments following courses offered university bristol managed reach top 5 'times ranking 2008 computer science 3rd electrical electronic engineering 3rd civil engineering 5th biological sciences 3rd mathematics 3rd psychology 4th furthermore qs world university rankings place bristol world top 100 universities subject areas 2011 arts humanities 57th natural sciences 40th engineering 83rd social sciences 65th life sciences 70th breakdown qs world university natural sciences ranking shows following earth sciences 25th mathematics 35th environmental sciences 39th physics 41st chemistry 48th addition bristol particularly strong field social sciences particularly economics finance management rated fourth 2008 guardian university guide business management studies 2011 guardian also ranked bristol third uk geography behind second place oxford ranked bristol 1st uk music complete university guide 2013 bristol ranked fifth german fourth russian third mechanical civil engineering third music second drama bristol also known research strength 15 departments gaining top grade 5* 2001 research assessment exercise overall 36 46 departments rated gained top two ratings 5 5* 76 academic staff working departments scored top two levels terms teaching strength bristol average teaching quality assessment score 22.05/24 tqa abolished bristol drop-out rate also lower benchmark set hefce 3.1 bristol awards range academic degrees spanning bachelor master degrees well junior doctorates higher doctorates postnominals awarded degree abbreviations used commonly among british universities university part engineering doctorate scheme awards eng d. systems engineering engineering management aerospace engineering non-destructive evaluation bristol notably award title bachelor degrees music available study awarded ba although award mmus dmus degree divinity since divinity available study students theology awarded ba similarly university award blitt bachelor letters although award mlitt dlitt regulations university name md dds higher doctorates although many universities degrees normally accredited professional doctorates degrees dlitt dsc deng lld dmus whilst regulations specifying grounds award often conferred honorary degrees honoris causa used commonly dlitt dsc lld occasionally mlitt also sometimes conferred honorarily distinction local area within university university bristol students union bristol su bsu located queen road founding member national union students amongst oldest students unions england union oversees three media outlets ubtv bristol university radio station burst student newspaper epigram also local branch tab terms student life union responsible organisation annual freshers fair co-ordination bristol student community action organises volunteering projects local community organisation entertainment events large number student societies previous presidents included sue lawley former liberal democrat mp lembit öpik separate union postgraduate students well athletic union member british universities colleges sport distinction blues awarded sporting excellence oxford cambridge bristol successful athletes awarded reds accommodation students primarily central precinct university two areas bristol clifton stoke bishop known respectively west north villages stoke bishop wills hall edge clifton downs first opened 1929 chancellor winston churchill original quadrangle layout expanded twice 1962 1990 churchill hall named chancellor followed 1956 badock hall 1964 time badock hall establishment buildings called hiatt baker hall two years later hiatt baker moved site largest hall university first self-catering hall stoke bishop university hall established 1971 expansion 1992 university newest undergraduate residence 33 colston street opened city centre october 2011 acquiring property 2009 university established partnership unite plc order provide accommodation due increase number students accepted entry academic year 2012/2013 £20 million project expanding facilities hiatt baker provide additional 327 places undergraduate students 2014 main halls elect groups students junior common room organise halls social calendar next year residents student houses private accommodation students living home become members orbital – society organising social events students throughout year clifton goldney hall built first early 18th century wealthy merchant goldney family eventually became part university 1956 popular location filming chronicles narnia house eliott truly madly deeply well episodes fools horses casualty filmed grotto grounds grade listed building clifton hill house another grade listed building used student accommodation clifton original building constructed 1745 1750 isaac ware used university since earliest days 1909 manor hall comprises five separate buildings principal erected 1927–1932 design george oatley following donation henry herbert wills one annexes manor house recently refurbished officially 'reopened 1999 goldney hall beautiful gardens modern accommodation complexes clifton hill house dated facilities clifton residences also possesses attractive gardens manor hall houses largest dated rooms dating back early 20th century central precinct sits hawthorns student house accommodating 115 undergraduate students house started life collection villas built somewhere 1888 1924 later converted bit bit hotel john dingle hawthorns also houses conferencing facilities staff refectory bar accommodation office student houses office several residences central precinct recent built managed third-party organisations exclusivity arrangements university include new bridewell house opened 2016 includes en-suite bedrooms studios former police hq operated fresh student housing unite house chantry court opened 2000 2003 respectively unite group well dean court 2001 postgraduates woodland court 2005 run dominion housing group current academics university bristol include 18 fellows academy medical sciences 10 fellows british academy 13 fellows royal academy engineering 31 fellows royal society include sir michael berry one discoverers quantum mechanics geometric phase john rarity international expert quantum optics quantum cryptography quantum communication david may computer scientist lead architect transputer mark horton british maritime historical archaeologist academics computer science include david cliff inventor seminal zip trading algorithm peter flach mike fraser professor human-computer interaction julian gough nigel smart past academics university include patricia broadfoot vice-chancellor university gloucestershire nigel thrift vice-chancellor university warwick wendy larner provost victoria university wellington anthony epstein co-discoverer epstein-barr virus professor pathology university 1968–1982 sir john lennard-jones discoverer lennard-jones potential physics alfred marshall one university college principals influential economist latter part 19th century mathematicians philosophers rohit parikh brian rotman lectured mathematics department philosopher science paul feyerabend taught department philosophy university bristol associated three ig nobel prizes award unusual trivial achievements scientific research sir michael berry shared award andre geim nobel laureate using magnets levitate frog gareth jones also shared ig nobel prize scientifically documenting fellatio fruit bats dr. len fisher awarded 1999 prize physics calculating optimal way dunk biscuit bristol alumnus paul dirac went win nobel prize physics 1933 contribution formulation quantum mechanics considered one significant physicists 20th century notable scientists include dani rabaiotti environmental scientist science communicator notable alumni include writers dick king-smith sarah kane olivier award winning playwright laura wade angela carter dorothy simpson david gibbins david nicholls author novel starter ten turned screenplay set university bristol mark simmons author business books hutton economist author commentator entertainment current affairs former students include journalist mcmafia author misha glenny james landale bbc news chief political correspondent founded university independent newspaper epigram author journalist julie myerson william lewis editor-in-chief telegraph media group derren brown illusionist sue lawley radio 4 presenter alastair stewart newsreader dominic waghorn sky news us correspondent susanna reid itv breakfast anchor studied politics philosophy law university 1989 1992 also editor student newspaper epigram comedy matt lucas david walliams simon pegg chris morris creator controversial brass eye jon richardson comedy stars include chris langham thick fame standup comic marcus brigstocke alumni include mike bennett digital media entrepreneur albert ii prince monaco musician james blunt former liberal democrat mp lembit öpik president bristol university students union time sir jonathan evans former head mi5 anne mcclain member 2013 nasa astronaut class nkosazana dlamini-zuma chairperson african union commission october 2012 january 2017. notable alumni film television production department include film directors mick jackson michael winterbottom marc evans christopher smith alex cox peter webber maddie moate amongst many others | [
6963,
7055,
1293,
88,
7731,
3241,
4648
] | Validation |
7,056 | 8 | Microsoft_services:microsoft services microsoft online services refers hosted technology solutions consumers businesses services previously branded windows live umbrella among services offered webmail storage contacts calendar accessed microsoft account microsoft services team provides wide range consulting support services consumers partners businesses web services feature metro user interface ui header contains pull-down element allows users switch outlook.com people calendar skydrive header color also changes depending web service user using exception outlook.com allows users customize header color according preference interface also in-built messaging sidebar allows users interact contacts messenger facebook skype using instant messages audio calls video calls | [
6580,
6096
] | Test |
7,057 | 4 | Insider_threat_management:insider threat management insider threat management process preventing combating detecting monitoring employees remote vendors contractors fortify organization data theft fraud damage insider individual employed agency access facilities sensitive information organizational data information systems equipment may accounts giving legitimate access computer systems access originally given serve performance duties permissions could abused harm organization insiders often familiar organization data intellectual property well methods place protect makes easier insider circumvent security controls aware physical proximity data means insider need hack organizational network outer perimeter traversing firewalls rather building already often direct access organization internal network insider threats harder defend attacks outsiders since insider already legitimate access organization information assets insiders may comprise permanent temporary employees vendors contractors suppliers ex-employees common insiders elevated access utilize sensitive information without drawing suspicion however anyone insider threat organization dispose secure utilize sensitive information described agency regulations cases individuals compromised opposing agency exploited individual financial status threats life factors order force individual comply opposing agencies demands insider may attempt steal property information personal gain benefit another organization country attacks may range information data stolen destruction business property insiders may perform following threats organization insiders similar characteristics compiled order help determine possible threats researchers identified insiders mainly show antisocial behavior may include limited machiavellianism narcissism psychopathy information system side list common behavioral indicators known insiders insider threat program management educational resources national insider threat special interest group nitsig created response u.s. goverment presidential executive order 13587 structural reforms improve security classified networks responsible sharing safeguarding classified information national insider threat policy national industrial security program operating manual conforming change 2 nitsig created function national insider threat information sharing analysis center nitsig membership largest network 1000+ insider threat mitigation professionals u.s. globally willingness members collaborate share information among membership driving force made nitsig successful encourage become member attend meetings events charge become member https //nationalinsiderthreatsig.org insider threat defense group one first companies offer comprehensive insider threat program development management training u.s. government agencies department defense intelligence community defense contractors required develop implement insider threat programs https //www.insiderthreatdefense.us damaging insider threat incident impacts insider threat incidents severe costly damaging incidents insiders malicious non-malicious insider incidents damaging malicious incidents listed link numerous insider threat incidents severe impacts organizations https //www.insiderthreatdefense.us/insider-threat/ | [
3997,
6797,
6023
] | Test |
7,058 | 6 | PKZIP:pkzip pkzip file archiving computer program notable introducing popular zip file format pkzip first introduced ms-dos ibm-pc compatible platform 1989 since versions released number architectures operating systems pkzip originally written phil katz marketed company pkware inc bearing initials 'pk 1970s file archiving programs distributed standard utilities operating systems include unix utilities ar shar tar utilities designed gather number separate files single archive file easier copying distribution archives could optionally passed stream compressor utility compress others archivers also appeared 1980s including arc system enhancement associates inc. sea rahul dhesi zoo dean w. cooper dwc lharc haruhiko okomura haruyasu yoshizaki arj stands archived robert jung development pkzip first announced file softdev.doc within pkpak 3.61 package stating would develop new yet unnamed compression program announcement made following lawsuit sea pkware inc although sea suit lost compression war user base migrated pkzip compressor choice led bbs sysops refused accept offer files compressed .arc files users began recompressing old archives currently stored .arc format .zip files first version released 1989 dos command-line tool distributed shareware model us 25 registration fee us 47 manual help ensure interoperability zip format phil katz published original .zip file format specification appnote.txt documentation file pkware continued maintain document periodically published updates originally bundled registered versions pkzip later available pkware site specification version number necessarily correspond pkzip version numbers especially pkzip 6 later various times pkware adds preliminary features allows pkzip products extract archives using advanced features pkzip products create archives wo n't available next major release although popular time zip archives using pkzip 1.0 compression methods rare many modern unzip tools unable handle shrinking reducing although imploding usually supported shrinking uses dynamic lzw unisys held patents patent reduce algorithm also filed june 19 1984 long pkzip produced pkware also used pkzip standards following products | [
4213,
7607,
985,
4759,
1352,
6992,
6537,
2566,
658,
4700,
1955,
7746,
2226,
5147,
3032,
7201,
6380,
7387,
3219,
510,
3137,
8126,
1127,
2334,
6940,
4732,
5256,
3152,
169,
1139,
4277,
5349,
4461,
2897,
619
] | Validation |
7,059 | 2 | Portable_Distributed_Objects:portable distributed objects portable distributed objects pdo application programming interface api creating object-oriented code executed remotely network computers created next computer inc. using openstep system whose use objective-c made package easy write characterized light weight high speed comparison similar systems corba versions pdo available solaris hp-ux versions openstep system version worked microsoft ole also available called d'ole allowing distributed code written using pdo platform presented microsoft systems local ole objects pdo one number distributed object systems created early 1990s design model front end applications gui-based microcomputers would call code running mainframe minicomputers processing data storage microsoft evolving ole component object model com similar distributed version called dcom ibm system object model som/dsom sun microsystems promoting distributed objects everywhere host smaller players well exception limited functionality com systems extremely heavyweight tended large slow often difficult use pdo hand relied small number features objective-c runtime handle portability well distribution key feature language support second chance method classes method call object failed object n't support normally allowed languages due strong typing runtime would bundle message compact format pass back object codice_1 method normal behavior codice_1 return error including details taken message invocation pdo instead supplied number new objects codice_1 methods passed invocation object another machine network various versions support different networks platforms calling methods remote objects almost invisible network setup lines typically pdo objects instantiated locally called way object system pdo object forwarded invocation remote computer processing unbundled results returned comparison corba pdo programs typically 1/10 less size common next staffers write magazines showing re-implement multi-page corba article perhaps 15 lines code programming standpoint nearly nothing easy use pdo however pdo also reliant entirely objective-c function price unwilling pay time c++ widely used effort shift codebases entirely new language paradigm considered onerous pdo never saw much use next emphasis shifted new webobjects framework 1995 pdo continues used mac os x programmers method interprocess interapplication communication communication networked applications need compatibility mac os x applications addition os x platform gnustep implementation distributed objects | [
2109,
5101,
5786,
5787,
1989,
900
] | Test |
7,060 | 7 | Animaker:animaker animaker diy video animation software software cloud-based launched 2014 allows users create animated videos using pre-built characters templates 2017 animaker became first tool launch animated vertical video creator animaker cloud-based video animation software first launched open beta version 2014 february 2015 software officially launched based freemium model allowed users free account option software provides online tools create edit video animation software developed animaker inc video based saas company founded rs raghavan animaker uses html5 adobe flash create animated videos exported facebook youtube downloaded mp4 file software also available chrome extension chrome web store | [] | Test |
7,061 | 5 | HSTCP:hstcp highspeed tcp hstcp congestion control algorithm protocol defined rfc 3649 transport control protocol tcp standard tcp performs poorly networks large bandwidth-delay product unable fully utilize available bandwidth hstcp makes minor modifications standard tcp congestion control mechanism overcome limitation ack received congestion avoidance window increased formula_1 loss detected triple duplicate acknowledgments window decreased formula_2 w current window size congestion window small hstcp behaves exactly like standard tcp w 1 b w 0.5 tcp congestion window beyond certain threshold w b w become functions current window size region congestion window increases value w increases value b w decreases means hstcp window grow faster standard tcp also recover losses quickly behavior allows hstcp friendly standard tcp flows normal networks also quickly utilize available bandwidth networks large bandwidth delay products hstcp slow start/timeout behavior standard tcp since congestion control mechanism modified hstcp used tcp options like sack real implementations determining increase decrease parameters given current window size implemented lookup table | [
7637,
2077,
4058,
6286
] | Test |
7,062 | 8 | .htpasswd:.htpasswd .htpasswd flat-file used store usernames password basic authentication apache http server name file given .htaccess configuration anything although .htpasswd canonical name file name starts dot unix-like operating systems consider file begins dot hidden file often maintained shell command htpasswd add delete update users properly encode password use easily checked reversed back original password file consists rows row corresponding username followed colon followed string containing hashed password optionally prepended algorithm specifier 2y apr1 sha and/or salt hash historically used unix crypt style md5 sha1 common alternatives although version 2.2.18 variant md5 default resources available apache http server restricted users listed files created htpasswd .htpasswd file used protect entire directory placed well particular files | [
3168,
2451,
5965,
84
] | Test |
7,063 | 8 | Digg_Reader:digg reader digg reader news aggregator operated digg reader released june 26 2013 response google reader shutting reader web-based also ios android applications well google chrome extension beta reader received mostly positive reviews march 26 2018 digg shut digg reader digg reader created response google reader shutting andrew mclaughlin ceo digg saw blog post fall 2012 speculating google reader shutting sent note one friends google jokingly offering buy reader mclaughlin sent serious reply said nothing buy february 2013 mclaughlin friend google said referring google reader ’ telling anything ’ going keep thing around forever maybe want something ready end year. ” google announced google reader shutting july 1 2013 digg announced development digg reader night digg officially announced development reader march 13 2013 instead original plan late 2013 moving project top priority list promised simulate best features google reader also updating fit 2013 digg reader initially launched june 21 2013 invite service launched publicly june 26 2013 july 2 2013 digg reader announced crawling 7.7 million feeds march 14 2018 digg announced would shutting digg reader march 26 2018 june 27 2013 digg reader integrated digg ios app form update digg decided make reader separate app company sees digg.com digg reader complementary products cnet gave app 3/5 stating digg beautiful app blends social news rss subscriptions bugs missing features make suitable committed digg users app current version rating 4.5 5 itunes app received app store best 2013 award apple well best 2013 award techcrunch august 29 2013 digg released android app digg reader digg says android app common request users app rating 3.9 5 google play october 9 2013 digg released google chrome extension digg reader extension rating 4 5 chrome web store early reviews beta mostly positive mashable liked saying extremely impressed criticized lack features search tagging pc magazine gave 4/5 praising clean design speed free price tag criticized lack opml support inability log email address required connection google autostraddle gave thumbs citing neat streamlined look free price tag speed disappointed n't share feature facebook twitter techcrunch impressed digg able produce functional google reader alternative said current form digg reader replacement google reader blinklist.com said good way get news want lacked certain appeal compared free apps maclife critical giving 2/5 stating barely accomplishes creators set ’ little doubt digg reader improve time gate disappoints despite clean user interface many basic features lacking especially kind rss solution power users depended upon google reader provide | [
1152,
2812,
5984,
3172,
7880,
2379,
7975,
8174,
7169,
1276,
2842,
393,
7015,
3655,
3043,
4352,
4357,
2430,
5699,
6582,
6492,
5531,
84,
7692
] | Test |
7,064 | 2 | Power-on_self-test:power-on self-test power-on self-test post process performed firmware software routines immediately computer digital electronic device powered article mainly deals posts personal computers many embedded systems major appliances avionics communications medical equipment also self-test routines automatically invoked power-on results post may displayed panel part device output external device stored future retrieval diagnostic tool since self-test might detect system usual human-readable display non-functional indicator lamp speaker may provided show error codes sequence flashes beeps addition running tests post process may also set initial state device firmware case computer post routines part device pre-boot sequence complete successfully bootstrap loader code invoked load operating system ibm pc compatible computers main duties post handled bios may hand duties programs designed initialize specific peripheral devices notably video scsi initialization duty-specific programs generally known collectively option roms individually video bios scsi bios etc principal duties main bios post follows functions served post bios versions back first later bios versions post also bios begins post cpu reset first memory location cpu tries execute known reset vector case hard reboot northbridge direct code fetch request bios located system flash memory warm boot bios located proper place ram northbridge direct reset vector call ram earlier pc systems chipsets standard bios rom would located address range included reset vector bios ran directly rom motherboard bios rom segment f000 conventional memory map post flow contemporary bios one first things bios determine reason executing cold boot example may need execute functionality however system supports power saving quick boot methods bios may able circumvent standard post device discovery simply program devices preloaded system device table post flow pc developed simple straightforward process one complex convoluted post bios must integrate plethora competing evolving even mutually exclusive standards initiatives matrix hardware oses pc expected support although simple memory tests setup screen displayed earlier bioses around turn millennium post would perform thorough test devices including complete memory test design ibm modeled larger e.g mainframe systems would perform complete hardware test part cold-start process pc platform evolved commodity consumer device mainframe- minicomputer-inspired high-reliability features parity memory thorough memory test every post dropped models exponential growth pc memory sizes driven equally exponential drop memory prices also factor duration memory test using given cpu directly proportional memory size original ibm pc could equipped little 16 kb ram typically 64 640 kb depending amount equipped memory computer 4.77 mhz 8088 required five seconds 1.5 minutes complete post way skip beginning ibm xt memory count displayed post instead blank screen modern pc bus rate around 1 ghz 32-bit bus might 2000x even 5000x faster might 3 gb memory—5000x people concerned boot times 1980s 30 60 second memory test adds undesirable delay benefit confidence perceived worth cost users clone pc bioses allowed user skip post ram check pressing key modern machines often performed ram test unless enabled via bios setup addition modern dram significantly reliable dram 1980s part starting sequence post routines may display prompt user key press access built-in setup functions bios allows user set various options particular mother board operating system loaded key pressed post proceed boot sequence required load installed operating system original ibm bios made post diagnostic information available outputting number i/o port 80 screen display possible failure modes progress indication error codes generated case failure generate code code last successful operation available aid diagnosing problem using logic analyzer dedicated post cardan interface card shows port 80 output small displaya technician could determine origin problem operating system running computer code displayed board may become meaningless since oses e.g linux use port 80 i/o timing operations actual numeric codes possible stages error conditions differ one bios supplier another codes different bios versions single supplier may also vary although many codes remain unchanged different versions later bioses used sequence beeps motherboard-attached pc speaker present working signal error codes vendors developed proprietary variants enhancements msi d-bracket post beep codes vary manufacturer manufacturer information numeric beep codes available manufacturers bioses motherboards websites collect codes many bioses reference amibios8 check point beep code list version 2.0 last updated 10 june 2008 post beep codes covered specifically comptia a+ exam apple macintosh computers also perform post cold boot event fatal error mac make startup chime macs made 1987 prior 1998 upon failing post immediately halt death chime sound varies model beep car crash sound sound shattering glass short musical tone screen working sad mac icon along two hexadecimal strings used identify problem macs made prior 1987 crashed silently hexadecimal string sad mac icon apple introduced imac 1998 radical departure macs time imac began production new world macs called new world macs imac power macintosh g3 blue white power mac g4 pci graphics powerbook g3 bronze keyboard powerbook g3 firewire load mac os rom hard drive event error fatal hardware error display screen seen holding startup error message instead 0 prompt event fatal hardware error give beeps beep codes revised october 1999 since addition models power led would flash cadence amiga historical line computers a1000 4000 present interesting post sequence prompts user sequence flashing screens different colors rather audible beeps systems show various hardware post tests correct else failed amiga system performs following steps boot system fails rom test screen display turns red system halts almost amiga models present color sequence turned black screen dark gray light gray color screens filling monitor screen rapid sequence amigas taken usually 2 least max 3 seconds turn boot a4000 presents light gray screen boot time occurs 2 max 3 seconds keyboards historical amiga models proprietary happened early computer ages pragmatically based international standard ansi/iso 8859-1 keyboard intelligent device processor 4 kilobytes ram keeping buffer sequence keys pressed thus communicate user fault found flashing main led sequence | [
3511,
2472,
3459,
5571,
6014,
578,
405,
4612,
4258,
1670,
4540,
3230,
1052,
5784,
1325,
4277,
6593,
1992,
2357
] | Train |
7,065 | 4 | Vlastimil_Klíma:vlastimil klíma rndr vlastimil klíma born 19 february 1957 benešov czech republic leading cryptographer computer security expert white hat hacker academic taught applied cryptography faculty mathematics physics charles university prague author several works field cryptographic hash functions digital signatures klíma received doctorate faculty mathematics physics charles university 1984 dr. klíma former head research development group federal ministry defense czech republic czech national security authority klíma authored world ’ first on-the-fly encryption system windows 95 98/nt/2000 ethical hacker successfully broke ssl protocol currently works digital security sector | [
1805
] | Test |
7,066 | 4 | EternalBlue:eternalblue eternalblue cyberattack exploit developed u.s. national security agency nsa according testimony former nsa employees leaked shadow brokers hacker group april 14 2017 one month microsoft released patches vulnerability may 12 2017 worldwide wannacry ransomware used exploit attack unpatched computers june 27 2017 exploit used help carry 2017 notpetya cyberattack unpatched computers exploit also reported used since march 2016 chinese hacking group buckeye apt3 likely found re-purposed tool well reported used part retefe banking trojan since least september 5 2017 eternalblue exploits vulnerability microsoft implementation server message block smb protocol vulnerability denoted entry common vulnerabilities exposures cve catalog vulnerability exists smb version 1 smbv1 server various versions microsoft windows mishandles specially crafted packets remote attackers allowing execute arbitrary code target computer nsa alert microsoft vulnerabilities held five years breach forced hand agency warned microsoft learning eternalblue ’ possible theft allowing company prepare software patch issued march 2017 delaying regular release security patches february 2017 tuesday march 14 2017 microsoft issued security bulletin ms17-010 detailed flaw announced patches released windows versions currently supported time windows vista windows 7 windows 8.1 windows 10 windows server 2008 windows server 2012 windows server 2016 many windows users installed patches two months later may 12 2017 wannacry ransomware attack used eternalblue vulnerability spread next day microsoft released emergency security patches unsupported windows xp windows 8 windows server 2003 february 2018 eternalblue ported windows operating systems since windows 2000 risksense security researcher sean dillon eternalchampion eternalromance two exploits originally developed nsa leaked shadow brokers also ported event made available open sourced metasploit modules end 2018 millions systems still vulnerable eternalblue led millions dollars damages due primarily ransomware worms following massive impact wannacry notpetya badrabbit caused 1 billion worth damages 65 countries using eternalblue either initial compromise vector method lateral movement may 2019 baltimore struggled cyberattack digital extortionists using eternalblue attack froze thousands computers shut email disrupted real estate sales water bills health alerts many services since 2012 four baltimore city chief information officers fired resigned two left investigation eternalblue tool relies flaw microsoft software though company issued patch leakers posted tools online many systems remain vulnerable two years later existence patch prompted security researchers argue saturday responsibility baltimore breach lies city security consultant rob graham wrote tweet “ organization substantial numbers windows machines gone 2 years without patches ’ squarely fault organization eternalblue ” according microsoft united states nsa responsible dint controversial strategy stockpiling vulnerabilities least preventing microsoft timely public patching presumably hidden bugs eternalrocks microbotmassivenet computer worm infects microsoft windows uses seven exploits developed nsa comparatively wannacry ransomware program infected 230,000 computers may 2017 uses two nsa exploits making researchers believe eternalrocks significantly dangerous worm discovered via honeypot eternalblue among several exploits used conjunction doublepulsar backdoor implant tool eternalrocks first installs tor private network conceals internet activity access hidden servers brief 24 hour incubation period server responds malware request downloading self-replicating host machine malware even names wannacry avoid detection security researchers unlike wannacry eternalrocks possess kill switch ransomware | [
704,
3932,
2912,
376,
3277,
2923,
2587,
3323,
5779,
5434,
74,
7600,
4025,
1528,
4759,
2991,
1173,
6526,
6904,
6541,
6194,
2678,
3038,
3047,
6569,
2693,
862,
7307,
6589,
5187,
1996,
7328,
208,
2021,
5922,
6628,
924,
4531,
600,
1307,
2800... | Test |
7,067 | 1 | Hierarchical_and_recursive_queries_in_SQL:hierarchical recursive queries sql hierarchical query type sql query handles hierarchical model data special cases general recursive fixpoint queries compute transitive closures standard hierarchical queries implemented way recursive common table expressions ctes unlike oracle earlier connect-by clause recursive ctes designed fixpoint semantics beginning recursive ctes standard relatively close existing implementation ibm db2 version 2 recursive ctes also supported microsoft sql server since sql server 2008 r2 firebird 2.1 postgresql 8.4+ sqlite 3.8.3+ ibm informix version 11.50+ cubrid mariadb 10.2+ mysql 8.0.1+ tableau documentation describing ctes used tibco spotfire support ctes oracle 11g release 2 implementation lacks fixpoint semantics without common table expressions connected-by clauses possible achieve hierarchical queries user-defined recursive functions common table expression cte sql temporary named result set derived simple query defined within execution scope codice_1 codice_2 codice_3 codice_4 statement ctes thought alternatives derived tables subquery views inline user-defined functions common table expressions supported teradata db2 firebird microsoft sql server oracle recursion since 11g release 2 postgresql since 8.4 mariadb since 10.2 mysql since 8.0 sqlite since 3.8.3 hypersql h2 experimental oracle calls ctes subquery factoring syntax recursive cte follows codice_5 ‘ syntax recursive ctes recursive subquery factoring oracle jargon used traverse relations graphs trees although syntax much involved automatic pseudo-columns created like codice_6 desired created code see msdn documentation ibm documentation tutorial examples codice_7 keyword usually needed systems postgresql sql:1999 recursive cte query may appear anywhere query allowed possible example name result using codice_8 codice_7 codice_10 using cte inside codice_11 one populate table data generated recursive query random data generation possible using technique without using procedural statements databases like postgresql support shorter create recursive view format internally translated recursive coding example recursive query computing factorial numbers 0 9 following alternative syntax non-standard codice_12 construct introduced oracle 1980s prior oracle 10g construct useful traversing acyclic graphs returned error detecting cycles version 10g oracle introduced nocycle feature keyword making traversal work presence cycles well codice_12 supported enterprisedb oracle database cubrid ibm informix db2 although enabled compatibility mode syntax follows output query would look like following example returns last name employee department 10 manager employee hierarchy number levels manager employee path two academic textbooks note cover sql:1999 standard datalog oracle extension | [
6968,
1449,
7248,
3268,
5209,
1730,
3951,
3776,
7067,
7715,
3005,
8079,
3011,
4950,
3863,
1096,
6538,
6543,
2124,
4798,
3553,
6462,
7658,
6128,
2054,
7205,
684,
5956,
7213,
7303,
6056,
4274,
1891,
4457,
1792,
784
] | Test |
7,068 | 7 | Joint_Enterprise_Defense_Infrastructure:joint enterprise defense infrastructure joint enterprise defense infrastructure jedi large united states department defense cloud computing contract reported worth 10 billion dollars companies interested contract included amazon google microsoft oracle rean cloud llc protests google employees google decided drop contention contract conflict corporate values deal considered gift-wrapped amazon oracle co-chaired safra catz contested awarding contract amazon web services led jeff bezos citing national defense authorization act idiq contracts conflicts interest deap ubhi worked amazon time department defense led eric g. bruggink senior judge united states court federal claims place contract award hold august 2019 weeks winner expected announced president donald trump ordered contract placed hold defense secretary mark esper investigate complaints favoritism towards amazon | [
5064,
6219,
2961
] | Test |
7,069 | 9 | POV-Ray:pov-ray persistence vision ray tracer pov-ray ray tracing program generates images text-based scene description available variety computer platforms originally based dkbtrace written david kirk buck aaron a. collins amiga computers also influences earlier polyray raytracer contributed author alexander enzmann pov-ray free open-source software source code available agplv3 sometime 1980s david kirk buck downloaded source code unix ray tracer amiga experimented eventually deciding write ray tracer named dkbtrace initials posted call ray bulletin board system chicago thinking others might interested 1987 aaron a. collins downloaded dkbtrace began working x86-based port david buck collaborated add several features program proved popular anticipated could keep demand features thus july 1991 david turned project team programmers working graphdev forum compuserve time felt inappropriate use initials program longer maintained name star-light software taskforce animation rendering initially used eventually name became pv-ray ultimately pov-ray persistence vision ray tracer inspired dali persistence memory 2002 pov-ray became first ray tracer render image orbit rendered mark shuttleworth inside international space station features application summary history discussed interview february 2008 david kirk buck chris cason episode 24 floss weekly pov-ray matured substantially since created recent versions software include following features one pov-ray main attractions large collection third party support large number tools textures models scenes tutorials found web also useful reference wanting learn ray tracing related geometry graphics algorithms work current official version pov-ray 3.7 version introduces main features previous release 3.6 july 2006 intel corporation started using beta version demonstrate new dual-core conroe processor due efficiency 3.7 beta smp implementation pov-ray addition standard geometric shapes like tori spheres heightfields supports mathematically defined primitives isosurface finite approximation arbitrary function polynomial primitive infinite object defined 15th order lower polynomial julia fractal 3-dimensional slice 4-dimensional fractal superquadratic ellipsoid intermediate sphere cube parametric primitive using equations represent surface rather interior pov-ray internally represents objects using mathematical definitions pov-ray primitive objects described mathematical functions different many 3d computer modeling packages typically use triangle meshes compose objects fact provides pov-ray several advantages disadvantages rendering modeling systems pov-ray primitives accurate polygonal counterparts objects described terms spheres planar surfaces cylinders tori like perfectly smooth mathematically accurate pov-ray renderings whereas polygonal artifacts may visible mesh-based modeling software pov-ray primitives also simpler define polygonal counterparts pov-ray sphere described simply center radius mesh-based environment sphere must described multitude small polygons hand primitive- script-based modeling always practical method create objects realistic characters complex man-made artifacts like cars objects created mesh-based modeling applications wings 3d blender converted pov-ray mesh format following example scene description language used pov-ray describe scene render demonstrates use background colour camera lights simple box shape surface normal finish transforming effects rotation following script fragment shows use variable declaration assignment comparison loop construct pov-ray program include modeling feature essentially pure renderer sophisticated model description language accompany feature set third parties developed large variety modeling software specialized pov-ray others supporting import export data structures including free open-source 3d creation suite blender number additional pov-ray compatible modelers linked povray.org modelling programs 2007 pov-ray acquired rights moray interactive 3-d modeling program long used pov-ray however december 2016 moray development stalled official modifications pov-ray source tree done and/or approved pov-team patch submission and/or bug reporting done pov-ray newsgroups news.povray.org news server web interface also available since pov-ray source available unofficial forks patched versions pov-ray available third parties however officially supported pov-team official pov-ray versions currently support shader plug-ins features like radiosity splines still development may subject syntactical change pov-ray 3.6 distributed compiled format macintosh windows linux support intel macs available macintosh version since mac os x version unix linux version compiled 3.7 versions smp support officially supported windows linux unofficial macintosh versions v3.7 found pov-ray ported platform compatible c++ compiler originally pov-ray distributed pov-ray license namely pov-ray 3.6 distribution license pov-ray 3.6 source license permitted free distribution program source code binaries restricts commercial distribution creation derivative works fully functional versions pov-ray although source code older versions available modification due 3.6 prior license restrictions open source free software according osi fsf definition term problem source code exchange greater foss ecosystem impossible due license incompatibility copyleft licenses one reasons pov-ray originally licensed free software gnu general public license gpl open source licenses pov-ray developed gpl-style licenses became widely used developers wrote license release pov-ray contributors software worked assumption contributions would licensed pov-ray 3.6 licenses 2013 version 3.7 pov-ray relicensed affero general public license version 3 later thus pov-ray since free software according fsf definition also open source software according open source definition | [
1361,
3780,
4212,
5098,
7658,
3060,
3915,
4759,
5571,
352,
2379,
578,
4587,
5819
] | Train |
7,070 | 5 | DHCPv6:dhcpv6 dynamic host configuration protocol version 6 dhcpv6 network protocol configuring internet protocol version 6 ipv6 hosts ip addresses ip prefixes configuration data required operate ipv6 network ipv6 equivalent dynamic host configuration protocol ipv4 ipv6 hosts may automatically generate ip addresses internally using stateless address autoconfiguration slaac may assigned configuration data dhcpv6 ipv6 hosts use stateless autoconfiguration may require information ip address route dhcpv6 used acquire information even though used configure ip addresses dhcpv6 necessary configuring hosts addresses domain name system dns servers configured using neighbor discovery protocol also mechanism stateless autoconfiguration many ipv6 routers routers residential networks must configured automatically operator intervention routers require ipv6 address use communicating upstream routers also ipv6 prefix use configuring devices downstream side router dhcpv6 prefix delegation provides mechanism configuring routers dhcpv6 uses udp port number 546 clients port number 547 servers dhcp unique identifier duid used client get ip address dhcpv6 server 2-byte duid type field variable-length identifier field 128 bytes actual length depends type server compares duid database delivers configuration data address lease times dns servers etc client first 16 bits duid contain duid type four types meaning remaining duid depends type four types identified rfc 8415 due fact difficult manage multiple identifiers dual-stack environment fact duid simply optimal situations rfc 6939 released giving way identify host based mac address defines way dhcpv6 relay pass information dhcpv6 server option dhcpv6 relays yet widely supported cisco brocade switches support option example without rapid-commit present server link-local address codice_1 client link-local address codice_2 lorenzo colitti google explained dhcpv6 implemented android | [
7148,
456,
6879,
5637,
2281,
6521,
6976,
3775,
3447,
3855,
2644,
7170,
6531,
1462,
2650,
7637,
2119,
6908,
7091,
3383,
2219,
3640,
224,
3797,
4710,
2043,
3312,
2057,
3819,
3820,
3821,
7297,
7214,
7217,
7765,
259,
5880,
5181
] | Validation |
7,071 | 9 | Data_type:data type computer science computer programming data type simply type attribute data tells compiler interpreter programmer intends use data programming languages support common data types real integer boolean data type constrains values expression variable function might take data type defines operations done data meaning data way values type stored type value expression may take value data types used within type systems offer various ways defining implementing using different type systems ensure varying degrees type safety almost programming languages explicitly include notion data type though different languages may use different terminology common data types include example java programming language type int represents set 32-bit integers ranging value −2,147,483,648 2,147,483,647 well operations performed integers addition subtraction multiplication colors hand represented three bytes denoting amounts red green blue one string representing color name allowable operations include addition subtraction multiplication programming languages also allow programmer define additional data types usually combining multiple elements types defining valid operations new data type example programmer might create new data type named complex number would include real imaginary parts data type also represents constraint placed upon interpretation data type system describing representation interpretation structure values objects stored computer memory type system uses data type information check correctness computer programs access manipulate data data types statistics comparable types computer programming vice versa shown following table identified five definitions type used—sometimes implicitly—in literature types including behavior align closely object-oriented models whereas structured programming model would tend include code called plain old data structures five types definition terms representation often done imperative languages algol pascal definition terms value space behaviour used higher-level languages simula clu primitive data types typically types built-in basic language implementation data computers based digital electronics represented bits alternatives 0 1 lowest level smallest addressable unit data usually group bits called byte usually octet 8 bits unit processed machine code instructions called word typically 32 64 bits instructions interpret word binary number 32-bit word represent unsigned integer values 0 formula_1 signed integer values formula_2 formula_3 two complement machine language machine n't need distinguish unsigned signed data types part floating point numbers used floating point arithmetic use different interpretation bits word see https //en.wikipedia.org/wiki/floating-point_arithmetic details machine data types need exposed made available systems low-level programming languages allowing fine-grained control hardware c programming language instance supplies integer types various widths codice_1 codice_2 corresponding native type exist target platform compiler break code using types exist instance 32-bit integer requested 16 bit platform compiler tacitly treat array two 16 bit integers higher level programming machine data types often hidden abstracted implementation detail would render code less portable exposed instance generic codice_3 type might supplied instead integers specific bit-width boolean type represents values true false although two values possible rarely implemented single binary digit efficiency reasons many programming languages explicit boolean type instead interpreting instance 0 false values true boolean data refers logical structure language interpreted machine language case boolean 0 refers logic false true always non zero especially one known boolean 1 composite types derived one primitive type done number ways ways combined called data structures composing primitive type compound type generally results new type e.g array-of-integer different type integer many others possible tend variations compounds example linked list store data array provides sequential access rather random built records dynamic memory though arguably data structure rather type per se also common distinct enough including discussion composite types justified enumerated type distinct values compared assigned necessarily particular concrete representation computer memory compilers interpreters represent arbitrarily example four suits deck playing cards may four enumerators named club diamond heart spade belonging enumerated type named suit variable v declared suit data type one assign four values implementations allow programmers assign integer values enumeration values even treat type-equivalent integers character string types store sequences characters character set ascii since character sets include digits possible numeric string codice_7 however many languages treat belonging different type numeric value codice_8 character string types different subtypes according required character width original 7-bit wide ascii found limited superseded 8 16-bit sets encode wide variety non-latin alphabets hebrew chinese symbols strings may either stretch-to-fit fixed size even programming language may also subtyped maximum size note strings primitive languages instance c composed array characters types based derived basic types explained languages c functions type derived type return value main non-composite derived type pointer data type whose value refers directly points another value stored elsewhere computer memory using address primitive kind reference everyday terms page number book could considered piece data refers another one pointers often stored format similar integer however attempting dereference look pointer whose value never valid memory address would cause program crash ameliorate potential problem pointers considered separate type type data point even underlying representation type specify implementation abstract data type instance stack abstract type implemented array contiguous block memory containing multiple values linked list set non-contiguous memory blocks linked pointers abstract types handled code know care underlying types contained programming agnostic concrete data types called generic programming arrays records also contain underlying types considered concrete specify contents elements laid memory examples include convenience high-level languages may supply ready-made real world data types instance times dates monetary values memory even language allows built primitive types type system associates types computed values examining flow values type system attempts prove type errors occur type system question determines constitutes type error type system generally seeks guarantee operations expecting certain kind value used values operation make sense compiler may use static type value optimize storage needs choice algorithms operations value many c compilers data type example represented 32 bits accord ieee specification single-precision floating point numbers thus use floating-point-specific microprocessor operations values floating-point addition multiplication etc. depth type constraints manner evaluation affect typing language programming language may associate operation varying concrete algorithms type case type polymorphism type theory study type systems although concrete type systems programming languages originate practical issues computer architecture compiler implementation language design type systems may variously static dynamic strong weak typing forth | [
3931,
1445,
3621,
2576,
5751,
1861,
7205,
6480,
4359,
5778,
5780,
6144,
776,
6498,
2617,
1901,
2619,
784,
6886,
4039,
7631,
486,
6543,
2662,
6922,
5164,
6223,
3747,
1986,
3749,
1989,
4837,
6243,
6593,
5190,
1252,
7333,
6981,
8079,
3784,
... | Test |
7,072 | 3 | Joe-E:joe-e joe-e subset java programming language intended support programming according object-capability discipline language notable early object-capability subset language influenced later subset languages adsafe caja/cajita subsets javascript also notable allowing methods verified functionally pure based method signatures restrictions imposed joe-e verifier include cup joe slang coffee serves trademark-avoiding reference java thus name joe-e intended suggest adaptation ideas e programming language create variant java language waterken server written joe-e | [
180,
6507,
2859,
7554,
2090,
5504,
8111,
7570,
2615,
7414,
762,
4771
] | Test |
7,073 | 5 | TCP_Westwood:tcp westwood tcp westwood tcpw sender-side-only modification tcp new reno intended better handle large bandwidth-delay product paths large pipes potential packet loss due transmission errors leaky pipes dynamic load dynamic pipes tcp westwood relies mining ack stream information help better set congestion control parameters slow start threshold ssthresh congestion window cwin tcp westwood eligible rate estimated used sender update ssthresh cwin upon loss indication agile probing phase proposed modification well-known slow start phase addition scheme called persistent non congestion detection pncd devised detect persistent lack congestion induce agile probing phase expeditiously utilize large dynamic bandwidth resultant performance gains efficiency without undue sacrifice fairness friendliness stability reported numerous papers found tcp westwood home page significant efficiency gains obtained large leaky dynamic pipes maintaining fairness appropriate criterion friendliness i.e opportunistic friendliness tcp westwood shown good controllable friendliness tcp westwood plus evolution tcp westwood fact soon discovered westwood bandwidth estimation algorithm work well presence reverse traffic due ack compression tcp westwood+ version implemented linux kernel | [
7637,
507
] | Test |
7,074 | 2 | ProbeVue:probevue probevue ibm implementation lightweight dynamic tracing environment introduced aix version 6.1 probevue provides ability probe running processes order provide statistical analysis well retrieve data probed process dynamic nature probevue allows used global system performance tool retaining ability drill specific events single process thread modifications required probed process system lightweight design probevue tracing tool suitable use production environment previous tracing tools would performance prohibitive probevue provides series probe point specifications potential events probed script written vue language allows user define probe block code called action block run events occur system execution action block limited specific events use conditional statement placed probe called predicate code action block follows c-like syntax limited set built functions following example probe defined whenever process pid 123456 enters read system call event happens script call built-in printf function print message output trace buffers first line action block c-style comment therefore execute probevue environment probes like sample written run without extensive testing normally required production system probevue environment protects user errant code resource hungry tracing frequently seen previous ibm tracing tools runtime compile feature probevue provides powerful ad hoc environment data gathering currently ibm provides following probe providers aix 6.1 syscall uft interval trace probevue probes begin end syscall provider defines probe points subset available system calls user function tracing uft probes defined entry points functions defined c c++ program syscall uft probes must include valid function prototype vue script function parameters entry probes return values syscall exit probes accessed interval probes fire timer defined 100 millisecond intervals trace provider allows probevue access traditional trace hooks finally probevue probes called begin end fire probevue environment starts exits probevue designed tool monitor operating system events vue language uses event driven style used describe process data derived events like dynamic tracing languages found unices vue language c-like syntax frequently presented context vue relationship c many parallels deviates significantly imperative nature c. contrasts similarities shown probevue used monitor applications written primarily c supports c data types well c data structures vue also supports string list time stamp data types string list types actually arrays time stamp high resolution representation point time type casting automatic type promotion operations mixed types similar c behavior well pointers arrays data structures behave probevue would c program key difference c pointers refer location memory referencing location another process space access memory necessary first copy memory location local probevue environment memory paged probevue force page fault access another difference size pointers c determined compile time probevue determined 32 64 bitness application probed floating point data types valid data types assignment probed process used floating point mathematical operations vue uses scoping rules similar c must also account externally derived nature much data probes result data classes available relevant probes portions view script basic classifications data follows vue operators follow c conventions closely exception used strings used strings operator performs concatenation == operator used comparisons vue allow definition user functions recursion looping constructs offer conditional if-then expressions within probe action block lightweight nature probevue prohibits vue script defining expensive looping extensive branching operations could degrade performance tentative tracing concept allows trace output block code labeled tentative output code later committed trace buffers visible output discarded works conceptually much like transaction controls sql vue script invoked interpreter magic set executable like shell script run input probevue command form command line parameter stdin input convention vue scripts .e filename extension vue language lacks aggregations instead uses list data type offers similar yet limited functionality equivalent product solaris called dtrace offers aggregation data type powerful set aggregating functions represent statistical data list data type offers basic aggregating functions single item opposed associative arrays aggregations dtrace offers list data type offers slight simplification keeping stats manually allow list reset say interval easily done using manual summaries basic types ibm committed associative arrays future versions vue language long development lead time dtrace probevue dtrace considerably probe point specifications ibm plans add considerable number new probe points future technology level releases aix 6.1 next major aix release | [
790,
3666,
7333,
8142,
8037,
1435
] | Test |
7,075 | 3 | Slackware:slackware slackware linux distribution created patrick volkerding 1993 originally based softlanding linux system slackware basis many linux distributions notably first versions suse linux distributions oldest distribution still maintained slackware aims design stability simplicity unix-like linux distribution makes modifications possible software packages upstream tries anticipate use cases preclude user decisions contrast modern linux distributions slackware provides graphical installation procedure automatic dependency resolution software packages uses plain text files small set shell scripts configuration administration without modification boots command-line interface environment many conservative simplistic features slackware often considered suitable advanced technically inclined linux users slackware available ia-32 x86_64 architectures port arm architecture slackware mostly free open source software formal bug tracking facility public code repository releases periodically announced volkerding formal membership procedure developers volkerding primary contributor releases name slackware stems fact distribution started private side project intended commitment prevent taken seriously first volkerding gave humorous name stuck even slackware became serious project slackware refers pursuit slack tenet church subgenius parody religion certain aspects slackware graphics reflect this—the pipe tux smoking influenced image j. r. bob dobbs head humorous reference church subgenius found many versions install.end text files indicate end software series setup program recent versions including slackware release 14.1 text rot13 obfuscated slackware originally derived softlanding linux system sls popular original linux distributions first offer comprehensive software collection comprised kernel basic utilities including x11 graphical interface tcp/ip uucp networking gnu emacs patrick volkerding started sls needing lisp interpreter school project named moorhead state university msu found clisp available linux downloaded sls run weeks later volkerding asked artificial intelligence professor msu show install linux home computers school volkerding made notes describing fixes issues found installing sls professor went applied changes new installation however took almost long took install sls professor asked install disks could adjusted fixes could applied installation start slackware volkerding continued making improvements sls fixing bugs upgrading software automatic installation shared libraries kernel image fixing file permissions short time volkerding upgraded around half packages beyond sls available volkerding intentions provide modified sls version public friends msu urged put sls modifications onto ftp server volkerding assumed sls would putting new version included things soon enough held weeks time many sls users internet asking sls new release eventually volkerding made post titled anyone want sls-like 0.99pl11a system received many positive responses discussion local sysadmin msu volkerding obtained permission upload slackware university ftp server first slackware release version 1.00 distributed july 17 1993 00:16:36 utc supplied 24 3½ floppy disk images announcement made volkerding watched flood ftp connections continually crashed server soon afterwards walnut creek cdrom offered additional archive space ftp servers size slackware quickly increased addition included software version 2.1 released october 1994 tripled comprise 73 1.44m floppy disk images 1999 slackware saw version jump 4 7 slackware version numbers lagging behind distributions led many users believe date even though bundled software versions similar volkerding made decision bump version marketing effort show slackware up-to-date linux distributions many release numbers 6 time chose 7 estimating distributions would soon release number april 2004 patrick volkerding added x.org server packages testing/ directory -current replacement xfree86 packages currently used request comments future x window system slackware month later switched xfree86 x.org server stating opinions 4 1 favor using x.org release default version x stated decision primarily technical one xfree86 proving cause compatibility problems slackware 10.0 first release x.org server march 2005 patrick volkerding announced removal gnome desktop environment development changelog stated consideration 4 years already projects provided complete version gnome slackware slackware provided volkerding stated future gnome support would rely community community responded october 2016 several active gnome projects slackware include cinnamon dlackware dropline gnome mate slackmate removal deemed significant linux community due prevalence gnome many distributions may 2009 patrick volkerding announced public development release official x86_64 variant called slackware64 maintained parallel ia-32 distribution slackware64 pure 64-bit distribution support running compiling 32-bit programs however designed multilib-ready eric hameleers one core slackware team members maintains multilib repository contains necessary packages convert slackware64 multilib enable running 32-bit software hameleers started 64-bit port diversion pain recovering surgery september 2008 volkerding tested port december 2008 impressed saw speed increases 20 40 percent benchmarks compared 32-bit version minimize extra effort maintaining versions parallel slackware build scripts called slackbuilds slowly transitioned supporting either architecture allowing one set sources versions slackware64 saw first stable release version 13.0 november 2013 release 14.1 june 2016 slackware saw 31-month gap releases marking longest span release history time development branch went without updates 47 days however april 21 2015 patrick volkerding apologized changelog absence updates stated development team used time get good work done 700 program changes listed changelog entry including many major library upgrades january 2016 volkerding announced reluctant addition pulseaudio primarily due bluez dropping direct alsa support v5.x various projects turn dropping support bluez v4.x knowing users would happy change stated bug reports complaints threats go changes culminated release slackware 14.2 june 2016 design philosophy slackware oriented toward simplicity software purity core design emphasizes lack change upstream sources many design choices slackware seen heritage simplicity traditional unix systems examples kiss principle context simple refers simplicity system design rather system usage thus ease use may vary users lacking knowledge command line interfaces classic unix tools may experience steep learning curve using slackware whereas users unix background may benefit less abstract system environment keeping slackware design philosophy spirit purity software slackware uses original configuration mechanisms supplied software authors however administrative tasks distribution-specific configuration tools delivered formal issue tracking system official procedure become code contributor developer project maintain public code repository bug reports contributions essential project managed informal way final decisions going included slackware release strictly remain slackware benevolent dictator life patrick volkerding first versions slackware developed patrick volkerding alone beginning version 4.0 official slackware announce files list david cantrell logan johnson part slackware team later announce statements release version 8.1 include chris lumens lumens johnson cantrell also authors first edition slackware linux essentials official guide slackware linux slackware website mentions chris lumens david cantrell slackware alumni worked full-time slackware project several years release notes slackware 10.0 10.1 volkerding thanks eric hameleers work supporting usb pci cardbus wireless cards starting version 12.0 second time team building around volkerding according release notes 12.2 development team consists seven people future versions added people since version 13.0 slackware team seems core members eric hameleers gives insight core team essay history slackware development written october 3–4 2009 shortly release version 13.0 slackware package management system collectively known pkgtools administer install upgrade remove packages local sources also uncompress create packages official tool update slackware network internet originally developed piter punk unofficial way keep slackware up-to-date officially included main tree slackware 12.2 included since slackware 9.1 package upgraded install new package old one remove files longer exist new package running confirms version numbers different thus allowing downgrading package desired slackware packages tarballs compressed using various methods starting 13.0 packages compressed using xz based lzma compression algorithm utilizing filename extension prior 13.0 packages compressed using gzip based deflate compression algorithm using extension support bzip2 lzma compression also added using filename extensions respectively although commonly used packages contain files program well additional metadata files used package manager package tarball contains full directory structure files meant extracted system root directory installation additional metadata files located special directory within tarball usually include file specifically formatted text file read package manager provide users description packaged software well file post-unpacking shell script allowing creation symbolic links preserving permissions startup files proper handling new configuration files aspects installation ca n't implemented via package directory structure package manager maintains directory package installed corresponding install log file lists package size compressed uncompressed software description full path files installed also maintains directory containing files allow proper removal installed symlinks package removed upgraded old install logs files moved respectively making possible review previous packages see removed package management system track manage dependencies however performing recommended full install dependencies stock packages met custom installations 3rd-party packages slackware relies user ensure system supporting system libraries programs required program since official lists dependencies stock packages provided users decide install custom installation install 3rd-party software need work possible missing dependencies since package manager n't manage dependencies install packages whether dependencies met user may find dependencies missing attempting use software slackware incorporate official tools resolve dependencies unofficial community-supported software tools provide function similar way apt debian-based distributions yum red hat-based distributions include official repositories slackware official packages slackware provides available installation media however many third-party repositories slackware standalone repositories others distributions slackware-based retain package compatibility slackware many searched using pkgs.org linux package search engine however mixing matching dependencies multiple repositories lead two packages require different versions dependency form dependency hell slackware wo n't provide dependency resolution packages however projects provide list dependencies included slackware files package commonly extension due possibility dependency issues many users choose compile programs using community-provided slackbuilds slackbuilds shell scripts create installable slackware package provided software tarball since slackbuilds scripts n't limited compiling program source also used repackage pre-compiled binaries provided projects distributions repositories proper slackware packages slackbuilds compile sources several advantages pre-built packages since build original author source code user trust third-party packager furthermore local compilation process allows machine-specific optimization comparison manual compilation installation software slackbuilds provide cleaner integration system utilizing slackware package manager slackbuilds come additional file metadata allows automated tools download source verify source corrupted calculate additional dependencies part slackware repositories include slackbuilds resulting slackware packages allowing users either build install pre-built package officially endorsed slackbuilds repository slackbuilds.org commonly referred sbo community-supported project offering slackbuilds building software included slackware users able submit new slackbuilds software site approved become package maintainer responsible providing updates slackbuild either fix issues build newer versions provided upstream ensure programs compiled used required dependencies software included slackware required documented available site submissions tested site administrators added repository administrators intend build process nearly identical way slackware official packages built mainly ensure volkerding sympathetic cause allows slackbuilds volkerding deems worthy pulled regular slackware minimal changes script also prevent users suggesting volkerding change scripts match sbo sbo provides templates slackbuilds additional metadata files encourage package maintainers deviate unless necessary two slackware team members eric hameleers robby workman repository pre-compiled packages along slackbuilds source files used create packages packages additional software included slackware felt worth time maintain packages used testbed future upgrades slackware notably hameleers provides ktown packages newer versions kde also maintains slackware multilib repository enabling slackware64 run compile 32bit packages slackware release policy follows feature stability based release cycle contrast time-bound e.g ubuntu rolling release e.g gentoo linux schemes linux distributions means set time expect release volkerding release next version feels suitable number changes previous version made changes lead stable environment stated patrick volkerding usually policy speculate release dates since — pure speculation always possible know long take make upgrades needed tie related loose ends things built upcoming release 'll uploaded -current tree throughout slackware history generally try deliver up-to-date software least annual basis however slackware 14.1 14.2 2-year gap releases inception 2014 2015 slackware least one release per year release activity peaked 1994 1995 1997 1999 three releases year starting version 7.1 june 22 2000 release progression became stable tended occur year since years two releases 2003 2005 2008 slackware latest 32bit x86 64bit x86_64 stable releases version 14.2 released june 30 2016 include support linux 4.4.14 volkerding also maintains testing/developmental version slackware called -current used bleeding edge configuration version eventually become next stable release point volkerding start new -current start developing next release slackware version generally known stable possible things break -current tends recommended production systems currently slackware officially stated support term policy however june 14 2012 notices appeared changelogs versions 8.1 9.0 9.1 10.0 10.1 10.2 11.0 12.0 stating effective august 1 2012 security patches would longer provided versions oldest release version 8.1 released june 18 2002 10 years support reaching eol later august 30 2013 announcements made changelogs 12.1 12.2 stating eol december 9 2013 stated changelog entries least 5 years support april 6 2018 versions 13.0 13.1 13.37 declared reaching eol july 5 2018 stated changelog entries least 7 years support 13.0 supported almost 9 years announcements slackware team versions slackware 14.0 eol official announcements versions prior 8.1 longer maintained effectively eol historically slackware concentrated solely ia-32 architecture releases available 32-bit however starting slackware 13.0 64-bit x86_64 variant available officially supported symmetrical development 32-bit platform prior release slackware64 users wanting 64-bit required use unofficial ports slamd64 slackware also available ibm s/390 architecture form slack/390 arm architecture slackware arm originally known 'armedslack ports declared official patrick volkerding however s/390 port still version 10.0 stable version 11.0 testing/developmental version updates since 2009 also may 7 2016 developer slackware arm announced 14.1 eol september 1 2016 development -current cease release 14.2 however support 14.2 maintained foreseeable future eol announcement 14.1 added changelog june 25 2016 july 2016 developer slackware arm announced development build tools enhanced reduce manual effort involved maintaining arm port proceeded announce 32-bit hardware floating port development port released august 2016 current form slackintosh unofficial port slackware new world macintosh powerpc architecture slackintosh final release 12.1 longer maintained slackware iso images installation downloaded free slackware website via bittorrent various ftp http mirrors 6-cd set single dual-dvd previously available order slackware official store store currently unavailable official statement return cd set targeted 32bit ia-32 platform also runs 64bit x86_64 processors 32-bit mode dvd contains 32bit 64bit versions distributions ports arm architecture ibm s/390 neither available cd/dvds iso images downloaded slackware s/390 installs dos partition floppy disk slackware arm distribute iso files arm devices boot cd dvd instead installed network using das u-boot tftp boot server mini-root filesystem slackware arm also installed pc running qemu using technique 2019 distrowatch ranks slackware 34 interest appears peaked 2002 slackware rank reached 7 gradually slipped top 10 2010 appears stabilized around current rank 2015 however since distrowatch tracks visitors various distributions pages state ranking n't always correlate usage distribution popularity distribution site rankings used measure market share distributions linux distributions slackware official tracking system total unique installs active users | [
2179,
5366,
6794,
2187,
2909,
4670,
5724,
7161,
6086,
3949,
7894,
2935,
5051,
6453,
5757,
7555,
6117,
2585,
2228,
1487,
415,
58,
3996,
7587,
4008,
1893,
6857,
7954,
6505,
1909,
462,
6884,
7246,
7969,
6175,
7251,
4400,
7253,
3696,
474,
1... | Test |
7,076 | 6 | Linear_Tape_File_System:linear tape file system linear tape file system ltfs file system allows files stored magnetic tape accessed similar fashion disk removable flash drives requires specific format data tape media software provide file system interface data technology based around self-describing tape format developed ibm adopted lto consortium 2010 magnetic tape data storage used 50 years typically hold file metadata form easy access modify independent file content data often external databases used maintain file metadata file names timestamps directory hierarchy hold data external databases generally designed interoperability tapes might might contain index content unix-like systems tar interoperable standard well-suited allow modification file metadata independent modifying file content data maintain central index files provide filesystem interface characteristics ltfs technology first implemented ibm prototype running linux mac os x 2008/2009 prototype demonstrated nab 2009 based feedback initial demonstration experience within ibm filesystem overhauled preparation release product ltfs development team worked vendors lto tape products hp quantum build support understanding ltfs format filesystem implementation leading public release ltfs format specification filesystem implementation released april 12 2010 support ibm hp quantum lto consortium ltfs v2.0.0 released march 2011 improving text clarify remove ambiguity also added support sparse files persistent file identifiers virtual extended attributes filesystem metadata control defined minimum recommended blocksize values ltfs volumes compatibility across various hba hardware implementations version 2.0.0 defines rules version number may change future compatibility maintained across varying implementations implementations must august 2012 snia announced forming twg technical work group continue technical development specification ltfs format specification v 2.1 baseline technical work standards accreditation process snia ltfs twg members include hp ibm oracle quantum ltfs make tape appear behave like disk change fundamentally sequential nature tape files always appended end tape file modified overwritten removed volume associated tape blocks used freed simply marked unavailable used volume capacity recovered data deleted capacity recovered whole tape reformatted spite disadvantages several uses cases ltfs formatted tape superior disk data storage technologies lto seek times range 10 100 seconds streaming data transfer rate match exceed disk data transfer rates additionally lto cartridges easily transportable hold far data removable data storage format ability copy large file large selection files 1.5tb lto-5 2.5tb lto_6 ltfs formatted tape allows easy exchange data collaborator saving archival copy since ltfs open standard ltfs formatted tapes usable wide variety computing systems ibm linear tape file system single drive edition initially released ibm long term file system allows tapes formatted ltfs volume volumes mounted users applications access files directories stored tape directly including drag-and-drop files ibm linear tape file system library edition ltfs-le product allows ltfs volumes used tape library ltfs-formatted tape cartridge library appears separate folder filesystem mount point user application navigate folders access files stored tape ltfs-le software automatically controls tape library robotics load unload necessary ltfs volumes oracle free open source storagetek linear tape file system ltfs open edition software claimed first store 8.5tb native capacity single cartridge supports oracle ’ midrange storagetek lto 5 lto 6 tape drives hp ibm well oracle ’ storagetek t10000c t10000d tape drives oracle ’ storagetek ltfs-le software offering supports storagetek sl8500 modular library system storagetek sl3000 modular library system storagetek sl150 modular tape hp linear tape file system hp ltfs hp implementation free open source software application quantum corporation provides ltfs solution windows linux mac os x support scalar ltfs appliance file system presents quantum tape library nas share appliance makes files viewable resided local disk allows users drag drop files directly tape cartridge implementations | [
3599,
2547,
7161,
4672,
3626,
6117,
6854,
5437,
4375,
6500,
6505,
5457,
4759,
460,
1534,
7976,
4406,
821,
7258,
5130,
1561,
836,
5843,
6558,
2683,
5859,
5865,
4444,
5518,
6231,
869,
2704,
1605,
174,
2710,
3764,
1254,
1624,
5900,
4480,
4... | Test |
7,077 | 7 | CloudShare:cloudshare cloudshare cloud computing provider company formerly structures founded january 2007 israel headquartered san francisco california cloudshare combines aspects virtualization cloud computing advanced features offer software service saas similar virtual lab automation cloudshare makes full-featured virtual enterprise environments available online on-demand applications including developing testing pre-sales demos proofs-of-concept evaluations technical training development certification hardware software channel enablement customers create multi-machine environments cloud upload existing virtual machines cloudshare supports hypervisors vmware oracle virtualbox operating systems windows 7 ubuntu provides templates new machines operating systems even software microsoft sharepoint 2010 microsoft office 2010 ruby rails preinstalled created environments consist single virtual machine multiple networked machines able operate seamlessly user ’ physical pc workstation environments saved replicated shared additional users free interact independent replica “ snapshot ” cloudshare founded tel aviv israel january 2007 avner rosenan ophir kra-oz zvi guterman company originally named structures 2009 cloudshare moved headquarters san mateo california december 2009 cloudshare closed series b round funding receiving 10 million sequoia capital charles river ventures gemini capital bringing total venture capital funding 16 million 2014 zvi guterman bought company back sequoia capital took private | [
2961,
330
] | Test |
7,078 | 2 | SCSI_Pass_Through_Interface:scsi pass interface scsi pass interface spti application programming interface api accessing scsi device developed microsoft corporation part windows nt family operating systems storage port drivers provide interface win32 applications send scsi command descriptor block cdb messages scsi devices interfaces ioctl_scsi_pass_through ioctl_scsi_pass_through_direct applications build pass-through request send device using ioctl spti accessible windows software using deviceiocontrol windows api imgburn offers spti method accessing optical disc drives | [
4360,
4759,
5571,
6256,
2729,
578,
4017
] | Validation |
7,079 | 2 | USIX:usix usix discontinued unix-like computer operating system created system six inc. russia ineum institut elektronnykh upravlyaushikh mashin institute electronic control machines one leading software r organizations soviet union collapse funding system six operating system development closed | [
4751,
6076,
7794,
4478,
5462,
3690,
900,
2467,
2294,
5571,
2300,
2118,
6360,
578,
5048,
5232,
1288,
6367,
2864,
4447,
2887,
3751,
443
] | Test |
7,080 | 1 | SQL_Server_Management_Studio:sql server management studio sql server management studio ssms software application first launched microsoft sql server 2005 used configuring managing administering components within microsoft sql server successor enterprise manager sql 2000 tool includes script editors graphical tools work objects features server central feature ssms object explorer allows user browse select act upon objects within server also shipped separate express edition could freely downloaded however recent versions ssms fully capable connecting manage sql server express instance microsoft also incorporated backwards compatibility older versions sql server thus allowing newer version ssms connect older versions sql server instances also comes microsoft sql server express 2012 users download separately starting version 11 application based visual studio 2010 shell using wpf user interface versions 18 based visual studio 2017 isolated shell june 2015 microsoft announced intention release future versions ssms independently sql server database engine releases | [
4759,
7619,
7621,
7715,
2283,
4936,
7971,
8183,
8085,
2840,
1371,
5571,
8094,
4697,
5747,
5234,
3303,
930,
53,
941,
6386,
422,
425,
1684,
5694,
5252,
2341,
2702,
7687,
2530,
4017,
2085
] | Test |
7,081 | 2 | Windows_Master_Control_Panel_shortcut:windows master control panel shortcut windows master control panel shortcut labeled tasks also called windows god mode bloggers tasks folder least one microsoft developer short-cut access various control settings windows vista later operating systems including windows 10 creating folder certain name users access operating system control panels within single folder hack published outside microsoft documentation 2007 gained popularity name god mode used bloggers variations method access different settings also called “ god mode ” folders functionality discovered named master control panel god mode designed base folder searching control panel options using new start menu search function allows users type want e. g. “ change screen resolution ” get right control panel options search result shortcut implemented creating folder extension codice_1 godmode original folder name used feature publicised name used functionality achieved creating standard windows shortcut path codice_2 creating codice_3 file folder includes extension clsid class id general method creating shortcuts documented microsoft though microsoft publicized specific guid codice_4 master control panel third parties published method since least 2007 modest title “ registry hack vista control panel setting tasks one place ” numerous blogs tweets subject appeared december 2009 january 2010 “ windows 7 godmode ” many sites repeating information available elsewhere general folder shortcut format codice_5 codice_6 valid class id clsid system.applicationname entry windows registry technique documented microsoft “ using file system folders junction points ” clsid codice_7 particular interest associated widget allows access many windows settings microsoft documents guids regular control panel applets msdn cnet article attributed many guid shortcuts head microsoft windows division steven sinofsky pre-java 8 applications using swing windows look-and-feel including compiled excelsior jet known crash windows 10 creators update god folder exists | [
4759,
5571
] | Test |
7,082 | 5 | MIMIC_Simulator:mimic simulator mimic simulator product suite gambit communications consisting simulation software network systems management space mimic simulator suite several components related simulation managed networks data centers purposes software development software testing training sales marketing network management applications see mimic snmp simulator solves classical simulation problem network management operations support system software typically manages large networks traditionally order set networks purposes physical equipment separately purchased assembled laboratories reduce expense network simulated e.g see principle behind snmp simulation snmp protocol interface simulated snmp requests carry data values mib objects shaped simulator thus representing device snmp interface contrast network simulation entire network modeled within computer type empirical simulation visible network one communicate simulator network concept extended protocols modern management software typically uses multiple protocols manage networks simulator thus integrate required protocols present authentic instrumentation mimic ios simulator allows simulating cli protocol encountered cisco ios junos tl/1 low-end mimic virtual lab products used training cisco ccna mimic netflow simulator creates many custom netflow exporters mimic sflow simulator sflow mimic ipmi simulator simulates ipmi rmcp via lan interface high-end servers mimic web simulator handles http soap xml wsdl wsman redfish interfaces management via web services mimic iot simulator creates large iot environments based standard protocols mqtt coap | [
7443,
4759,
6521,
7315,
578,
2219
] | Test |
7,083 | 7 | Tresorit:tresorit tresorit online cloud storage service based switzerland hungary emphasizes enhanced security data encryption businesses individuals/freelancers business version offers 1tb storage space per user solo version offers 2tb one user extra security features drm granular access levels functions aim create safer collaborative environment tresorit likened high-security alternative dropbox tresorit service accessible client desktop software web-based application mobile apps currently software available windows macos android windows phone 8 ios linux tresorit founded 2011 hungarian programmers istvan lam remains ceo szilveszter szebeni currently cio gyorgy szilagyi cpo company tresorit officially launched client-side encrypted cloud storage service emerging stealth beta april 2014 august 2015 wuala owned lacie seagate pioneer secure cloud storage announced closing service 7 years recommended users choose tresorit secure cloud alternative end 2016 tresorit launched beta software development kit sdk zerokit january 2017 apple sdk project carekit announced option mobile app developers using carekit integrate zerokit enabling zero knowledge user authentication encryption medical health apps tresorit encrypts files using client-side encryption aes-256 uploading files also secured hmac message authentication codes applied sha-512 hashes tresors german vaults encrypted counterparts uploaded directories tresors automatically sync cloud files added removed similar box.com dropbox desktop software main difference tresorit competition tresorit applies aes-256 client-side encryption files still local uploads cloud company claims due end-to-end encryption users share protected files folders others work together keeping documents synced secure every step process additional layers security core privacy feature service encryption key never leaves user using zero-knowledge encryption protocols tresorit possession users ’ authentication data content files accessed servers delivered authorities upon request 2013 2014 tresorit hosted hacking contest offering 10,000 anyone hacked data encryption methods gain access servers months reward increased 25,000 later 50,000 challenging experts institutions like harvard stanford mit contest ran 468 days according company nobody able break encryption tresorit received number nominations awards up-cloud rewards named one top 5 cloud security solutions 2012 early 2016 forbes listed tresorit cofounder istvan lam among european 30 30 2017 tresorit listed finalist cybersecurity excellence awards category encryption | [
3430,
1911,
3350,
5808,
3943,
4594,
2566,
5571,
578,
6025,
6458,
7013,
7102,
854,
5773,
1589,
4990,
3328,
4014,
5889
] | Test |
7,084 | 1 | ArchINFORM:archinform archinform online database international architecture originally emerging records interesting building projects architecture students university karlsruhe germany self-described largest online-database worldwide architects buildings contains plans images buildings built potential forms record architecture 20th century database uses search engine allows particular project found listing architect location key word described librarian calouste gulbenkian foundation one useful reference tools concerning architecture available internet | [
2054
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.