node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
7,085
1
The_National_Law_Review:national law review national law review american law journal legal news website legal analysis content-aggregating database site offers news coverage analysis recent court decisions regulatory changes legislative actions includes original content content submitted various professionals legal business communities online version national law review started research tool group corporate attorneys looking store classify useful legal analysis news located internet on-line version specializes news analysis following types american law administrative law banking law bankruptcy law civil procedure common law competition law conflicts laws construction law consumer protection contract law copyright law business criminal law cyberlaw election law energy law entertainment law environment law family law financial regulation law health law immigration law insurance law intellectual property law labour law labor law military law municipal law patent law product liability property law securities law statutory law tort law tax law trademark law trust law national law review print edition founded 1888 philadelphia legal publishers kay brother monthly scholarly law review included sections current legal news book review section digest important decisions summarized recent judicial decisions various states section devoted current legal thought organized legal topic historically articles law reviews often considered persuasive authority american courts though influence generally thought waning recent years on-line edition national law review developed chicago illinois corporate attorney jennifer schaller legal internet professionals order provide easily accessible reliable database articles written experts analyzing legal news trends on-line edition described straightforward practical informative traditional law review containing information potential interest legal business professionals often serves reference source legal periodicals addition serving source emerging american legal issues mainstream media national law review provides several services interest practicing lawyers law students running example law student writing competition published articles multiple areas law
[ 6788 ]
Test
7,086
1
National_Forensic_DNA_Database_of_South_Africa:national forensic dna database south africa national forensic dna database south africa nfdd national dna database used law enforcement south africa criminal law forensic procedures amendment act 37 2013 dna act provides expansion administration database south africa enabling south african police service saps match forensic dna profiles derived samples collected crime scenes forensic dna profiles offenders convicted suspects arrested offences listed new schedule 8 amended criminal procedure act 1977 dna profiling used south african law enforcement since 1998 albeit without legal framework prior commencement dna act dna criminal intelligence database dcid developed saps administered biology unit saps forensic science laboratory fsl repository dna profiles held fsl prior commencement dna act comprises two indices namely casework index containing forensic dna profiles derived biological samples collected crime scenes reference index containing forensic dna profiles known people including victims suspects volunteers personnel criminal procedure act 1977 currently prevents dna samples taken convicted offenders dna profiles dcid generated analysing ampflstr profiler plus str multiplex system 9 different str loci d3s1358 vwa fga d8s1179 d21s11 d18s51 d5s818 d13s317 d7s820 plus amelogenin sex determination approximately 80,000 dna profiles dcid 2007 number increasing approximately 180,000 late 2013 criminal law forensic procedures amendment act 37 2013 dna act provides expansion regulation administration national dna database known national forensic dna database south africa nfdd initial criminal law forensic procedures amendment bill drafted 2008 tabled parliament 2009 subsequently split two separate bills criminal law forensic procedures amendment bill b2–2009 dealing fingerprints body-prints assented 2010 came effect 18 january 2013 separate bill unofficially known dna bill re-introduced parliament may 2013 addresses various concerns arose regarding initial bill including relating human rights issues final version dna bill namely criminal law forensic procedures amendment bill b9d–2013 passed national assembly 12 november 2013 assented president jacob zuma 23 january 2014 commencement date dna act 31 january 2015 dna act provides inter alia nfdd comprises six indices containing forensic dna profiles namely crime scene index arrestee index convicted offender co index investigative index elimination index missing persons unidentified human remains index mandatory dna sampling applies persons convicted persons arrested offences listed new schedule 8 amended criminal procedure act 1977 offences listed schedule 8 may amended initial implementation phase takes account capacity constraints dna profiles nfdd generated analysing 15 different str loci plus amelogenin sex determination different retention frameworks apply six different indices crime scene index contains forensic dna profiles obtained crime scene samples biological evidence collected crime scenes held nfdd indefinitely arrestee index convicted offender index contains forensic dna profiles persons arrested convicted case may schedule 8 offence range rape murder burglary forensic dna profiles entered arrestee index either migrated convicted offender index upon conviction held indefinitely removed within three years arrest result conviction forensic dna profiles obtained volunteers informed consent held investigative index removed nfdd within 3 months case finalised repository dna profiles held state fsl expected transferred nfdd within 3 months dna database operational 2013 fsl investigating implementing combined dna index system database software developed fbi dna act subject five-year implementation plan takes account new training equipment requirements brazil families crime victims south africa successfully campaigned establishment national forensic dna database dna project non-profit organisation advocacy initiative founded attorney vanessa lynch following unsolved murder lynch father john lynch 2004 dna project advocates establishment expansion national forensic dna database hence earlier identification criminal suspects campaigned passing dna bill donated laboratory equipment fsl funded uk forensic science service diagnostic review south africa fsl initiated dna forensic awareness training programs developed post-graduate forensic analyst qualification
[]
Train
7,087
4
Bitdefender:bitdefender bitdefender romanian cybersecurity anti-virus software company founded 2001 florin talpeș currently ceo bitdefender develops sells anti-virus software internet security software endpoint security software cybersecurity products services 2018 software 500 million users worldwide bitdefender software originally developed softwin sold avx antivirus expert 1996 2001 name changed 2007 softwin spun bitdefender bitdefender develops markets anti-virus internet security endpoint security cyber security products services bitdefender internet things device protection solution called bitdefender box box router designed protect smart home products internet things devices blocking malicious internet traffic available windows mac bitdefender offers cloud-based security solution anti-malware anti-theft capabilities android ios users called bitdefender mobile security businesses company markets bitdefender gravityzone enterprise security includes self-configuring kits deployment desktop datacenter cloud software secures physical virtual cloud-based endpoints software uses network malware data stay updated software product small businesses looking simple security called bitdefender gravityzone business security bitdefender antispam neunet antispam filter trained bitdefender antispam lab series spam messages learns recognize new spam perceiving similarities messages already examined may 2006 bitdefender developed new technology b-have reduce dependency virus signatures proactive detection unknown threats technology based behavioral analysis virtualized environment bitdefender introduced active virus control august 2009 technology continuously monitors program specific processes running pc executes notes malware-like actions action scored given threshold reached process reported harmful 2014 version company claimed feature new technology called fuoton technology says visibly improves computer speed performance gradually adapting pc content filtering technologies developed filter raw online content applicable used antispam anti-phishing web filtering scanning spam social networks facilitate creation signatures proactively detect never-before-seen malicious files company claims bitdefender using cloud-based machine learning identify new malware malicious urls online threats processing analysing big data obtain behavioral patterns predict future advanced threats may 2009 customers criticized bitdefender support service lack responses bitdefender responded saying aware problems would take steps solve attributed problem unexpectedly high surge customers currently company website claims support available 24/7 telephone email livechat online knowledge base 20 march 2010 computers running bitdefender 64-bit versions windows affected malfunctioning update classified every executable program well dll files infected files marked 'trojan.fakealert.5 moved quarantine action led software systems malfunctions affected users around world bitdefender representatives announced removal faulty update workaround users affected except using 2008 version version 2012 bitdefender comodo firewall bitdefender co-exist currently official solution unofficial suggestions forums bitdefender bitdefender incompatible asus aisuite2 asus aisuite3 motherboard optimization suite software bundled asus motherboards enables automatic overclocking power tuning fan control bitdefender claims incompatibility due ndis asus driver winpkfilter lightweight filter prevents installation bitdefender files
[ 5452, 91, 4115, 5546, 4759, 7425, 3089, 2642, 6895, 4492, 1931, 4138, 385, 910, 1838, 6005, 2296, 2746, 2842, 4689, 6006, 4783, 3111, 2850, 1383, 496, 6644, 5144, 7193, 3123, 142, 935, 3561, 5066, 7478, 1122, 5330, 5601, 6043, 6305, 702...
Test
7,088
4
SMTP_Authentication:smtp authentication smtp authentication often abbreviated smtp auth extension simple mail transfer protocol smtp whereby client may log using authentication mechanism supported server mainly used submission servers authentication mandatory smtp specified jon postel 1970s provide using passwords sending email messages server design open mail relay initially problem late '90s spam worms become plague smtp auth relay client identified ip address practical email services provided internet service provider isp supplying connection else using specific hacks pop smtp john gardiner myers published first draft smtp auth 1995 successively developed discussed ietf along mail submission protocol extended smtp esmtp simple authentication security layer sasl older sasl mechanism esmtp authentication esmtpa cram-md5 uses md5 algorithm hmacs hash-based message authentication codes still considered sound internet mail consortium imc reported 55 mail servers open relays 1998 less 1 2002 using mail submission agent msa generally port 587 implies smtp auth msa usage supported software recommended especially support nomadic users several network hubs either block port 25 use smtp proxies msa responsible ensuring message envelope contains good addresses may enforce local policies codice_1 header field verifying envelope sender a.k.a codice_2 used spf address agree authenticated user-id particularly important domains sign messages using dkim keywords ending codice_3 codice_4 provided codice_5 clause codice_6 header fields messages received smtp auth keywords provided statistical diagnostic purposes rfc 3848 checked clients e.g spamassassin smtp extensions smtp auth advertised ehlo response along list supported authentication methods methods may change issuing starttls typically allowing plain text passwords latter case rfc 4954 provides following example c part protocol indicate lines sent client server respectively smtp auth used also port 25 usually servers reject rcpt commands imply relaying unless authentication credentials accepted specification recommends servers issue 530 5.7.0 authentication required response commands case server configured require authentication client n't done yet servers listening port 587 private servers configured way message exchange mx however historical trait smtp authenticated default results different behavior regard access protocols cases example using auth external starttls besides auth command extension also provides auth parameter mail command allow distinguish authentication authorization way sender identify transmit several messages session authentication n't need vary established different messages may sent according different agreements hence require different authorization example messages may relayed behalf different users use parameter much less popular using command grant relay privileges using authentication ehlo used greeting indicate extended smtp use opposed deprecated helo greeting still accepted extension used backward compatibility capitalized text auth command list types authorization smtp server accept examples authorization protocols include
[ 1593, 770, 7470, 2839, 5722, 3379, 6908, 3293 ]
Test
7,089
6
B1_Free_Archiver:b1 free archiver b1 free archiver proprietary freeware multi-platform file archiver file manager b1 archiver available microsoft windows linux macos android full support compression unpacking encryption zip native b1 format program decompresses 20 popular archive formats creates split encrypted archives b1 free archiver translated 30 languages translations made volunteers crowdin localization management platform program used graphical user interface command line interface b1 free archiver written c++/qt released proprietary license b1 free archiver supports opening popular archive formats b1 zip rar 7z gzip tar.gz tar.bz2 iso create .b1 .zip archives utility also create split archives consist several parts specified size password-protected archives encrypted 256 bit aes algorithm desktop application supports editing archive adding new files deleting files archive editing files directly archive b1 free archiver full drag-and-drop support keyboard shortcuts hotkeys navigation program works windows xp higher linux ubuntu/debian fedora macos 10.6 higher android also online b1 free archiver decompression tool
[ 4759, 5571, 658, 578 ]
Validation
7,090
4
Multilevel_security:multilevel security multilevel security multiple levels security mls application computer system process information incompatible classifications i.e. different security levels permit access users different security clearances needs-to-know prevent users obtaining access information lack authorization two contexts use multilevel security one refer system adequate protect subversion robust mechanisms separate information domains trustworthy another context refer application computer require computer strong enough protect subversion possess adequate mechanisms separate information domains system must trust distinction important systems need trusted necessarily trustworthy mls operating environment often requires highly trustworthy information processing system often built mls operating system os necessarily mls functionality supported system composed entirely untrusted computers although requires multiple independent computers linked hardware security-compliant channels see section b.6.2 trusted network interpretation ncsc-tg-005 example hardware enforced mls asymmetric isolation one computer used mls mode computer must use trusted operating system os information mls environment physically accessible os strong logical controls must exist ensure access information strictly controlled typically involves mandatory access control uses security labels like bell–lapadula model customers deploy trusted operating systems typically require product complete formal computer security evaluation evaluation stricter broader security range lowest highest classification levels system process trusted computer system evaluation criteria tcsec first evaluation criteria developed assess mls computer systems criteria clear uniform mapping security requirements breadth mls security range historically implementations certified capable mls processing security range unclassified top secret among honeywell scomp usaf sacdin nsa blacker boeing mls lan tcsec 1980s vintage intel 80386-based currently mls products evaluated common criteria late 2008 first operating system certified high evaluated assurance level evaluation assurance level eal eal 6+ high robustness auspices u.s. government program requiring multilevel security high threat environment assurance level many similarities old orange book a1 formal methods functional requirements focus fundamental isolation information flow policies rather higher level policies bell-la padula common criteria decoupled tcsec pairing assurance eal functionality protection profile clear uniform mapping security requirements mls security range capability documented csc-std-004-85 largely lost common criteria superseded rainbow series freely available operating systems features support mls include linux security-enhanced linux feature enabled freebsd security evaluation thought problem free mls implementations three reasons notwithstanding suppositions red hat enterprise linux 5 certified lspp rbacpp capp eal4+ june 2007 uses security-enhanced linux implement mls first common criteria certification enforce toe security properties security-enhanced linux vendor certification strategies misleading laypersons common strategy exploits layperson overemphasis eal level over-certification certifying eal 3 protection profile like capp elevated levels like eal 4 eal 5 another adding certifying mls support features role-based access control protection profile rbacpp labeled security protection profile lspp kernel evaluated mls-capable protection profile types features services run kernel depend kernel protect corruption subversion kernel evaluated mls-capable protection profile mls features trusted regardless impressive demonstration looks particularly noteworthy capp specifically mls-capable profile specifically excludes self-protection capabilities critical mls general dynamics offers pitbul l trusted mls operating system pitbull currently offered enhanced version red hat enterprise linux earlier versions existed sun microsystems solaris ibm aix svr4 unix pitbull provides bell lapadula security mechanism biba integrity mechanism privilege replacement superuser many features pitbull security base general dynamics trusted network environment tne product since 2009 tne enables multilevel information sharing access users department defense intelligence communities operating varying classification levels also foundation multilevel coalition sharing environment battlefield information collection exploitation systems extended bices-x sun microsystems oracle corporation offers solaris trusted extensions integrated feature commercial oss solaris opensolaris addition controlled access protection profile capp role-based access control rbac protection profiles trusted extensions also certified eal4 labeled security protection profile lspp security target includes desktop network functionality lspp mandates users authorized override labeling policies enforced kernel x window system x11 server evaluation include covert channel analysis certifications depend capp common criteria certifications suggest product trustworthy mls bae systems offers xts-400 commercial system supports mls vendor claims high assurance predecessor products including xts-300 evaluated tcsec b3 level mls-capable xts-400 evaluated common criteria eal5+ capp lspp protection profiles capp lspp eal3 protection profiles inherently mls-capable security target common criteria evaluation product contains enriched set security functions provide mls capability sanitization problem area mls systems systems implement mls restrictions like defined bell–lapadula model allow sharing obviously violate security restrictions users lower clearances easily share work users holding higher clearances vice versa efficient reliable mechanism top secret user edit top secret file remove top secret information deliver users secret lower clearances practice mls systems circumvent problem via privileged functions allow trustworthy user bypass mls mechanism change file security classification however technique reliable covert channels pose another problem mls systems mls system keep secrets perfectly must possible way top secret process transmit signals kind secret lower process includes side effects changes available memory disk space changes process timing process exploits side effect transmit data exploiting covert channel extremely difficult close covert channels practical computing system may impossible practice process identifying covert channels challenging one commercially available mls systems attempt close covert channels even though makes impractical use high security applications bypass problematic introduced means treat system high object mls trusted common example extract data secret system high object sent unclassified destination citing property data trusted evidence 'really unclassified e.g 'strict format system high system trusted preserve trusted evidence result overt data path opened logical way securely mediate bypass risky unlike narrow bandwidth covert channels difficult exploit bypass present large easily exploitable overt leak system bypass often arises failure use trusted operating environments maintain continuous separation security domains way back origin origin lies outside system boundary may possible validate trusted separation origin case risk bypass unavoidable flow truly essential common example unavoidable bypass subject system required accept secret ip packets untrusted source encrypt secret userdata header deposit result untrusted network source lies outside sphere influence subject system although source untrusted e.g system high trusted mls provides packets unclassified headers secret plaintext userdata mls data construct since source untrusted could corrupt place secrets unclassified packet header corrupted packet headers could nonsense impossible subject system determine reasonable reliability packet userdata cryptographically well protected packet header contain readable secrets corrupted packets passed untrusted network subject system may routable cooperating corrupt process network could grab packets acknowledge subject system may detect leak large overt leak hard detect viewing classified packets unclassified headers system high structures instead mls structures really presents common serious threat bypass avoidable avoidable bypass often results system architects design system correctly considering security attempt apply security fact add-on functions situation bypass appears easy way make system work pseudo-secure schemes proposed approved examine contents bypassed data vain attempt establish bypassed data contains secrets possible without trusting something data format contrary assumption source trusted preserve characteristics source data assured secure bypass myth so-called high assurance guard hag transparently implements bypass risk introduce long acknowledged extant solutions ultimately procedural rather technical way know certainty much classified information taken systems exploitation bypass decline compusec experts laypersons compusec-astute designing secure computing systems mistakenly drawing conclusion term mls overloaded two uses mls processing environment vs mls capability false conclusion based belief products certified operate mls environment mode therefore mls capability exist one imply many systems operate environment containing data unequal security levels therefore mls computer security intermediate value theorem cs-ivt consequence confusion runs deeper noted however nsa-certified mls operating systems databases networks existed operational mode since 1970s mls products continuing built marketed deployed laypersons often conclude admit system operates mls environment environment-centric meaning mls backed perceived corner problem mls solution capability-centric meaning mls mls deceptively complex simple solutions obvious justify conclusion exist lead crippling ignorance compusec manifests whispers one talk mls thing mls mls-denial schemes change rapidly addressed instead important clarify distinction mls-environment mls-capable original use term mls applied security environment mode one solution confusion retain original definition mls specific mls-capable context used multiple independent levels security mils architecture addresses domain separation component mls note ucdmo us government lead cross domain multilevel systems created term cross domain access category baseline dod intelligence community accredited systems category seen essentially analogous mils security models biba model integrity bell–lapadula model confidentiality allow one-way flow certain security domains otherwise assumed isolated mils addresses isolation underlying mls without addressing controlled interaction domains addressed models trusted security-compliant channels mentioned link mils domains support mls functionality mils approach pursues strategy characterized older term msl multiple single level isolates level information within single-level environment system high rigid process communication isolation offered mils may useful ultra high reliability software applications mls mils notably address hierarchical structure embodied notion security levels requires addition specific import/export applications domains needs accredited appropriately mils might better called multiple independent domains security mls emulation mils would require similar set accredited applications mls applications declining address box interaction among levels consistent hierarchical relations bell-la padula mils almost deceptively simple implement initially needs non-trivial supplementary import/export applications achieve richness flexibility expected practical mls applications mils/mls comparison consider accreditation set simpler export applications achievable accreditation one complex mls kernel question depends part extent import/export interactions stakeholders require favour mils possibility export applications require maximal assurance another way solving problems known multiple single-level security level isolated separate untrusted domain absence medium communication domains assures interaction possible mechanism isolation usually physical separation separate computers often used support applications operating systems possibility supporting mls microsoft windows infrastructure trusted operating systems important component mls systems order fulfill criteria required definition mls cnssi 4009 paraphrased start article system must provide user interface capable allowing user access process content multiple classification levels one system ucdmo ran track specifically focused mls nsa information assurance symposium 2009 highlighted several accredited production emergent mls systems note use mls selinux several databases classified mls systems oracle product named oracle label security ols implements mandatory access controls typically adding 'label column table oracle database ols deployed us army inscom foundation all-source intelligence database spanning jwics siprnet networks project create labeled version postgresql also older labeled-database implementations trusted rubix mls database systems provide unified back-end system content spanning multiple labels resolve challenge users process content multiple security levels one system enforcing mandatory access controls also several mls end-user applications mls capability currently ucdmo baseline called mlchat chat server runs xts-400 operating system created us naval research laboratory given content users different domains passes mlchat server dirty-word scanning employed protect classified content debate truly mls system form cross-domain transfer data guard mandatory access controls maintained combination xts-400 application-specific mechanisms joint cross domain exchange jcdx another example mls capability currently ucdmo baseline jcdx department defense dod defense intelligence agency dia accredited multilevel security mls command control communication computers intelligence c4i system provides near real-time intelligence warning support theater forward deployed tactical commanders jcdx architecture comprehensively integrated high assurance protection level four pl4 secure operating system utilizing data labeling disseminate near real-time data information force activities potential terrorist threats around world oceans installed locations united states allied partner countries capable providing data top secret/sci secret-releasable levels single platform mls applications currently part ucdmo baseline include several applications bluespace bluespace several mls applications including mls email client mls search application mls c2 system bluespace leverages middleware strategy enable applications platform neutral orchestrating one user interface across multiple windows os instances virtualized remote terminal sessions us naval research laboratory also implemented multilevel web application framework called mlweb integrates ruby rails framework multlevel database based sqlite3 perhaps greatest change going multilevel security arena today convergence mls virtualization increasing number trusted operating systems moving away labeling files processes instead moving towards unix containers virtual machines examples include zones solaris 10 tx padded cell hypervisor systems green hill integrity platform xenclient xt citrix high assurance platform nsa implemented general dynamics trusted virtualization environment tve another example uses selinux core support mls applications span multiple domains
[ 1522, 4759, 2462, 2384, 2557, 6717, 3863, 6725, 5571, 7827, 8191, 3794, 3552, 6208, 843, 1959, 8010, 3037, 2774, 4447, 2879, 5255, 8031, 4834, 3678, 1805 ]
Validation
7,091
5
Resource_Reservation_Protocol:resource reservation protocol resource reservation protocol rsvp transport layer protocol designed reserve resources across network quality service qos using integrated services model rsvp operates ipv4 ipv6 provides receiver-initiated setup resource reservations multicast unicast data flows transport application data similar control protocol like internet control message protocol icmp internet group management protocol igmp rsvp described rsvp used hosts routers request deliver specific levels qos application data streams flows rsvp defines applications place reservations relinquish reserved resources longer required rsvp operation generally result resources reserved node along path rsvp routing protocol designed interoperate current future routing protocols rsvp rarely deployed telecommunications networks today traffic engineering extension rsvp rsvp-te becoming widely accepted nowadays many qos-oriented networks next steps signaling nsis proposed replacement rsvp basic concepts rsvp originally proposed rsvp93 zhang l. deering s. estrin d. shenker s. d. zappala rsvp new resource reservation protocol ieee network september 1993 rsvp described series rfc documents ietf two key concepts rsvp reservation model flowspec filterspec rsvp reserves resources flow flow identified destination address protocol identifier optionally destination port multiprotocol label switching mpls flow defined label switched path lsp flow rsvp also identifies particular quality service required flow although understand specific information flow qos qos specific information called flowspec rsvp passes flowspec application hosts routers along path systems analyse flowspec accept reserve resources flowspec consists filterspec defines set packets shall affected flowspec i.e data packets receive qos defined flowspec filterspec typically selects subset packets processed node selection depend attribute packet e.g sender ip address port currently defined rsvp reservation styles rsvp reservation request consists flowspec filterspec pair called flowdescriptor effects node spec flowspec sets parameters packet scheduler node filterspec sets parameters packet classifier two primary types messages data objects rsvp messages transmitted order complete list rsvp messages date objects see rfc 2205 rsvp host needs send data flow specific qos transmit rsvp path message every 30 seconds travel along unicast multicast routes pre-established working routing protocol path message arrives router understand rsvp router forwards message without interpreting contents message reserve resources flow want listen send corresponding resv short reserve message traces path backwards sender resv message contains flow specs router receives rsvp resv message resv message also filterspec object defines packets receive requested qos defined flowspec simple filter spec could sender ’ ip address optionally udp tcp port
[ 7148, 709, 4676, 4677, 7170, 4683, 6432, 1462, 5039, 6446, 2219, 3640, 4709, 3312, 7214, 7217, 2612, 3337, 1900, 456, 6879, 2281, 6521, 106, 2644, 6531, 2650, 121, 7637, 4414, 6908, 3379, 5492, 3383, 494, 5850, 7297, 5169, 2335, 1984, 5...
Test
7,092
2
Up2date:up2date up2date also known red hat update agent tool used older versions red hat enterprise linux centos fedora core downloads installs new software upgrades operating system functions front-end rpm package manager adds advanced features automatic dependency resolution file /etc/sysconfig/rhn/sources specifies up2date search packages default red hat enterprise linux up2date retrieves packages red hat network rhn server though users add directories full packages even debian yum repositories wish up2date fedora core defaults retrieving packages yum repositories sources added apart rhn red hat enterprise linux specific fedora core 5 red hat enterprise linux 5 up2date longer shipped distribution yum used instead centos up2date downloads packages yum repositories centos mirror network
[ 8055, 1621, 2091, 5200, 5017, 5545, 6609, 1723, 1260, 5726, 7619, 4675, 5912, 2104, 3366, 5480, 4778, 5571, 578, 2034, 4603, 4059, 2581, 7555, 6743, 3559, 2771, 326, 2594, 3042, 4441, 1406, 3998, 5956, 6663, 1684, 3489, 952, 523, 4991, ...
Validation
7,093
4
Reverse_engineering:reverse engineering reverse engineering also called back engineering process man-made object deconstructed reveal designs architecture extract knowledge object similar scientific research difference scientific research natural phenomenon reverse engineering applicable fields mechanical engineering electronic engineering software engineering chemical engineering systems biology many reasons performing reverse engineering various fields reverse engineering origins analysis hardware commercial military advantage however reverse engineering process concerned creating copy changing artifact way analysis order deduce design features products little additional knowledge procedures involved original production cases goal reverse engineering process simply redocumentation legacy systems even product reverse engineered competitor goal may copy perform competitor analysis reverse engineering may also used create interoperable products despite narrowly tailored united states european union legislation legality using specific reverse engineering techniques purpose hotly contested courts worldwide two decades software reverse engineering help improve understanding underlying source code maintenance improvement software relevant information extracted order make decision software development graphical representations code provide alternate views regarding source code help detect fix software bug vulnerability frequently software develops design information improvements often lost time lost information usually recovered reverse engineering process also help cut time required understand source code reducing overall cost software development reverse engineering also help detect eliminate malicious code written software better code detectors reversing source code used find alternate uses source code detect unauthorized replication source code n't intended used reveal competitors product built process commonly used cracking software media remove copy protection create possibly improved copy even knockoff usually goal competitor hacker malware developers often use reverse engineering techniques find vulnerabilities operating system os order build computer virus exploit system vulnerabilities reverse engineering also used cryptanalysis order find vulnerabilities substitution cipher symmetric-key algorithm public-key cryptography addition purposes uses reverse engineering computer-aided design cad become popular reverse engineering become viable method create 3d virtual model existing physical part use 3d cad cam cae software reverse-engineering process involves measuring object reconstructing 3d model physical object measured using 3d scanning technologies like cmms laser scanners structured light digitizers industrial ct scanning computed tomography measured data alone usually represented point cloud lacks topological information design intent former may recovered converting point cloud triangular-faced mesh reverse engineering aims go beyond producing mesh recover design intent terms simple analytical surfaces appropriate planes cylinders etc well possibly nurbs surfaces produce boundary-representation cad model recovery model allows design modified meet new requirements manufacturing plan generated etc hybrid modelling commonly used term nurbs parametric modelling implemented together using combination geometric freeform surfaces provide powerful method 3d modelling areas freeform data combined exact geometric surfaces create hybrid model typical example would reverse engineering cylinder head includes freeform cast features water jackets high tolerance machined areas reverse engineering also used businesses bring existing physical geometry digital product development environments make digital 3d record products assess competitors products used analyse instance product works components consists estimate costs identify potential patent infringement etc value engineering related activity also used businesses involves de-constructing analysing products objective find opportunities cost cutting 1990 institute electrical electronics engineers ieee defined reverse engineering process analyzing subject system identify system components interrelationships create representations system another form higher level abstraction subject system end product software development reverse engineering process examination software system consideration modified would make re-engineering restructuring reverse engineering performed stage product cycle necessarily functional end product two components reverse engineering redocumentation design recovery redocumentation creation new representation computer code easier understand meanwhile design recovery use deduction reasoning general knowledge personal experience product order fully understand product functionality also seen going backwards development cycle model output implementation phase source code form reverse-engineered back analysis phase inversion traditional waterfall model another term technique program comprehension working conference reverse engineering wcre held yearly explore expand techniques reverse engineering computer-aided software engineering case automated code generation contributed greatly field reverse engineering software anti-tamper technology like obfuscation used deter reverse engineering re-engineering proprietary software software-powered systems practice two main types reverse engineering emerge first case source code already available software higher-level aspects program perhaps poorly documented documented longer valid discovered second case source code available software efforts towards discovering one possible source code software regarded reverse engineering second usage term one people familiar reverse engineering software make use clean room design technique avoid copyright infringement related note black box testing software engineering lot common reverse engineering tester usually api goals find bugs undocumented features bashing product outside purposes reverse engineering include security auditing removal copy protection cracking circumvention access restrictions often present consumer electronics customization embedded systems engine management systems in-house repairs retrofits enabling additional features low-cost crippled hardware graphics card chip-sets even mere satisfaction curiosity binary reverse engineering performed source code software unavailable process sometimes termed reverse code engineering rce example decompilation binaries java platform accomplished using jad one famous case reverse engineering first non-ibm implementation pc bios launched historic ibm pc compatible industry overwhelmingly dominant computer hardware platform many years reverse engineering software protected u.s. fair use exception copyright law samba software allows systems running microsoft windows systems share files systems classic example software reverse engineering since samba project reverse-engineer unpublished information windows file sharing worked non-windows computers could emulate wine project thing windows api openoffice.org one party microsoft office file formats reactos project even ambitious goals strives provide binary abi api compatibility current windows oses nt branch allowing software drivers written windows run clean-room reverse-engineered free software gpl counterpart windowsscope allows reverse-engineering full contents windows system live memory including binary-level graphical reverse engineering running processes another classic well-known example 1987 bell laboratories reverse-engineered mac os system 4.1 originally running apple macintosh se could run risc machines reverse engineering software accomplished various methods three main groups software reverse engineering software classification process identifying similarities different software binaries example two different versions binary used detect code relations software samples task traditionally done manually several reasons patch analysis vulnerability detection copyright infringement nowadays done somewhat automatically large numbers samples method used mostly long thorough reverse engineering tasks complete analysis complex algorithm big piece software general statistical classification considered hard problem also true software classification therefore n't many solutions/tools handle task well number uml tools refer process importing analysing source code generate uml diagrams reverse engineering see list uml tools although uml one approach providing reverse engineering recent advances international standards activities resulted development knowledge discovery metamodel kdm standard delivers ontology intermediate abstracted representation programming language constructs interrelationships object management group standard way becoming iso standard well kdm started take hold industry development tools analysis environments deliver extraction analysis source binary byte code source code analysis kdm granular standards architecture enables extraction software system flows data control call maps architectures business layer knowledge rules terms process standard enables use common data format xmi enabling correlation various layers system knowledge either detailed analysis e.g root cause impact derived analysis e.g business process extraction although efforts represent language constructs never-ending given number languages continuous evolution software languages development new languages standard allow use extensions support broad language set well evolution kdm compatible uml bpmn rdf standards enabling migration environments thus leverage system knowledge efforts software system transformation enterprise business layer analysis protocols sets rules describe message formats messages exchanged i.e. protocol state-machine accordingly problem protocol reverse-engineering partitioned two subproblems message format state-machine reverse-engineering message formats traditionally reverse-engineered tedious manual process involved analysis protocol implementations process messages recent research proposed number automatic solutions typically automatic approaches either group observed messages clusters using various clustering analyses emulate protocol implementation tracing message processing less work reverse-engineering state-machines protocols general protocol state-machines learned either process offline learning passively observes communication attempts build general state-machine accepting observed sequences messages online learning allows interactive generation probing sequences messages listening responses probing sequences general offline learning small state-machines known np-complete online learning done polynomial time automatic offline approach demonstrated comparetti et al online approach cho et al components typical protocols like encryption hash functions reverse-engineered automatically well typically automatic approaches trace execution protocol implementations try detect buffers memory holding unencrypted packets reverse engineering invasive destructive form analyzing smart card attacker grinds away layer layer smart card takes pictures electron microscope technique possible reveal complete hardware software part smart card major problem attacker bring everything right order find everything works makers card try hide keys operations mixing memory positions example bus scrambling cases even possible attach probe measure voltages smart card still operational makers card employ sensors detect prevent attack attack common requires large investment effort special equipment generally available large chip manufacturers furthermore payoff attack low since security techniques often employed shadow accounts uncertain time whether attacks chip/pin cards replicate encryption data consequentially crack pins would provide cost effective attack multifactor authentication reverse engineering often used people order copy nations technologies devices information obtained regular troops fields intelligence operations often used second world war cold war well-known examples wwii later include reverse engineering applies primarily gaining understanding process artifact manner construction use internal processes made clear creator patented items reverse-engineered studied since essence patent inventor provides detailed public disclosure return receives legal protection invention involved however item produced one patents could also include technology patented disclosed indeed one common motivation reverse engineering determine whether competitor product contains patent infringements copyright infringements united states even artifact process protected trade secrets reverse-engineering artifact process often lawful long legitimately obtained reverse engineering computer software us often falls contract law breach contract well relevant laws end user license agreements specifically prohibit u.s. courts ruled terms present override copyright law expressly permits see bowers v. baystate technologies sec 103 f dmca 17 u.s.c § 1201 f says person legal possession program permitted reverse-engineer circumvent protection necessary order achieve interoperability — term broadly covering devices programs able interact make use use transfer data useful ways limited exemption exists allows knowledge thus gained shared used interoperability purposes eu directive 2009/24 legal protection computer programs superseded earlier 1991 directive governs reverse engineering european union
[ 6793, 5380, 2566, 33, 7912, 5401, 7189, 1128, 429, 74, 5784, 1899, 4017, 6159, 2984, 3348, 4759, 1168, 6181, 1197, 6558, 7669, 6574, 7696, 5571, 6629, 1284, 1652, 1660, 7748, 595, 8117, 1306, 3137, 3486, 6303, 2087, 2451, 5274, 1353, 35...
Validation
7,094
8
NetPresenz:netpresenz netpresenz written peter n. lewis stairways software pty ltd world wide web ftp server developed use classic mac os update older product called simply ftpd time significant ftp daemon available macintosh platform added web gopher functionality originally shareware package netpresenz rendered obsolete increasing functionality mac os made freeware work macos
[ 4655, 5542, 6802, 7628, 2205, 7537, 3548, 405, 7015, 7016, 3043, 84, 348, 1057, 2261, 2804, 5887, 445 ]
Test
7,095
5
Simple_Loop_Prevention_Protocol:simple loop prevention protocol simple loop prevention protocol slpp computer networking data link layer protocol developed nortel previously acquired avaya part extreme networks protect layer 2 network loops slpp uses small hello packet detect network loops slpp protocol checks packets originating switch peer switch smlt configuration sending hello packets per vlan basis allows slpp detect vlan based network loops un-tagged well tagged ieee 802.1q vlan link configurations loop detected associated port shut =external links=
[ 6691, 883, 6927, 899, 2534, 7095 ]
Test
7,096
4
Dynamic_linker:dynamic linker computing dynamic linker part operating system loads links shared libraries needed executable executed run time copying content libraries persistent storage ram filling jump tables relocating pointers specific operating system executable format determine dynamic linker functions implemented linking often referred process performed executable compiled dynamic linker special part operating system loads external shared libraries running process binds shared libraries dynamically running process approach also called dynamic linking late linking dynamic-link library dll microsoft implementation shared library concept microsoft windows os/2 operating systems libraries usually file extension codice_1 codice_2 libraries containing activex controls codice_3 legacy system drivers file formats dlls windows exe files portable executable pe 32-bit 64-bit windows new executable ne 16-bit windows exes dlls contain code data resources combination data files file format dll different file extensions possibly containing resource sections called resource dlls examples dlls include icon libraries sometimes extension codice_4 font files extensions codice_5 codice_6 unix-like systems machine code makes dynamic linker actually external executable operating system kernel loads executes first process address space newly constructed result calling codice_7 codice_8 functions link time path dynamic linker used embedded executable image executable file loaded operating system kernel reads path dynamic linker attempts load execute executable binary attempt fails example file path attempt execute original executable fails dynamic linker loads initial executable image dynamically-linked libraries depends starts executable result pathname dynamic linker part operating system application binary interface unix-like systems use elf executable images dynamic libraries solaris 64-bit versions hp-ux linux freebsd netbsd openbsd dragonfly bsd path dynamic linker used embedded link time codice_9 section executable codice_10 segment systems dynamically loaded shared libraries identified filename suffix codice_11 shared object dynamic linker influenced modifying behavior either program execution program linking examples seen run-time linker manual pages various unix-like systems typical modification behavior use codice_12 codice_13 environment variables adjust runtime linking process searching shared libraries alternate locations forcibly loading linking libraries would otherwise respectively example zlibc also known codice_14 facilitates transparent decompression used codice_13 hack result possible read pre-compressed gzipped file data bsd linux systems files compressed essentially allowing user add transparent compression underlying filesystem although caveats mechanism flexible allowing trivial adaptation code perform additional alternate processing data file read prior provision said data user process requested apple darwin operating system macos ios operating systems built top path dynamic linker used embedded link time one mach-o load commands executable image systems dynamically loaded shared libraries identified either filename suffix codice_16 placement inside bundle framework dynamic linker links target executable shared libraries also places machine code functions specific address points memory target executable knows link time executable wishes interact dynamic linker simply executes machine-specific call jump instruction one well-known address points executables macos ios platforms often interact dynamic linker execution process even known executable might interact dynamic linker causing load libraries resolve symbols hours initially launches reason macos ios program interacts dynamic linker often due apple cocoa cocoa touch apis objective-c language implemented see main articles information dynamic linker coerced modifying behavior however unlike unix-like operating systems modifications hints sometimes ignored dynamic linker examples seen codice_17 manual page typical modification behavior use codice_18 codice_19 environment variables former previously-mentioned variables adjusts executables search path shared libraries latter displays names libraries loaded linked apple macos dynamic linker open-source project released part darwin found apple open-source codice_17 project unix-like operating systems using xcoff aix dynamically-loaded shared libraries use filename suffix codice_21 dynamic linker influenced modifying behavior either program execution program linking typical modification behavior use codice_22 environment variable variable adjusts runtime linking process searching shared libraries alternate locations forcibly loading linking libraries would otherwise respectively dynamic linking assembler language programs ibm os/360 successors done typically using link macro instruction containing supervisor call instruction activates operating system routines makes library module linked available program library modules may reside steplib joblib specified control cards available specific execution program library included linklist parmlib specified system startup time link pack area specific reentrant modules loaded system startup time multics operating system files including executables segments call routine part current segment cause system find referenced segment memory disk add address space running process dynamic linking normal method operation static linking using binder exception
[ 1710, 1339, 3509, 4662, 6249, 4759, 7517, 900, 6982, 4942, 4136, 5480, 3863, 6991, 5571, 578, 1198, 6823, 3557, 757, 2418, 1495, 7936, 6050, 607, 5606, 1236, 1895, 5786, 7775, 1512, 1989, 5190 ]
Train
7,097
9
XLNT:xlnt xlnt scripting language windows platforms based dcl language vax-vms machines proprietary implementation maintained originator advanced systems concepts inc. since 1997 implementation contains xlnt executable windows scripting host engine integrated development environment also used cgi mode one handful windows-vms emulation interoperability tools others pc-dcl accelr8 dcl lite console mode interpreters run automated scripting mode older programme type vcl used vms functionality ms-dos pc dos os/2 unix variants vcl run later windows versions provide 16-bit dos programmes run e.g windows nt via win16/dos environmental subsystem program compatibility option windows xp et seq
[ 4759, 6380, 5571, 6256, 7246 ]
Test
7,098
9
Andy_Wellings:andy wellings andy j. wellings professor computer science department university york northern england works closely alan burns real-time systems distributed concurrent real-time programming languages andy wellings member team responsible creation real-time specification java also ada programming language expert wellings written number books programming especially ada
[ 304 ]
Test
7,099
3
POWER10:power10 power10 family multi-core processors based power isa primarily designed ibm substantial contributions openpower foundation partners designed tackle future demands analytics big data domains power10 processors manufactured using 7 nm process feature enhancements compared predecessor power9 regarding core count microarchitecture design memory controllers i/o support opencapi 4.0 nvlink3 systems using power10 expected available 2020
[ 7327, 2719, 3348, 4661, 3936, 1075, 1346, 2458, 3440, 1083, 4408, 5652, 912, 7361, 2845, 3708, 7453, 5665, 4702, 1199, 1386, 1388, 234, 2501, 239, 6474, 8125, 4815, 1131, 608, 2257, 3674, 5622 ]
Test
7,100
9
Actor-Lab:actor-lab actor-lab program visualizes lego mindstorms internal logic visual flowcharts ideas underlying actor-lab derived event-driven message-passing computer languages began actor based languages devised hewit actor-lab requires constant communication programmable brick e.g rcx via infra-red link means user mount programmable brick vertically models move hold tower form gantry crane actor-lab shows user real-time happening programmable brick including simulation motors sensors lights sounds one also add controls bottom screen give oneself real-time control program/model similar program lego called robolab one actually download programs lego programmable brick notice one control edited control power stop
[]
Test
7,101
8
Rambler_(portal):rambler portal rambler russian search engine one biggest russian web portals owned rambler media group prof-media since 2006 launched 1996 stack ltd including sergey lysakov dmitry kryukov vladimir samoylov others rambler online since 1996 2005 rambler media group went public bought prof-media 2006 july 18 2008 announced google acquire begun part rambler media one biggest russian contextual advertising services 140 million deal blocked russian federal antimonopoly service main competitors rambler russian market yandex mail.ru july 2013 rambler ranked 11th popularity among russian sites september 2016 reported site breached february 2012 leakedsource received dump user database time included usernames passwords icq instant messaging accounts 98 million users revealed rambler.ru database stored user passwords plaintext — meaning whoever breached database instantly access e-mail accounts users services offered rambler include web search e-mail news aggregation e-commerce services russian-speaking community globally complemented number rambler media group owned web properties including
[ 7927, 2291 ]
Validation
7,102
7
Amazon_Drive:amazon drive amazon drive formerly known amazon cloud drive cloud storage application managed amazon service offers secure cloud storage file backup file sharing photo printing using amazon account files folders transferred managed multiple devices including web browsers desktop applications mobiles tablets amazon drive also lets u.s. users order photo prints photo books using amazon prints service today amazon drive offers free unlimited photo storage amazon prime subscription kindle fire device paid limited storage service launched major countries including u.s canada european nations japan australia also functions china brazil free limited 5gb storage service amazon first announced storage service march 29 2011 initially offering pay-as-you-need tiered storage plans users users paid storage tier utilized expandable maximum 1 terabyte plan march 2015 unlimited storage plans intended non-business customer sections introduced plan offered free 3-month free trial customers wish try service entering annual subscription 2015 black friday plan became popular amazon offered 92 discounted unlimited storage plan 5 60 year purchase fine print stated unlimited storage private use restricted file type must substantially exceed differ normal use users amazon anytime may impose restrictions use service june 2017 amazon reverted unlimited storage plans us 15 november 2017 amazon removed unlimited storage plans canadian customers well july 2019 amazon offers two plans marketplaces prime photos since november 2014 free limited file storage china brazil prime photos plan offers unlimited storage photos raw files 5 gigabytes storage videos files photos uploaded amazon drive ios android apps kindle device cloud drive website additionally users kindle fire tablets also get plan benefits along purchase device photos videos automatically backup device amazon drive cloud storage according amazon prime photos available personal non-commercial use ca n't used conjunction photography business full resolution photo formats raw files uploaded raw formats wo n't viewable within service web interface apps china brazil amazon drive service limited 5gb storage storage counts space taken photos videos files types customers countries amazon drive n't offer expansion plan neither tier-based unlimited store media files exceeding limited 5gb service supported almost types devices ranging pcs mobiles web application supported common web browsers including internet explorer firefox safari google chrome one create folders organize files rename files move around forth application handle photos better files web app photos videos viewed played whereas files viewable default images sorted date taken photos include basic metadata filename capture date added date filesize pixel dimension amazon drive released desktop application supported mac windows designed drop panel allowing users drag drop files initiate uploading users install application pc mac use application supports one-touch button downloading files cloud restored notably files 2gb uploaded amazon drive desktop clients bulk upload files folders paused cancelled progress amazon drive offers free smartphone application ios android mobile devices mobile application everything web addition automatically backs upload media files mobile device cloud amazon proprietary devices kindle fire fire phone ship free unlimited photo storage similarly backs photos files tablet amazon drive files folders selected downloaded device generate randomized shareable link link directed e-mailed shared social media anyone link access shared files point time future application allow owner break shared link make files private september 2016 amazon drive launched amazon prints u.s. users edit photos order prints photo books application ordered amazon ship print orders customer address similar retail orders service available major amazon marketplaces applications supported multiple languages usage different countries popular languages supported regional variations english spanish french italian simplified chinese japanese amazon drive also built amazon fire tv amazon video application media players smart tvs devices users browse personal photos videos large tv screens view slideshow prime photo users upload unlimited number picture file formats rest formats including video formats counted additional 5gb storage plan additional files exceeding 5gb need stored one opt unlimited storage plan one paid plans depending country unlimited plans files 2gb restricted uploading application desktop application however exempted uploading files greater 2gb size amazon drive streaming available videos longer 20 minutes larger 2 gb stored amazon drive download watch offline unlike popular file hosting services amazon drive offer file-syncing automatic backup web users latest desktop version documents images also shared documents collaborated others downloaded editing however mobile applications support automatic backup capabilities service limits usage personal non-commercial use one may use store transfer distribute content behalf third parties operate file storage application service operate photography business commercial service
[ 5894, 3430, 1911, 4217, 3943, 3953, 7722, 8083, 1550, 7083, 7838, 7013, 4163, 5064, 854, 6219, 1589, 518, 3328, 168, 5706 ]
Test
7,103
9
WebDNA:webdna webdna server-side scripting interpreted language embedded database system specifically designed world wide web primary use creating database-driven dynamic web page applications released 1995 name registered trademark 1998 webdna currently maintained webdna software corporation webdna contains ram-resident database system hybrid in-memory database searching editing capabilities resilient persistent backup ram databases maintained disk webdna code interweave css html/html5 js/ajax allowing mix layout programming server-side client-side scripting instructions allow interact remote servers usually considered easy-to-learn scripting language designed webmasters webdesigners programmers looking quick results webdna made syntax uses square brackets english language example display today date web page simply insert nowiki date /nowiki within html css code want live date appear likewise nowiki time /nowiki show text specific client ip address request 'showif context used showif ipaddress =xxx.xxx.xxx.xxx text /showif webdna tags contexts commands follow similar conventions webdna syntax based simple format webdna instructions based two types parameters included many tags contexts commands example code connects whois server shows information stores permanent database according grant hulbert one pacific coast software founders webcatalog webdna began set c macros help accomplish website graphical tasks webdna evolved general-purpose server-side language special-purpose server-side language designed help create web pages sold stock photography shopping cart features searchable fixed-field database specialized fields storing stock photo information pacific coast software quickly saw value creating web programming language webcatalog began mid-1990s public debut macintosh platform name implies early development focus allowed web master store administrator migrate traditional product catalog online catalog evident 1997 1998 storebuilder webmerchant products allowed user quickly build store front online term webcatalog referred entire product term webdna referred scripting syntax around year 2000 webcatalog pacific coast software purchased smith micro software inc. smith micro software inc. changed name webcatalog webdna point became name referenced aspects product starting release webdna version 4.0 ending version 6.0a years 1999 2004 active years webdna scripting language adopted many national international names including disney chrysler kodak ben jerry pillsbury dough boy shop ncaa final four museum television radio also time development language gained contemporary tools nowiki function /nowiki nowiki scope /nowiki lend modular programming structured programming 2005 2008 perhaps various reasons including success smith micro software products webdna users began lose support smith micro webdna lost users free solutions like php mysql ultimately developers webdna revived language june 2008 formed together organized establish webdna software corporation wsc wsc purchased intellectual property webdna 2009 wsc released new webdna version 6.2 cicada december 2011 fastcgi version webdna engine released version along offering compatibility non-apache installations changes scope webdna server-wide application domain name-specific application means website owner easily install webdna specifically one domain without affecting domains may reside server
[ 6029, 3172, 3772 ]
Test
7,104
3
Krakout:krakout krakout breakout clone released zx spectrum amstrad cpc bbc micro commodore 64 thomson computers msx platforms 1987 one wave enhanced breakout variants emerge wake arkanoid key distinctions gameplay horizontal layout allows player select acceleration characteristics bat playing written andy green rob toone published gremlin graphics music composed ben daglish 1990 dragon gave game 4 5 stars calling one favorites breakout different flavor
[ 3313 ]
Test
7,105
4
ADF_Solutions:adf solutions advanced digital forensic solutions inc. adf solutions company based bethesda maryland develops tools scanning suspect computers digital devices order locate extract data process known digital forensics digital forensic tools scan mobile phones computers digital devices collect intelligence evidence crime identify computers contain content relevant investigation tools used digital forensic labs field operatives defense intelligence law enforcement border security government agencies adf produces four forensic triage tools mobile device investigator digital evidence investigator triage-g2 triage-investigator tool targets different kinds users specific scenarios triage-g2 media exploitation medex tool used computers peripheral devices typically deployed usb device military personnel working field usb devices known triage keys prepared advance field selecting specific search criteria users tool require significant technical computer skills triage-g2 currently use several u.s. defense intelligence agencies mobile device investigator provides field investigators rapid evidence collection analysis reporting ios android devices smartphones tablets recover call records messages saved contacts calendar data browsing history download history search terms wifi connections installed applications pictures videos audio files documents police investigators review analyze results immediately make on-scene decisions digital evidence investigator forensic triage tool used computers forensic examiners lab environments location scan suspect devices prioritize full examinations digital evidence investigator use law enforcement agencies worldwide triage-investigator used law enforcement investigators field scan suspect computers evidence crime like triage-g2 users minimal technical experience tool also comes usb key used create field reports developed partnership u.s. department homeland security science technology directorate software used technology employs sets search criteria known captures software allows analysts operators describe specific search exploitation want conduct also used automate recurring categories investigations shared among agencies need according technopedia.com document media exploitation defined extraction translation analysis physical digital documents media generate useful timely information also known domex similar discipline computer forensics digital forensics media exploitation
[ 5561, 3823, 3700, 1715, 5254, 6488, 4523, 7825, 6020, 1756 ]
Validation
7,106
4
Computer_emergency_response_team:computer emergency response team computer emergency response team cert expert group handles computer security incidents alternative names groups include computer emergency readiness team computer security incident response team csirt name computer emergency response team first used 1988 cert coordination center cert-cc carnegie mellon university cmu abbreviation cert historic name picked teams around world teams took specific name csirt point task handling computer security incidents instead tech support work cmu threatening take legal action individuals organisations referred team cert-cc cert turn century cmu relaxed position terms cert csirt used interchangeably history certs linked existence malware especially computer worms viruses whenever new technology arrives misuse long following first worm ibm vnet covered shortly worm hit internet 3 november 1988 so-called morris worm paralysed good percentage led formation first computer emergency response team carnegie mellon university u.s. government contract massive growth use information communications technologies subsequent years now-generic term 'cert'/'csirt refers essential part large organisations structures many organisations cert evolves information security operations center first forum incident response security teams global association csirts
[ 3932, 4932, 2560, 1461, 5125, 5568, 1945, 5397, 5401, 1708, 4522, 7111, 3135, 5251, 429, 69, 7125, 2891, 3754, 1805 ]
Validation
7,107
9
Ypsilon_(Scheme_implementation):ypsilon scheme implementation ypsilon scheme free software implementation r6rs standard scheme implements mostly concurrent garbage collection optimized multi-core cpu systems author yoshikatsu fujita developed ypsilon implementation satisfy need real-time scheme implementation suitable computer game development without giving garbage collected dynamic interpreter
[ 1361, 7032, 3915, 5571 ]
Test
7,108
2
Mandriva:mandriva mandriva s.a. public software company specializing linux open-source software corporate headquarters paris development centers metz france curitiba brazil mandriva s.a. developer maintainer linux distribution called mandriva linux well various enterprise software products mandriva founding member desktop linux consortium mandriva s.a. began mandrakesoft 1998 february 2004 following lengthy litigation hearst corporation name mandrake hearst corporation owned comic strip called mandrake magician mandrakesoft required change name following acquisition brazilian linux distribution conectiva february 2005 company name changed 7 april 2005 mandriva reflect names mandrakesoft conectiva october 4 2004 mandrakesoft acquired professional support company edge focused corporate market france 6 employees june 15 2005 mandriva acquired lycoris formerly redmond linux corporation october 5 2006 mandriva signed agreement acquire linbox linux enterprise software infrastructure company agreement included acquisition shares linbox total 1.739 million mandriva stock plus earn 401,000 based 2006 linbox financials 2007 mandriva reached deal government nigeria put operating system 17,000 school computers january 16 2008 mandriva turbolinux announced partnership create lab named manbo-labs share resources technology release common base system companies linux distributions although mandriva operating system eventually became significant entity data center company operating margins thin 2012 company brink bankruptcy january 30 2012 mandriva announced external entity bid rejected minority share holder deal go end first semester 2012 solution situation appeared january year found settlement achieved mandriva subsequently owned several different shareholders mandriva filed administrative receivership early 2015 liquidated may 22 2015 mandriva linux distribution continues survive openmandriva lx notable forks include mageia linux rosa linux addition selling linux distributions online store authorized resellers mandriva previously sold subscriptions mandriva club several levels membership costs ranging us 66 €60 per year 2007 €600 per year club members gained access club website additional mirrors torrents downloading free downloads boxed products depending membership level interim releases mandriva linux distribution additional software updates example gold-level higher members could download powerpack+ editions many mandriva commercial products came short-term membership club however mandriva linux completely usable without club membership mandriva linux 2008.0 released october 2007 mandriva made club membership free charge comers splitting download subscriptions separate service mandriva also mandriva corporate club larger organizations
[ 5271, 2985, 710, 4675, 7528, 4401, 6988, 6725, 1007, 578, 7193, 2240, 4562, 1806 ]
Test
7,109
1
Oracle_TopLink:oracle toplink oracle toplink mapping persistence framework java developers toplink produced oracle part oracle oracleas weblogic oc4j servers object-persistence object-transformation framework toplink provides development tools run-time functionalities ease development process help increase functionality persistent object-oriented data stored relational databases helps build high-performance applications storing data either xml extensible markup language relational databases made possible transforming object-oriented data rich user-interface possible toplink help toplink mapping workbench mapping workbench makes possible carry following ease oracle jdeveloper ide provides easy integration functionalities provided mapping workbench use toplink users stay focused primary cause let toplink handle integration persistence object transformation application designing implementing deploying process accelerated toplink supports variety data sources formats relational database object-relational database enterprise information system eis xml many others toplink originally developed object people smalltalk ported java 1996-1998 called toplink java 2002 toplink acquired oracle corporation developed oracle fusion middleware product toplink code donated eclipse foundation eclipselink project born 2007 eclipselink provides functionality toplink sun microsystems selected eclipselink march 2008 implementation jpa 2.0 jsr 317 reference number versions toplink released since latest version 12c 12.1.3 available free download runtime component toplink provided eclipselink core api provides direct access runtime embedded application persistence behavior enabled making application calls invoke eclipselink api perform functionalities provides safe access shared databases import following class use extended functionality eclipselink binding java classes xml schemas possible help object-xml eclipselink component implementing jaxb mapping information provided annotations also provides manipulation xml service data objects sdo provides use sdo api use dynamic objects customize manipulate xml use static data objects conversion xml schema database web services dbws facilitates access relational databases help web service database access made without need write java code xml soap messages databases connected runtime component dbws uses eclipselink toplink grid integration mechanism provides connection oracle coherence eclipselink application generally interacts relational database primary database toplink application store data coherence grid called jpa grid toplink grid functionality used user license oracle coherence functionality provided get support toplink grid eclipselink users also need import following package classes database operations like insert update delete also performed toplink changes made database reflected oracle coherence cache java persistence api entity persistence class using toplink number performance features writing large amounts data implemented batch writing stored procedure support parameter binding statement ordering features offered satisfy database constraints basic operations entitymanager method persist object entity used add instance marks insertion database completion transaction codice_1 data inserted database updating entity means simply reading transaction updating properties entity updating employee lastname done follows deleting entity opposite insertion one using codice_2 method entitymanager.the entitymanager method codice_3 deletes entity completion transaction users use tools market use toplink along following toots provide special integration toplink
[ 3077, 3255, 631, 7715, 7347, 1096, 6538, 5571, 5228, 7459, 3879, 6462, 3479, 3813, 5252, 2519, 2520, 3915, 2797, 6319, 7315, 2619, 784, 6594, 2623, 4287 ]
Train
7,110
4
List_of_data-erasing_software:list data-erasing software list utilities performing data erasure
[ 2857, 1020, 2813, 6272, 7075, 5150, 8191, 4957, 6327, 7046, 578, 4536 ]
Test
7,111
4
Information_security_operations_center:information security operations center information security operations center isoc soc facility enterprise information systems web sites applications databases data centers servers networks desktops endpoints monitored assessed defended soc related people processes technologies provide situational awareness detection containment remediation threats soc handle behalf institution company threatening incident ensure properly identified analyzed communicated investigated reported soc also monitors applications identify possible cyber-attack intrusion event determines genuine malicious threat incident could affect business establishing operating soc expensive difficult organisations need good reason may include security operations center soc also called security defense center sdc security analytics center sac network security operations center nsoc security intelligence center cyber security center threat defense center security intelligence operations center sioc canadian federal government term infrastructure protection center ipc used describe soc socs typically based around security information event management siem system aggregates correlates data security feeds network discovery vulnerability assessment systems governance risk compliance grc systems web site assessment monitoring systems application database scanners penetration testing tools intrusion detection systems ids intrusion prevention system ips log management systems network behavior analysis cyber threat intelligence wireless intrusion prevention system firewalls enterprise antivirus unified threat management utm siem technology creates single pane glass security analysts monitor enterprise soc staff includes analysts security engineers soc managers seasoned networking professionals usually trained computer engineering cryptography network engineering computer science may credentials cissp giac soc staffing plans range eight hours day five days week 8x5 twenty four hours day seven days week 24x7 shifts include least two analysts responsibilities clearly defined large organizations governments may operate one soc manage different groups information communication technology provide redundancy event one site unavailable soc work outsourced instance using managed security service term soc traditionally used governments managed computer security providers although growing number large corporations organizations also centers soc network operations center noc complement work tandem noc usually responsible monitoring maintaining overall network infrastructure primary function ensure uninterrupted network service soc responsible protecting networks well web sites applications databases servers data centers technologies likewise soc physical security operations center coordinate work together physical soc facility large organizations security staff monitor control security officers/guards alarms cctv physical access lighting vehicle barriers etc every soc role three different focus areas soc may active combined combination cases soc noc physical soc may housed facility organizationally combined especially focus operational tasks soc originates cert organisation focus usually monitoring control case soc operates independently noc maintain separation duties typically larger organizations maintain separate soc ensure focus expertise soc collaborates closely network operations physical security operations socs usually well protected physical electronic computer personnel security centers often laid desks facing video wall displays significant status events alarms ongoing incidents corner wall sometimes used showing news weather tv channel keep soc staff aware current events may affect information systems security engineer security analyst may several computer monitors desk processes procedures within soc clearly spell roles responsibilities well monitoring procedures processes include business technology operational analytical processes lay steps taken event alert breach including escalation procedures reporting procedures breach response procedures cloud security operations center cloudsoc may set monitor cloud service use within enterprise keep shadow problem control parse audit infrastructure application logs via siem technologies machine data platforms logrhythm splunk ibm qradar arctic wolf networks assuria hp arcsight cybershark elastica provide alerts details suspicious activity smart soc security operations center comprehensive technology agnostic cybersecurity solution utilizes leading-edge technology tools highly skilled experienced human talent composed cyber intelligence gatherers analysts security experts proactive cyberwarfare principles prevent neutralize threats organization ’ digital infrastructure assets data addition many commonly referenced terms related original isoc title including following
[ 7192, 7984, 1467, 1788, 3172, 5051, 7106, 3517, 8038, 6756, 8123, 1384, 1805 ]
Test
7,112
2
License_Program_Product:license program product license program product lpp aix terminology referring complete software product collection including one packages filesets
[ 5041, 3559, 3042 ]
Train
7,113
9
Io_(programming_language):io programming language io pure object-oriented programming language inspired smalltalk self lua lisp act1 newtonscript io prototype-based object model similar ones self newtonscript eliminating distinction instance class like smalltalk everything object uses dynamic typing like lisp programs data trees io uses actors concurrency remarkable features io minimal size openness using external code resources io executed small portable virtual machine language created steve dekorte 2002 trying help friend dru nelson language cel found really n't know much languages worked set write tiny language understand problems better io goal explore conceptual unification dynamic languages tradeoffs tend favor simplicity flexibility performance simplest form composed single identifier assuming dostuff method called zero arguments result explicit parentheses required dostuff arguments would look like io message passing language since everything io message excluding comments message sent receiver example demonstrates well fully describe point better let look next example example demonstrates message passing io version message sent system object operators special case syntax cut-and-dried examples io parser intercepts set operators defined interpreter translates method calls example following translates see also little bit operator precedence happening precedence levels c precedence levels operators also turned method calls fact operators io methods fact require explicit parentheses convenience io two ways creating anonymous functions methods blocks almost identical except scope blocks lexical scope methods dynamic scope method block higher-order functions ubiquitous hello world program new objects created cloning objects io specifically new empty object created differences parent stored within new object behavior known differential inheritance example behavior shown simple non-recursive factorial function io assignment codice_1 codice_2 last action taken function implicitly returns result explicit return expression needed demonstrates usage ranges n't use codice_3 loop would faster
[ 1616, 6507, 3684, 4573, 7333, 4302, 4039, 379, 3531, 3368, 1102, 7557, 7852, 2881, 4543, 5608, 5965, 8137, 5878, 1989, 7135, 1803 ]
Validation
7,114
7
Sun_Cloud:sun cloud sun cloud on-demand cloud computing service operated sun microsystems prior acquisition oracle corporation sun cloud compute utility provided access substantial computing resource internet us 1 per cpu-hour launched sun grid march 2006 based supported open source technologies solaris 10 sun grid engine java platform sun cloud delivered enterprise computing power resources internet enabling developers researchers scientists businesses optimize performance speed time results accelerate innovation without investment infrastructure early 2010 oracle announced discontinuing sun cloud project since sunday march 7 2010 network.com web site inaccessible typical application could run compute utility fit following parameters resources collections files contain user data executable jobs compute utility concept define elements unit work submitted sun cloud compute utility major elements job include name shell script controlling program execution required arguments shell script list resources must place job run run specific instantiation job description submitted sun cloud compute utility runs occur job submitted compute utility execution job one submits runs cloud sun cloud cpu usage aggregated rounded nearest whole hour example job used 1000 cpus one minute would aggregated 1000 cpu minutes 16.67 cpu hours software rounds 17 hours job would billed us 17 march 13 2007 sun announced launch application catalog online service allows developers isvs develop publish applications enabling communities scientists academics life sciences education engineering fields accelerate innovation complete research projects quickly less expensively network.com application catalog gives users immediate online access popular isv open-source applications easy-to-use web portal contractual obligation users upload run applications create personal library favorites take advantage pre-installed configured applications giving instant productivity portal gives everything need conduct analysis complete complex computational tasks help speed scientific discovery shorten time market new products simply select application upload data get results fast network.com enables anyone publish applications application catalog take advantage powerful solaris 10-based cloud platform users publish applications private library access whenever want also share applications others retaining data securely private space applications available catalog include category examples types suitable applications include
[ 7535, 6806, 3627, 2212, 5064, 418, 2961, 3673, 1514, 6505, 2988, 7613, 7246, 1923, 1185, 2299, 4418, 5135, 3028, 4067, 842, 4800, 2700, 5889, 1254, 1258, 1634, 3091, 6262, 6270, 908, 5927, 2033, 4159, 5587, 3820, 7037, 8138, 971, 7781, ...
Validation
7,115
1
Snapshot_isolation:snapshot isolation databases transaction processing transaction management snapshot isolation guarantee reads made transaction see consistent snapshot database practice reads last committed values existed time started transaction successfully commit updates made conflict concurrent updates made since snapshot snapshot isolation adopted several major database management systems interbase firebird oracle mysql postgresql sql anywhere mongodb microsoft sql server 2005 later main reason adoption allows better performance serializability yet still avoids concurrency anomalies serializability avoids always practice snapshot isolation implemented within multiversion concurrency control mvcc generational values data item versions maintained mvcc common way increase concurrency performance generating new version database object time object written allowing transactions read operations several last relevant versions object snapshot isolation used criticize ansi sql-92 standard definition isolation levels exhibits none anomalies sql standard prohibited yet serializable anomaly-free isolation level defined ansi spite distinction serializability snapshot isolation sometimes referred serializable oracle transaction executing snapshot isolation appears operate personal snapshot database taken start transaction transaction concludes successfully commit values updated transaction changed externally since snapshot taken write-write conflict cause transaction abort write skew anomaly two transactions t1 t2 concurrently read overlapping data set e.g values v1 v2 concurrently make disjoint updates e.g t1 updates v1 t2 updates v2 finally concurrently commit neither seen update performed system serializable anomaly would impossible either t1 t2 would occur first visible contrast snapshot isolation permits write skew anomalies concrete example imagine v1 v2 two balances held single person phil bank allow either v1 v2 run deficit provided total held never negative i.e v1 v2 ≥ 0 balances currently 100 phil initiates two transactions concurrently t1 withdrawing 200 v1 t2 withdrawing 200 v2 database guaranteed serializable transactions simplest way coding t1 deduct 200 v1 verify v1 v2 ≥ 0 still holds aborting t2 similarly deducts 200 v2 verifies v1 v2 ≥ 0 since transactions must serialize either t1 happens first leaving v1 100 v2 100 preventing t2 succeeding since v1 v2 200 200 t2 happens first similarly prevents t1 committing database snapshot isolation mvcc however t1 t2 operate private snapshots database deducts 200 account verifies new total zero using account value held snapshot taken since neither update conflicts commit successfully leaving v1 v2 100 v1 v2 200 systems built using multiversion concurrency control mvcc may support snapshot isolation allow transactions proceed without worrying concurrent operations importantly without needing re-verify read operations transaction finally commits convenient mvcc maintains series recent history consistent states information must stored transaction list updates made scanned conflicts fairly easily committed however mvcc systems marklogic use locks serialize writes together mvcc gain performance gains still support stronger serializability level isolation potential inconsistency problems arising write skew anomalies fixed adding otherwise unnecessary updates transactions order enforce serializability property example materialize conflict adding new table makes hidden constraint explicit mapping person total balance phil would start total balance 200 transaction would attempt subtract 200 creating write-write conflict would prevent two succeeding concurrently however approach violates normal form alternatively promote one transaction reads write instance t2 could set v1 v1 creating artificial write-write conflict t1 preventing two succeeding concurrently solution may always possible general therefore snapshot isolation puts problem maintaining non-trivial constraints onto user may appreciate either potential pitfalls possible solutions upside transfer better performance snapshot isolation called serializable mode oracle postgresql versions prior 9.1 may cause confusion real serializability mode arguments decision clear users must aware distinction avoid possible undesired anomalous behavior database system logic snapshot isolation arose work multiversion concurrency control databases multiple versions database maintained concurrently allow readers execute without colliding writers system allows natural definition implementation isolation level interbase later owned borland acknowledged provide si rather full serializability version 4 likely permitted write-skew anomalies since first release 1985 unfortunately ansi sql-92 standard written lock-based database mind hence rather vague applied mvcc systems berenson et al wrote paper 1995 critiquing sql standard cited snapshot isolation example isolation level exhibit standard anomalies described ansi sql-92 standard yet still anomalous behaviour compared serializable transactions 2008 cahill et al showed write-skew anomalies could prevented detecting aborting dangerous triplets concurrent transactions implementation serializability well-suited multiversion concurrency control databases adopted postgresql 9.1 referred serializable snapshot isolation abbreviated ssi used consistently eliminates need workarounds downside snapshot isolation increase aborted transactions perform better worse snapshot isolation workarounds depending workload 2011 jimenez-peris et al filed patent shown possible scale many millions update transactions per second new method attaining snapshot isolation distributed manner method based observation becomes possible commit transactions fully parallel without coordination therefore removing bottleneck traditional transactional processing methods method uses commit sequencer generates commit timestamps snapshot server advances current snapshot gaps filled serialization order method base database leanxcale first implementation method made 2010 part cumulonimbo european project
[ 2411, 6538, 2054, 5209, 7715, 3951, 5956, 2124, 3425, 5289 ]
Test
7,116
3
HD_Loader:hd loader hd loader program playstation 2 video game console allows users play games installed optional hard drive peripheral via playstation 2 network adaptor games copied hard drive within program using computer image dumping software outputs specific custom format hd loader software require original sony hard drive function properly however drives may impossible attach without modifying connectors games may also refuse detect drive unofficial sony public stance hd loader supported illegal enable game piracy allowing games installed played later without owning disc october 2006 federal court california ordered defendants pay excess 9 million damages digital millennium copyright act violations selling hd loader clone patched version official version sold hd advance still manufactured purchased many online retailers hd loader 100 compatible ps2 games incompatibilities exist game software depends certain peculiarities ps2 drive hardware additional incompatibilities arise use dual-layer dvds ps2 games sometimes parsed properly hd loader incidentally dual-layer games installed pc 0.8c possible install hd loader finally intentional impediments introduced recent high-profile ps2 titles god war gran turismo 4 prevent executed hard drive response limitations hd loader number independent programmers developed patches extend functionality hd loader improve game compatibility different software entirely e.g. openps2loader include fix improve dual-layer support one implement non-aligned data buffer allows gradius v played hd one defeat newer copy-protection measures popularly known god war fix one support new slimline scph-70000 series playstation 2 hardware one implement 48-bit logical block addressing allows hd loader take full advantage hard drives larger 137 gb 128 gib reported hd loader 0.7c hard drives 2 terabytes used unofficial patches accumulated hd loader release known 0.8b unofficial hd loader currently version 0.8c april 2007 version 0.8c continues support 48-bit 2 terabyte hard drives patches god war ii 3 modes support installing running dual layer games directly hard drive games need patched order played hd loader another may require using tricks starting game older digital controller switching dualshock 2 refuse install according ps2hd.com compatibility rate patched hd loader around 88.2 original playstation games compatible method official hd loader extracted released internet retaliation free library files used creation 0.6d first unofficial version improved game compatibility 0.7c fix suikoden v patches 48bit hdds 2 terabytes dma modes udma/mdma dvd9 fix allow dual layer games played added stable gui patching app created allowed one choose patches various edits apply official unpatched version updated compatibility menu added 0.7e patches fixed shadow colossus super monkey ball added version enabled playing many previously incompatible games updated compatibility menu changed modes description 0.8 patch fixed ability edit dma button configuration 0.8b fixes bug hdl0.8 installing hdds 128 gb minor errors updated compatibility menu 0.8b+ patch fixed god war ii added version known different names author rename version additionally patch breaks support 0.8c fix buffer alignment added gui patcher app made gow2 gta lcs run without crashing current version unofficial releases run console modchip installed using exploit free mcboot ps2 independence exploit hd advance cloned version hd loader software playstation 2 allow users play games installed optional hard drive peripheral available ps2 hd advance identical functionality many patched versions hd loader freely available online include dvd-9 support 48-bit hard drive addressing different theme changed text strings benefit hd advance distributed pressed disk giving patched version hd loader run console without modchip installed also without need ps2 independence exploit software modification however players using hd advance 2.0 retail pressed discs cd dvd format maxtor hard disk 80 gb capacity subsequently use disc play ps2 games hdd reported experiencing strange problem hd loader versions 0.7c boot perfectly via independence exploit subsequent versions hd loader 0.8 onwards freezes splash screen refuses start formatted hd advance disc possibly due newer patches hd advance discs solution reformat hard disk hd loader version 0.8 higher recommended newer ps2 games however confirmed work 100 across board certain ps2 models mainly pal 7xxx consoles reported still freeze splash screen currently-unfixable problem related hd loader version 0.8 higher pal single-port network adapter models main problem open ps2 loader abbreviated opl open-source program allows playing commercial games homebrew installed external storage devices support hard disk drive like hd loader usb like hd advance smb network also additional features like gsm feature used disable videos change resolution game output virtual memory cards allowing save usb hdd smb usage dualshock3 controller usb bluetooth using dongle cheat engine interface open ps2 loader customized themes developed version control since september 27 2009
[ 4794 ]
Test
7,117
3
Cross-domain_interoperability:cross-domain interoperability cross-domain interoperability exists organizations systems different domains interact information exchange services and/or goods achieve common goals interoperability method systems working together inter-operate domain instance community related infrastructure bound common purpose interests consistent mutual interactions rules engagement separable communities social technical linguistic professional legal sovereignty related boundaries capability cross-domain interoperability becoming increasingly important business government operations become global interdependent cross-domain interoperability enables synergy extends product utility enables users effective successful within domains combined effort cross-domain interoperability characterized common understanding agreements sides domain boundary enable individual organizations tailor make products assets services interoperable within larger community participant accepts enforces use mutual domain-wide worldwide standards interface protocols consequently cross-domain interfaces may control single element authority -- unlike integrated system-of-systems environment one domain authority may control interfaces used domains two examples activities benefit information systems interoperable across domains disaster response work 2013 typhoon relief philippines multi-national peacekeeping missions allied forces support france 2012-2013 conflict mali another effort cross-domain interoperability critical overall success implementation u.s affordable care act federal state governments insurance companies healthcare providers perform individual functions using variety networks divergent computer platforms – interoperable environment enable participants different domains effectively exchange information perform essential services protecting privacy rights individual patients exchange healthcare-related community begun focus establishing cross-domain interoperability yet large-scale basis cloud computing promotes communication collaboration connecting internet migrating information cloud group clouds guarantee cross-domain interoperability organizations connected internet mean cross-domain interoperability automatically happens eliminating technological barriers enabling information sharing collaboration involves designing building computer programs environments interoperate also cooperative agreements place regarding management administrative policies governing issues security user identification trust information assurance internal policies government regulations also impact either promote impede cross-domain interoperability establish cross-domain interoperability needs spirit cooperation among different participants domains must agreed-to standards translations interface conversions enable entity exchange information extract data needs order perform role contribute knowledge adds value overall mission number organizations businesses institutions work technology policies make cross-domain interoperability reality including national institute standards technology united states department defense nato network centric operations industry consortium ncoic ncoic number resources government industry foster cross-domain interoperability including open process ncoic rapid response capability nrrc™ first designed national geospatial-intelligence agency
[ 2961, 2087, 8010 ]
Validation
7,118
3
Replay_system:replay system replay system little-known subsystem within intel pentium 4 processor primary function catch operations mistakenly sent execution processor scheduler operations caught replay system re-executed loop conditions necessary proper execution fulfilled replay system came result intel quest ever-increasing clock speeds higher clock speeds necessitated lengthy pipelines 31 stages prescott core six stages scheduler execution units prescott core attempt maintain acceptable performance intel engineers design scheduler optimistic scheduler pentium 4 processor aggressive send operations execution without guarantee successfully executed among things scheduler assumes data level 1 trace cache cpu cache common reason execution fails requisite data available likely due cache miss happens replay system signals scheduler stop repeatedly executes failed string dependent operations completed successfully surprisingly cases replay system bad impact performance normal circumstances execution units pentium 4 use roughly 33 time replay system invoked occupy execution units nearly every available cycle wastes power increasingly important architectural design metric poses performance penalty execution units would sitting idle anyway however hyper-threading use replay system prevent thread utilizing execution units true cause performance degradation concerning hyper-threading prescott pentium 4 gained replay queue reduces time replay system occupy execution units cases thread processing different types operations replay system interfere performance increase appear explains performance hyper-threading application-dependent
[ 2448, 5343, 5947, 4847, 6148, 7499, 5042 ]
Train
7,119
7
Insteon_(company):insteon company insteon irvine ca-based developer home automation aka domotics hardware software technology also called insteon allows light switches lights thermostats motion sensors electrical devices interoperate power lines radio frequency rf communications company produces 200 products featuring technology insteon subsidiary smartlabs inc. also based irvine ca insteon founded 2005 irvine ca ceo joe dada dada previously founded smarthome 1992 home automation product catalog company operator smarthome.com e-commerce site late 1990s dada acquired two product engineering firms undertook extensive product development efforts create networking technology based power-line rf communications 2004 company filed patent protection resultant technology called insteon released 2005 2012 company released first network-controlled light bulb using insteon-enabled technology point dada spun insteon smarthome insteon technology uses dual-mesh networking topology devices peers device independently transmits receives repeats messages insteon produces 200 products using technology including led bulbs wall switches wall keypads sensors thermostats plug modules embedded devices along central controllers system management insteon markets two different central controllers brand called insteon hub newer homekit-enabled insteon hub pro designed apple homekit compatibility 2012 company introduced first network-controlled led light bulb
[ 6093, 7876, 6987 ]
Test
7,120
4
Biometrics:biometrics biometrics technical term body measurements calculations refers metrics related human characteristics biometrics authentication realistic authentication used computer science form identification access control also used identify individuals groups surveillance biometric identifiers distinctive measurable characteristics used label describe individuals biometric identifiers often categorized physiological versus behavioral characteristics physiological characteristics related shape body examples include limited fingerprint palm veins face recognition dna palm print hand geometry iris recognition retina odour/scent behavioral characteristics related pattern behavior person including limited typing rhythm gait voice researchers coined term behaviometrics describe latter class biometrics traditional means access control include token-based identification systems driver license passport knowledge-based identification systems password personal identification number since biometric identifiers unique individuals reliable verifying identity token knowledge-based methods however collection biometric identifiers raises privacy concerns ultimate use information many different aspects human physiology chemistry behavior used biometric authentication selection particular biometric use specific application involves weighting several factors jain et al 1999 identified seven factors used assessing suitability trait use biometric authentication proper biometric use application dependent certain biometrics better others based required levels convenience security single biometric meet requirements every possible application block diagram illustrates two basic modes biometric system first verification authentication mode system performs one-to-one comparison captured biometric specific template stored biometric database order verify individual person claim three steps involved verification person first step reference models users generated stored model database second step samples matched reference models generate genuine impostor scores calculate threshold third step testing step process may use smart card username id number e.g pin indicate template used comparison 'positive recognition common use verification mode aim prevent multiple people using identity second identification mode system performs one-to-many comparison biometric database attempt establish identity unknown individual system succeed identifying individual comparison biometric sample template database falls within previously set threshold identification mode used either 'positive recognition user provide information template used 'negative recognition person system establishes whether person implicitly explicitly denies latter function achieved biometrics since methods personal recognition passwords pins keys ineffective first time individual uses biometric system called enrollment enrollment biometric information individual captured stored subsequent uses biometric information detected compared information stored time enrollment note crucial storage retrieval systems secure biometric system robust first block sensor interface real world system acquire necessary data times image acquisition system change according characteristics desired second block performs necessary pre-processing remove artifacts sensor enhance input e.g removing background noise use kind normalization etc third block necessary features extracted step important step correct features need extracted optimal way vector numbers image particular properties used create template template synthesis relevant characteristics extracted source elements biometric measurement used comparison algorithm discarded template reduce filesize protect identity enrollee enrollment phase template simply stored somewhere card within database matching phase obtained template passed matcher compares existing templates estimating distance using algorithm e.g hamming distance matching program analyze template input output specified use purpose e.g entrance restricted area selection biometrics practical application depending upon characteristic measurements user requirements selecting particular biometric factors consider include performance social acceptability ease circumvention and/or spoofing robustness population coverage size equipment needed identity theft deterrence selection biometric based user requirements considers sensor device availability computational time reliability cost sensor size power consumption multimodal biometric systems use multiple sensors biometrics overcome limitations unimodal biometric systems instance iris recognition systems compromised aging irises electronic fingerprint recognition worsened worn-out cut fingerprints unimodal biometric systems limited integrity identifier unlikely several unimodal systems suffer identical limitations multimodal biometric systems obtain sets information marker i.e. multiple images iris scans finger information different biometrics requiring fingerprint scans using voice recognition spoken passcode multimodal biometric systems fuse unimodal systems sequentially simultaneously combination thereof series refer sequential parallel hierarchical serial integration modes respectively fusion biometrics information occur different stages recognition system case feature level fusion data features extracted multiple biometrics fused matching-score level fusion consolidates scores generated multiple classifiers pertaining different modalities finally case decision level fusion final results multiple classifiers combined via techniques majority voting feature level fusion believed effective levels fusion feature set contains richer information input biometric data matching score output decision classifier therefore fusion feature level expected provide better recognition results spoof attacks consist submitting fake biometric traits biometric systems major threat curtail security multi-modal biometric systems commonly believed intrinsically robust spoof attacks recent studies shown evaded spoofing even single biometric trait following used performance metrics biometric systems early cataloguing fingerprints dates back 1891 juan vucetich started collection fingerprints criminals argentina josh ellenbogen nitzan lebovic argued biometrics originated identification systems criminal activity developed alphonse bertillon 1853–1914 francis galton theory fingerprints physiognomy according lebovic galton work led application mathematical models fingerprints phrenology facial characteristics part absolute identification key inclusion exclusion populations accordingly biometric system absolute political weapon era form soft control theoretician david lyon showed past two decades biometric systems penetrated civilian market blurred lines governmental forms control private corporate control kelly gates identified 9/11 turning point cultural language present language cultural studies aftermath 9/11 moment articulation objects events necessary connection come together new discourse formation established automated facial recognition homeland security technology kelly gates biometric future facial recognition technology culture surveillance new york 2011 p. 100 adaptive biometric systems aim auto-update templates model intra-class variation operational data two-fold advantages systems solving problem limited training data tracking temporal variations input data adaptation recently adaptive biometrics received significant attention research community research direction expected gain momentum key promulgated advantages first adaptive biometric system one longer needs collect large number biometric samples enrollment process second longer necessary enrol retrain system scratch order cope changing environment convenience significantly reduce cost maintaining biometric system despite advantages several open issues involved systems mis-classification error false acceptance biometric system cause adaptation using impostor sample however continuous research efforts directed resolve open issues associated field adaptive biometrics information adaptive biometric systems found critical review rattani et al recent times biometrics based brain electroencephalogram heart electrocardiogram signals emerged research group university kent led ramaswamy palaniappan shown people certain distinct brain heart patterns specific individual another example finger vein recognition using pattern-recognition techniques based images human vascular patterns advantage 'futuristic technology fraud resistant compared conventional biometrics like fingerprints however technology generally cumbersome still issues lower accuracy poor reproducibility time new generation biometrical systems called biometrics intent aims scan intent technology analyze physiological features eye movement body temperature breathing etc predict dangerous behaviour hostile intent materializes action portability side biometric products vendors embracing significantly miniaturized biometric authentication systems bas thereby driving elaborate cost savings especially large-scale deployments operator signature biometric mode manner person using device complex system recorded verification template one potential use type biometric signature distinguish among remote users telerobotic surgery systems utilize public networks communication john michael mike mcconnell former vice admiral united states navy former director u.s. national intelligence senior vice president booz allen hamilton promoted development future capability require biometric authentication access certain public networks keynote speech 2009 biometric consortium conference basic premise proposal person uniquely authenticated using biometrics computer fact also agent performing potentially malicious actions computer however control computer subverted example computer part botnet controlled hacker knowledge identity user terminal materially improve network security aid law enforcement activities recently another approach biometric security developed method scans entire body prospects guarantee better identification prospect method globally accepted complex prospects concerned privacy rather tags tattoos biometric techniques may used identify individual animals zebra stripes blood vessel patterns rodent ears muzzle prints bat wing patterns primate facial recognition koala spots tried biometrics considered also instrumental development state authority put foucauldian terms discipline biopower turning human subject collection biometric parameters biometrics would dehumanize person infringe bodily integrity ultimately offend human dignity well-known case italian philosopher giorgio agamben refused enter united states protest united states visitor immigrant status indicator us-visit program requirement visitors fingerprinted photographed agamben argued gathering biometric data form bio-political tattooing akin tattooing jews holocaust according agamben biometrics turn human persona bare body agamben refers two words used ancient greeks indicating life zoe life common animals humans life bios life human context meanings purposes agamben envisages reduction bare bodies whole humanity new bio-political relationship citizens state turning citizens pure biological life zoe depriving humanity bios biometrics would herald new world dark matters surveillance blackness surveillance scholar simone browne formulates similar critique agamben citing recent study relating biometrics r found gender classification system researched inclined classify africans males mongoloids females consequently browne argues conception objective biometric technology difficult systems subjectively designed vulnerable cause errors described study stark expansion biometric technologies public private sector magnifies concern increasing commodification biometrics private sector adds danger loss human value indeed corporations value biometric characteristics individuals value browne goes suggest modern society incorporate biometric consciousness entails informed public debate around technologies application accountability state private sector ownership access one body data intellectual property generated one body data must understood right scholars emphasized however globalized world confronted huge mass people weak absent civil identities developing countries weak unreliable documents poorer people countries even unreliable documents without certified personal identities certainty right civil liberty one claim rights including right refuse identified identifiable subject public identity sense biometrics could play pivotal role supporting promoting respect human dignity fundamental rights biometrics intent poses risks paper harvard international review prof nayef al-rodhan cautions high risks miscalculations wrongful accusations infringements civil liberties critics us also signalled conflict 4th amendment possible data obtained biometric enrollment may used ways enrolled individual consented example biometric features could disclose physiological and/or pathological medical conditions e.g. fingerprint patterns related chromosomal diseases iris patterns could reveal genetic sex hand vein patterns could reveal vascular diseases behavioral biometrics could reveal neurological diseases etc. moreover second generation biometrics notably behavioral electro-physiologic biometrics e.g. based electrocardiography electroencephalography electromyography could also used emotion detection three categories privacy concerns thieves get access secure properties chance thieves stalk assault property owner gain access item secured biometric device damage owner could irreversible potentially cost secured property example 2005 malaysian car thieves cut finger mercedes-benz s-class owner attempting steal car context biometric systems presentation attacks may also called spoofing attacks per recent iso/iec 30107 standard presentation attacks defined presentation biometric capture subsystem goal interfering operation biometric system attacks either impersonation obfuscation attacks impersonation attacks try gain access pretending someone else obfuscation attacks may example try evade face detection face recognition systems recently several methods proposed counteract presentation attacks automated detection presentation attack called presentation attack detection pad one advantage passwords biometrics re-issued token password lost stolen cancelled replaced newer version naturally available biometrics someone face compromised database cancel reissue electronic biometric identifier stolen nearly impossible change biometric feature renders person biometric feature questionable future use authentication case hacking security-clearance-related background information office personnel management opm united states cancelable biometrics way incorporate protection replacement features biometrics create secure system first proposed ratha et al cancelable biometrics refers intentional systematically repeatable distortion biometric features order protect sensitive user-specific data cancelable feature compromised distortion characteristics changed biometrics mapped new template used subsequently cancelable biometrics one major categories biometric template protection purpose besides biometric cryptosystem biometric cryptosystem error-correcting coding techniques employed handle intraclass variations ensures high level security limitations specific input format small intraclass variations several methods generating new exclusive biometrics proposed first fingerprint-based cancelable biometric system designed developed tulyakov et al essentially cancelable biometrics perform distortion biometric image features matching variability distortion parameters provides cancelable nature scheme proposed techniques operate using recognition engines teoh et al savvides et al whereas methods dabbah et al take advantage advancement well-established biometric research recognition front-end conduct recognition although increases restrictions protection system makes cancellable templates accessible available biometric technologies soft biometrics traits physical behavioral adhered human characteristics derived way human beings normally distinguish peers e.g height gender hair color used complement identity information provided primary biometric identifiers although soft biometric characteristics lack distinctiveness permanence recognize individual uniquely reliably easily faked provide evidence users identity could beneficial words despite fact unable individualize subject effective distinguishing people combinations personal attributes like gender race eye color height visible identification marks used improve performance traditional biometric systems soft biometrics easily collected actually collected enrollment two main ethical issues raised soft biometrics first soft biometric traits strongly cultural based e.g. skin colors determining ethnicity risk support racist approaches biometric sex recognition best recognizes gender tertiary sexual characters unable determine genetic chromosomal sexes soft biometrics aging recognition often deeply influenced ageist stereotypes etc second soft biometrics strong potential categorizing profiling people risking supporting processes stigmatization exclusion many countries including united states planning share biometric data nations testimony us house appropriations committee subcommittee homeland security biometric identification 2009 kathleen kraninger robert mocny commented international cooperation collaboration respect biometric data follows according article written 2009 s. magnuson national defense magazine entitled defense department pressure share biometric data united states bilateral agreements nations aimed sharing biometric data quote article certain members civilian community worried biometric data used full disclosure may forthcoming particular unclassified report united states defense science board task force defense biometrics states wise protect sometimes even disguise true total extent national capabilities areas related directly conduct security-related activities also potentially applies biometrics goes say classic feature intelligence military operations short goal preserve security 'sources methods countries using biometrics include australia brazil canada cyprus greece china gambia germany india iraq ireland israel italy malaysia netherlands new zealand nigeria norway pakistan south africa saudi arabia tanzania ukraine united arab emirates united kingdom united states venezuela among low middle income countries roughly 1.2 billion people already received identification biometric identification program also numerous countries applying biometrics voter registration similar electoral purposes according international idea ’ icts elections database countries using 2017 biometric voter registration bvr armenia angola bangladesh bhutan bolivia brazil burkina faso cambodia cameroon chad colombia comoros congo democratic republic costa rica ivory coast dominican republic fiji gambia ghana guatemala india iraq kenya lesotho liberia malawi mali mauritania mexico morocco mozambique namibia nepal nicaragua nigeria panama peru philippines senegal sierra leone solomon islands somaliland swaziland tanzania uganda uruguay venezuela yemen zambia zimbabwe india national id program called aadhaar largest biometric database world biometrics-based digital identity assigned person lifetime verifiable online instantly public domain time anywhere paperless way designed enable government agencies deliver retail public service securely based biometric data fingerprint iris scan face photo along demographic data name age gender address parent/spouse name mobile phone number person data transmitted encrypted form internet authentication aiming free limitations physical presence person given place 550 million residents enrolled assigned 480 million aadhaar national identification numbers 7 november 2013 aims cover entire population 1.2 billion years however challenged critics privacy concerns possible transformation state surveillance state banana republic.§ project also met mistrust regarding safety social protection infrastructures tackle fear amongst people india supreme court put new ruling action stated privacy seen fundamental right 24 august 2017 new law established
[ 2360, 4210, 4116, 3603, 458, 6515, 803, 6974, 7523, 4857, 4133, 907, 2213, 3794, 7372, 7461, 7652, 3650, 4433, 2054, 943, 6937, 7120, 6483, 1049, 6672, 1505, 1418, 7865, 5440, 3241, 4014, 7139, 1805 ]
Validation
7,121
4
Ghost_Push:ghost push ghost push family malware infects android os automatically gaining root access downloading malicious unwanted software malware appears discovered september 2015 security research lab cheetah mobile subsequently developed diagnostic software determine whether device compromised september 2015 twenty variants circulation latter day versions employed routines made harder detect remove malware hogs system resources making phone slow draining battery consuming cellular data advertisements continually appear either full partial screen ads status bar applications installed malware appear difficult remove impervious anti-virus software even surviving factory reset device infection typically comes via downloading applications third-party app stores least thirty-nine applications identified carriers peak ghost push virus infected 600,000 devices daily 50 infections occurring india well indonesia philippines ranking second third malware discovered september 2015 cheetah mobile security research lab
[ 6515 ]
Test
7,122
4
Deep_content_inspection:deep content inspection deep content inspection dci form network filtering examines entire file mime object passes inspection point searching viruses spam data loss key words content level criteria deep content inspection considered evolution deep packet inspection ability look actual content contains instead focusing individual multiple packets deep content inspection allows services keep track content across multiple packets signatures may searching cross packet boundaries yet still found exhaustive form network traffic inspection internet traffic examined across seven osi iso layers importantly application layer traditional inspection technologies unable keep recent outbreaks widespread attacks unlike shallow inspection methods deep packet inspection dpi data part possibly also header packet inspected deep content inspection dci -based systems exhaustive network traffic packets reassembled constituting objects un-encoded and/or decompressed required finally presented inspected malware right-of-use compliance understanding traffic ’ intent reconstruction comprehension done real-time real-time policies applied traffic preventing propagation malware spam valuable data loss dci correlation comprehension digital objects transmitted many communication sessions leads new ways network performance optimization intelligence regardless protocol blended communication sessions historically dpi developed detect prevent intrusion used provide quality service flow network traffic prioritized latency-sensitive traffic types e.g. voice ip utilized provide higher flow priority new generation network content security devices unified threat management next generation firewalls garner ras core research note g00174908 use dpi prevent attacks small percentage viruses worms signatures malware fit within payload dpi ’ inspection scope however detection prevention new generation malware conficker stuxnet possible exhaustive analysis provided dci computer networks send information across network one point another data sometimes referred payload ‘ encapsulated ’ within ip packet looks follows networks evolve inspection techniques evolve attempting understand payload throughout last decade vast improvements including historically inspection technology examined ip header tcp/udp header dubbed ‘ packet filtering ’ devices would drop sequence packets packets allowed network scheme network traffic inspection first used firewalls protect packet attacks stateful packet inspection developed examine header information packet content increase source destination understanding instead letting packets result addresses ports packets stayed network context appropriate networks ’ current ‘ state ’ scheme first used check point firewalls eventually intrusion prevention/detection systems deep packet inspection currently predominant inspection tool used analyze data packets passing network including headers data protocol structures technologies scan packet streams look offending patterns effective deep packet inspection systems must ‘ string ’ match packet payloads malware signatures specification signatures dictate request/response like wire speeds fpgas field programmable gate arrays network processors even graphics processing units gpus programmed hardwired signatures result traffic passes circuitry quickly matched using hardware allows quick inline matches dpi systems following limitations including hardware limitations since dpi systems implement pattern matching searches ‘ offending ’ patterns hardware systems typically limited payload limitations web applications communicate content using binary-to-text encoding compression zipped archived etc obfuscation even encryption payload structure becoming complex straight ‘ string ’ matching signatures longer sufficient common workaround signatures similarly ‘ encoded ’ zipped given ‘ search limitations ’ scale support every application type nested zipped archived files parallel development deep packet inspection beginnings deep content inspection traced back early 1995 introduction proxies stopped malware spam deep content inspection seen third generation network content inspection network content exhaustively examined proxies deployed provide internet caching services retrieve objects forward consequently network traffic intercepted potentially stored graduated known secure web gateways proxy-based inspections retrieve scans object script images proxies relies fetch content first cached forwarding content recipient introduced form file inspection early 1995 mailsweeper released content technologies clearswift replaced mimesweeper 2005 2006 saw release open-source cross-platform antivirus software clamav provided support caching proxies squid netcache using internet content adaptation protocol icap proxy pass downloaded content scanning icap server running anti-virus software since complete files ‘ objects ’ passed scanning proxy-based anti-virus solutions considered first generation network content inspection bluecoat webwasher secure computing inc. mcafee division intel provided commercial implementations proxies eventually becoming standard network element enterprise networks limitations proxies secure web gateways provide in-depth network traffic inspection use limited second generation network traffic inspection solutions implemented firewalls and/or utms given network traffic choked devices addition dpi inspection proxy-like inspection possible approach first pioneered netscreen technologies inc. acquired juniper networks inc however given expensive cost operation feature applied tandem dpi system activated a-per-need basis content failed qualified dpi system third current generation network content inspection known deep content inspection solutions implemented fully transparent devices perform full application level content inspection wire speed order understand communication session ’ intent —in entirety— deep content inspection system must scan handshake payload digital objects executables images javascript ’ .pdfs etc also referred data-in-motion carried within payload constructed usability compliance threat analysis session payload achieved given handshake sequence complete payload session available dci system unlike dpi systems simple pattern matching reputation search possible exhaustive object analysis possible inspection provided dci systems include signature matching behavioral analysis regulatory compliance analysis correlation session inspection history previous sessions availability complete payload objects schemes inspection deep content inspection systems typically deployed high-grade security compliance required end-point security solutions possible bring device cloud installations third generation approach deep content inspection developed within defence intelligence community first appearing guard products sybard later wedge networks inc.. key-implementation highlights company approach deduced patent uspto 7,630,379 main differentiators deep content inspection deep content inspection content-focused instead analyzing packets classifying traffic based application types next generation firewalls understanding content intent highest level intelligence gained network traffic important information flow moving away packet towards application ultimately content example inspection levels availability complete objects payload deep content inspection system services/inspection examples include dci currently adopted enterprises service providers governments reaction increasingly complex internet traffic benefits understanding complete file types intent typically organizations mission-critical applications rigid requirements type inspection deals real time protocols continue increase complexity size one key barriers providing level inspection looking content dealing network throughput solutions must overcome issue introducing latency network environment must also able effectively scale meet tomorrow demands demands envisioned growing cloud computing trend one approach use selective scanning however avoid compromising accuracy selection criteria based recurrence following patent uspto 7,630,379 provides scheme deep content inspection carried effectively using recurrence selection scheme novelty introduced patent addresses issues content e.g. mp3 file could renamed transmission dealing amount traffic information applying services requires high speed look ups able effective need compare full services platforms else traffic utilized effectively example often found dealing viruses malicious content solutions compare content small virus database instead full complete one
[ 7151, 5287, 2644, 4596, 5488, 1559, 4162, 8008, 5157, 598, 3572, 2779, 3821, 6487, 4734, 7867, 4014, 1513, 2356 ]
Test
7,123
9
Joel_Moses:joel moses joel moses born 1941 israeli-american mathematician computer scientist institute professor emeritus massachusetts institute technology joel moses born mandatory palestine 1941 emigrated u.s. 1954 attended midwood high school brooklyn new york received undergraduate degree mathematics columbia university master degree mathematics also columbia supervision marvin minsky moses received doctorate mathematics mit 1967 thesis entitled symbolic integration laid groundwork macsyma symbolic mathematics program created mit largely supervision 1969 1983 macsyma able solve problems simplification polynomial factorization indefinite integration solution differential equations higher-order mathematical questions moses served administrative posts mit 1974 1998 associate director laboratory computer science head electrical engineering computer science department dean engineering provost also served acting director engineering systems division mit 2006 2007 acting director center technology policy industrial development 2007 2010 memoirs published interviewed occasion mit 150th anniversary appears independent documentary film called plug pray talks impact eliza computer program published joseph weizenbaum 1966 moses member national academy engineering fellow american academy arts sciences association computing machinery american association advancement science life fellow ieee
[ 7032, 5986, 7391, 4039, 7526 ]
Test
7,124
2
HiperDispatch:hiperdispatch hiperdispatch workload dispatching feature found newest ibm mainframe models system z10 ibm zenterprise system processors running recent releases z/os hiperdispatch introduced february 2008 support added z/vm v6r3 release july 26 2013 one engineering challenges large smp server designs maintain near-linear scalability number cpus increases performance throughput double doubling number processors many overhead factors including contention cache main memory access overhead factors become increasingly difficult mitigate number cpus increases design goal delivering maximum performance minimize overhead factors new mainframe model supports higher maximum number cpus 64 main processors single system z10 mainframe example engineering challenge becomes ever important hiperdispatch helps address problem combination hardware features z/os dispatching z/os workload manager z/os may tasks waiting processing attention transaction programs task often requires access memory large smp design system z cpus physically closer faster access cache memory might hold supporting data particular tasks hiperdispatch exploits fact steers tasks cpus likely fastest access relevant data already cache particular cpu busy hiperdispatch first wait finish task even another less favorable cpu idle however limitations patient hiperdispatch governed workload manager goals z/os workload manager senses risk pending task miss service level responding within certain number milliseconds user request example workload manager hiperdispatch send task idle cpu processing even cpu must fetch data slower main memory hiperdispatch offers little cpu savings benefit machines configured relatively small number cpus however feature help quite lot cpu count increases ibm mainframe capacity tables thus software pricing based assumption hiperdispatch active benefit hiperdispatch parking logical cpus number cpus z/os dispatches work closely matches lpar weight applicable even small machine configurations benefit reduction short engine effect making system performance responsive workload manager wlm must configured correctly hiperdispatch work well mainframe users latent problems wlm goal settings exposed hiperdispatch option disable hiperdispatch cases mainframe users want correct issues right away z/os system resource manager srm configure z/os system resource manager modify parmlib-member ieaoptxx hiperdispatch=yes|no yes srm turn hiperdispatch mode srm turn hiperdispatch mode partitions 64 logical processors ipl time forced run hiperdispatch=yes ipl lpars 64 logical processors switch hiperdispatch=no case hiperdispatch=yes z196 follow-on cpcs vary cpu management automatically turned independent varycpu -specification default value
[ 5396, 5447 ]
Test
7,125
4
Computer_security_incident_management:computer security incident management fields computer security information technology computer security incident management involves monitoring detection security events computer computer network execution proper responses events computer security incident management specialized form incident management primary purpose development well understood predictable response damaging events computer intrusions incident management requires process response team follows process definition computer security incident management follows standards definitions described national incident management system nims incident coordinator manages response emergency security incident natural disaster event requiring response emergency services incident coordinator would act liaison emergency services incident manager computer security incident management administrative function managing protecting computer assets networks information systems systems continue become critical personal economic welfare society organizations public private sector groups associations enterprises must understand responsibilities public good welfare memberships stakeholders responsibility extends management program “ things go wrong. ” incident management program defines implements process organization may adopt promote welfare security public event observable change normal behavior system environment process workflow person components three basic types events computer security information technology personnel must handle emergency events according well-defined computer security incident response plan incident event attributable human root cause distinction particularly important event product malicious intent harm important note incidents events many events incidents system application failure due age defect may emergency event random flaw failure incident security incident coordinator manages response process responsible assembling team coordinator ensure team includes individuals necessary properly assess incident make decisions regarding proper course action incident team meets regularly review status reports authorize specific remedies team utilize pre-allocated physical virtual meeting place investigation seeks determine circumstances incident every incident warrant require investigation however investigation resources like forensic tools dirty networks quarantine networks consultation law enforcement may useful effective rapid resolution emergency incident incident response steps detection- incident detected sensor network analyst user reporting something unusual his/her pc containment- event malicious network traffic computer virus incident response manager stop traffic taking computer network clean- run virus scan remove virus wipe computer clean reimage machine reverse engineering- use computer forensics tools understand malicious traffic occurred first place incident completely understood make plans decrease future risk
[ 6488, 5274, 1467, 7106, 3727, 7836, 5951, 1805 ]
Test
7,126
2
MotoMagx:motomagx motomagx linux kernel-based mobile operating system developed launched 2007 motorola run mid-to-high-end mobile phones system based montavista mobilinux originally intended 60 upcoming devices soon dropped favor android windows mobile operating systems motomagx compatible motorola gsm/umts devices shown due lack implementation compatible qualcomm cdma2000 devices result motorola often sold multiple device variants radically different firmware example motorola razr2 t-mobile shipped motomagx whereas razr2 verizon wireless shipped motorola p2k firmware created significant confusion customers user experience varied widely two identical devices simply based carrier phones based os
[ 1522, 3081, 2187, 4400, 3097, 474, 2564, 5391, 2300, 5486, 5571, 578, 5579, 740, 5232, 5236, 5062, 1399, 3039, 1582, 5068, 2503, 2240, 424, 7030, 5872, 2520, 4549, 2071, 349, 3751, 5794, 6158, 7956 ]
Train
7,127
4
The_Diana_Initiative:diana initiative diana initiative computer security conference based las vegas nevada aimed supporting women cybersecurity first diana initiative conference took place 2017 diana initiative founded cheryl biswas virginia robbins pablo breuer elizabeth etherington michael smith 2019 conference held westin las vegas def con
[]
Validation
7,128
3
Dragon_Slayer:_The_Legend_of_Heroes:dragon slayer legend heroes originally released 1989 nec pc-8801 within next years would also ported nec pc-9801 msx 2 sharp x68000 sega mega drive super famicom turbografx-cd pc engine cd-rom dragon slayer legend heroes barcode battler card set also released epoch co. 1992 pc engine version released united states turbografx-cd game series released us playstation portable remake legend heroes iv akai shizuku 1995 version game broadcast exclusively japanese markets via super famicom satellaview subunit name bs dragon slayer eiyu densetsu 1998 remake legend heroes bundled remake released playstation sega saturn korean conversion original pc-9801 version released ms-dos/ibm pc mantra samsung 1996 japanese pc edition released 1997 game soundtrack composed members soundtrack turbografx-16 version arranged upon release famitsu scored pc engine cd-rom version 29 40 1991 later scored super famicom version 29 40 1992 sega mega drive version 23 40 1994 january 1993 issue electronic games magazine electronic gaming awards nominated turbografx-cd version 1992 multimedia game year award stated demonstrates far multimedia come since design team ys ii mammoth quest meticulously detailed incorporates highly involved game play
[ 543, 2207, 4759, 6380, 6734 ]
Test
7,129
4
OneID:oneid oneid digital security service based redwood city california oneid sells digital identity system claims provide security across devices using public key cryptography instead passwords technology utilized non-profits salsa labs increase frequency security online donations company founded 2011 serial entrepreneur steve kirsch kirsch recruited engineers jim fenton adam back bobby beckmann create flagship product launched early 2012 following launch company raised us 7 million venture capital financing menlo park-based venture capital firm khosla ventures following series alex doll took position ceo doll previously executive-in-residence khosla ventures founding executive pgp corp. doll appointment founder kirsch moved cto role shirish sathaye general partner khosla ventures jonathan heiliger added oneid board directors following growth period late 2013 company appointed kirsch ceo 2014 fast company named oneid one top 10 innovative companies finance
[]
Test
7,130
7
Lucidpress:lucidpress lucidpress web-based desktop publishing software application developed lucid software used create brochures flyers newsletters business cards posters magazines presentations built web standards html5 javascript lucidpress supported modern web browsers including google chrome firefox safari internet explorer 8+ though started platform single users small businesses lucidpress found substantial user bases education enterprise spaces october 2013 lucid software announced lucidpress public beta version following release lucidpress featured techcrunch venturebeat pc world techcrunch noting chance test app launch indeed easy use 've ever used desktop publishing app past 'll feel right home lucidpress features kind standard top-bar menu layout options publishing apps terms features also hold similar desktop-based apps october 2013 lucidpress became available g suite marketplace may 2015 lucidpress hit 1 million users one year later june 2016 lucidpress hit 2 million users announced advanced template locking feature november 2016 lucidpress announced print ship feature users order printed versions documents create lucidpress october 2016 lucidpress conducted survey research firm demand metric impact brand consistency report titled impact brand consistency contains insights 200 senior marketing brand leaders found among insights consistent brand marketing worth estimated 23 increase revenue lucid software raised 1 million seed 2011 led google ventures may 2014 company received 5 million investment round led salt lake-based kickstart seed fund september 2016 company received 36 million investment spectrum equity whose previous investments include online platforms ancestry.com lynda.com prezi surveymonkey kickstart seed fund grayhawk capital also participated round lucidpress alternative complex design programs like adobe indesign microsoft publisher especially mac users design capabilities range single-page documents like business cards flyers multi-page documents like annual reports digital magazines lucidpress accessible anywhere modern web browsers documents securely stored cloud application require download incorporating real-time collaborative editor lucidpress allows multiple users edit document simultaneously users also make comments chat collaborators real time lucidpress content published several different mediums including lucidpress offers large library templates designing print digital content template categories include lucidpress fully integrated google drive google apps known g suite lucidpress integration consistently one top productivity apps g suite marketplace users import images flickr facebook dropbox
[ 2451, 5571 ]
Test
7,131
3
VAXft:vaxft vaxft family fault-tolerant minicomputers developed manufactured digital equipment corporation dec using processors implementing vax instruction set architecture isa vaxft stood virtual address extension fault tolerant systems ran openvms operating system first supported vms 5.4 two layered software products vaxft system services vms volume shadowing required support fault-tolerant features vaxft redundancy data stored hard disk drives vaxft systems shared basic system architecture vaxft system consisted two zones operated lock-step zone zone b zone fully functional computer capable running operating system identical hardware configuration lock-step achieved hardware cpu module cpu module zone connected crosslink cable crosslink cables carried results instructions executed one cpu module compared hardware results instructions executed latter ensure identical two zones kept synchronous clock signal carried crosslink cables hardware failure occurred one zones affected zone brought offline without bringing zone continued operate normal repairs completed offline zone powered automatically resynchronized zone restoring redundancy vaxft model 310 introduced vaxft 3000 model 310 code named cirrus introduced february 1990 shipped june first vaxft model dec first fault-tolerant computer generally available 1991 launch new vaxft models vax 3000 model 310 renamed follow new naming scheme becoming vaxft model 310 model 310 theoretical maximum performance 3.8 vups announced model 310 starting price us 200,000 august 1990 slow sales prompted dec reduce us price model 310 us 168,000 used ka520 cpu module containing 16.67 mhz 60 ns cycle time cvax+ chip set 32 kb external secondary cache system contained two cpu modules one zone running lock-step vaxft model 110 code named cirrus entry-level model announced 18 march 1991 alongside three models model 110 essentially low-cost model vaxft model 310 theoretical maximum performance 2.4 vups contained two zones packed side side enclosure compared model 310 limited expandability regards memory storage capacity available options available either pedestal rackmount configuration rackmount configuration pedestal without plastic covers casters fitted standard 19-inch retma cabinet zone five-slot backplane ka510 cpu module one three 32 mb ms520 memory modules one two kfe52 system i/o controller modules one two dec wancontroller 620 dsf32 wide area network wan communications adapters leftmost slot first slot primary system controller resided first slot cpu module second memory modules third fourth fifth slots second system i/o controller resided either fourth fifth slots wan communications adapters also fourth fifth slots basic system contained cpu module memory module system i/o controller dec wancontroller 620 designed use vaxft systems provided two synchronous lines bandwidth 64 kb lines could operated two independent lines paired provide redundancy vaxft model 410 code named cirrus ii mid-range model announced 18 march 1991 alongside three models originally supposed ship june july 1991 delayed september 1991 reason given dec wanted tune new release vms system model 410 identical model 310 used ka550 cpu module containing 28.57 mhz 35 ns cycle time soc microprocessor 128 kb external secondary cache supported 256 mb memory model 410 theoretical maximum performance 6.0 vups vaxft model 610 code named cirrus ii mid-range model announced 18 march 1991 alongside three models originally supposed ship june july 1991 delayed september 1991 reason given dec wanted tune new release vms system model 610 architecturally identical model 410 except two zones packaged vertically 60 high cabinet zone zone b cabinet storage capacity systems packaged pedestals reason model 610 intended data centers could one two expander cabinets placed left right system additional storage devices cabinets front rear cooled vaxft model 612 high-end model announced 18 march 1991 alongside three models originally supposed ship june july 1991 delayed september 1991 reason given dec wanted tune new release vms system model 612 vaxcluster two vaxft model 610s expansion cabinet positioned two systems standard theoretical maximum performance 12.0 vups second expansion cabinet could added two system cabinets vaxft model 810 code named jetstream high-end model introduced october 1993 instead targeted introduction date late summer early fall 1992 system developed dec manufactured italian industrial manufacturer alenia spa theoretical maximum performance 30.0 vups model 810 third generation vaxft system contained two zones vertically packaged cabinet optional expansion cabinet could connected system addition two uninterruptable power supplies one zone used ka560-aa cpu module contained two 83.33 mhz 12 ns cycle time nvax+ microprocessors 512 kb b-cache l2 cache module two microprocessors operated lock-step fashion like previous vaxft systems two cpu modules system one two zones operated lock-step fashion model 810 cabinet 60.0 cm 24 wide 170.0 cm 67 high 86.0 cm 34 deep
[ 5055, 2226, 5849, 2792, 5911, 3747, 5571, 4099, 7499, 352, 8117, 1197, 6784 ]
Validation
7,132
3
Smartbook:smartbook smartbook class mobile device combined certain features smartphone netbook computer produced 2009 2010 smartbooks advertised features always all-day battery life 3g wi-fi connectivity gps typically found smartphones laptop tablet-style body screen size 5 10 inches physical soft touchscreen keyboard german company sold laptops brand smartbook held trademark word many countries including big markets like united states china japan india acted preempt others using term smartbook describe products smartbooks tended designed entertainment purposes productivity typically targeted work online applications projected sold subsidized mobile network operators like mobile phones along wireless data plan advent much popular tablets like android tablets ipad coupled prevailing popularity conventional desktop computers laptops displaced smartbook smartbook concept mentioned qualcomm may 2009 marketing snapdragon technology products expected later year difficulties adapting key software particular adobe proprietary flash player arm architecture delayed releases first quarter 2010 smartbooks would powered processors energy-efficient traditional ones typically found desktop laptop computers first smartbooks expected use variants linux operating system google android chrome os arm processor would allowed achieve longer battery life many larger devices using x86 processors february 2010 abi research projected 163 million smartbooks would ship 2015 many countries word smartbook trademark registered smartbook ag august 2009 german court ruled qualcomm must block access germany webpages containing word smartbook unless smartbook ag mentioned smartbook ag defended trademark february 2010 ruling prevented lenovo using term end 2010 qualcomm ceo paul jacobs admitted tablet computers ipad already occupied niche smartbook name dropped february 2011 qualcomm legal battle german patent office ruled words smart book could used however several trademarks registered march 2009 always innovating company announced touch book based texas instruments omap 3530 implemented arm cortex-a8 architecture originally developed texas instruments beagle board touchscreen detachable keyboard contained second battery device came linux operating system company offered license hardware designs sharp electronics introduced pc-z1 netwalker device august 2009 promised ship date october 2009 featured 5.5 touchscreen runs ubuntu arm cortex-a8 based freescale i.mx515 packaged small clamshell design sharp reported device weighs less 500 grams run 10 hours one battery charge device said run 720p video 2d 3d graphics acceleration comes adobe flash lite 3.1 installed pegatron asus company showed working prototype smartbook august 2009 consisted arm cortex-a8 based freescale i.mx515 supports 2d/3d graphics well 720p hd video 512 mb ddr2 ram 1024x600 8.9 lcd screen bluetooth 2.0 802.11g run sd card also featured one usb one micro usb port vga port well card reader smartbook ran ubuntu netbook 9.04 contained version adobe flash player date bill materials pegatron smartbook prototype 120 november 2009 pegatron said received large number orders smartbooks would launch early 2010 devices rumored sell 200 subsidized asus announced plans release smartbook first quarter 2010 asus later postponed smartbook launch second quarter 2010 qualcomm expected announce smartbook november 12 2009 analyst meeting lenovo device concept shown announced january 2010 may 2010 skylight cancelled late january 2010 u.s. federal communications commission fcc listing featured device hp referred smartbook prototype device already shown earlier beginning february mobile world congress barcelona hp announced bring device market specifications likely following end march 2010 smartbook made appearance fcc time listing 3g capabilities according fcc device support gsm 850 1900 well wcdma ii v bands wcdma bands may indicate usage network united states details product available hp website june 2010 smartbook device toshiba announced features nvidia tegra processor able remain stand-by mode 7 days device officially available toshiba united kingdom site originally delivered android v2.1 upgradable v2.2 since 2011 also modified run customized linux distribution japan sold dynabook az genesi company announced mx smartbook part efika line august 2010 originally priced us 349 reviewers questioned small enough fit definition ostensibly derivative above-mentioned pegatron design september 2009 foxconn announced working smartbook development november 2009 quanta computer pre-production snapdragon powered sample smartbook device ran android unveiled companies like acer inc. planned release smartbook due popularity tablets macbook air ultrabooks plans scrapped
[ 6874, 3764, 4575, 7520, 3012, 5571, 578, 6910, 740, 7654, 1023, 1864, 4166, 6378, 2498, 4627, 4197, 352 ]
Test
7,133
3
Motorola_68881:motorola 68881 motorola 68881 motorola 68882 floating-point coprocessor fpu devices used computer systems conjunction 68020 68030 microprocessors motorola 68881 introduced 1984 addition one devices added substantial cost computer added floating-point unit could rapidly perform floating point mathematical calculations mid 1980s feature useful mostly scientific mathematical software 68020 68030 cpus designed separate 68881 chip mind instruction sets reserved f-line instructions – opcodes beginning hexadecimal digit f could either forwarded external coprocessor used traps would throw exception handing control computer operating system fpu present system os would either call fpu emulator execute instruction equivalent using 68020 integer-based software code return error program terminate program crash require reboot 68881 eight 80-bit data registers 64-bit mantissa plus sign bit 15-bit signed exponent allowed seven different modes numeric representation including single-precision double-precision extended-precision defined ieee floating-point standard ieee 754 designed specifically floating-point math general-purpose cpu example instruction required address calculations main cpu would handle 68881 took control cpu/fpu pair designed could run time cpu encountered 68881 instruction would hand fpu operands needed instruction fpu would release cpu go execute next instruction 68882 improved version 68881 better pipelining eventually available higher clock speeds instruction set exactly 68881 motorola claimed marketing literature executed instructions 40 faster 68881 clock speed though reflect typical performance seen modest improvement table 68882 pin compatible 68881 used direct replacement systems important software incompatibility 68882 used larger fsave state frame affected unix preemptive multitasking oses modified allocate space 68881 68882 used sun microsystems sun-3 workstations ibm rt pc workstations apple computer macintosh ii family next computer sharp x68000 amiga 3000 atari mega ste tt falcon030 third-party amiga atari products used 68881 68882 memory-mapped peripheral 68000 statistics came comp.sys.m68k faq statistics listed 16 mhz 20 mhz 68882 though chips indeed produced starting motorola 68040 floating point support included cpu
[ 5097, 3346, 5100, 7327, 1075, 4479, 3688, 5469, 4768, 1454, 5652, 5037, 5571, 3708, 7905, 7990, 6111, 4702, 6200, 1386, 4967, 7654, 3387, 2133, 3390, 234, 2501, 2781, 1880, 2785, 6482, 5079, 5614, 2257, 7133, 3674, 263, 2353, 7226, 5622, ...
Test
7,134
3
Intel_Socket_G3:intel socket g3 socket g3 also known rpga 946b/947 fcpga 946 socket intel microprocessors supports haswell-based mobile cpus compatible skus 'm suffix model number socket g3 designed replacement socket g2 also known rpga 988b socket g3 holes make contact 946 947 pins processor pin grid array pga lynx point platform controller hub pch associated socket g3 socket rpga 947 one extra pin hole identical socket g3 last pin grid array socket intel mobile processors mobile processors microarchitectures succeding haswell exclusively available bga packaging
[ 2541, 4123, 4931, 3849, 1729, 2828, 6173, 7974, 2830, 3002, 4314, 5379, 3193, 1841, 1645, 3203, 4968, 3385, 4972, 5853, 2685, 6935, 8021, 7302, 5963, 866, 3333, 262, 6683, 2977, 5886 ]
Train
7,135
9
Ioke_(programming_language):ioke programming language ioke dynamic strongly typed prototype-based programming language targeting java virtual machine common language runtime designed ola bini developer jruby simple homoiconic syntax somewhat similar io ioke designed expressiveness else including performance designed important tool example language-oriented programming encourages creation domain-specific languages ioke first announced november 6 2008 ioke code contains documentation unit tests
[ 6507, 4543, 8137, 5878, 7113, 1102, 6428, 3879 ]
Train
7,136
2
Windows_Rally:windows rally windows rally set technologies microsoft intended simplify setup maintenance wired wireless network-connected devices aim increase reliability security connectivity users connect devices internet computers running microsoft windows technologies provide control network quality service qos diagnostics data sharing communications entertainment windows rally technologies provide provisioning following devices windows rally includes following set technologies link layer topology discovery lltd protocol enables applications discover devices determine network topology windows vista enables graphical view devices network network map windows xp computers appear network map lltd responder must downloaded installed devices provide audio video playback bandwidth sensitive implement qos extension part protocol receive prioritized streams changes available bandwidth less impact playback experience windows vista includes qwave pre-configured quality service api time dependent multimedia data audio video streams qwave uses different packet priority schemes real-time flows multimedia packets best-effort flows file downloads e-mails ensure real time data gets delayed little possible providing high quality channel data packets qwave-enabled applications together devices implement lltd qos extensions aim improve end user experience streaming video prioritizing traffic reducing effects network-related transient issues windows connect wcn name windows rally technologies aimed simpler wireless device configuration windows connect users running windows vista windows xp sp2 create network configuration settings transmit access point alternatively users also print configuration settings reference manually configuring device windows connect one following methods may used easier configuration devices profile web services dpws standard defines minimal set implementation constraints enable secure web service messaging discovery description eventing resource-constrained devices dpws describes set requirements enable device discovered clients describe available services clients dpws similar universal plug play upnp fully aligned web services technology supports standards device connectivity ws-discovery ws-eventing includes numerous extension points allowing integration device-provided services enterprise-wide application scenarios roaming devices work across internet windows vista web services devices wsdapi unmanaged code implementation devices profile web services dpws standard windows communication foundation wcf executes managed code offers enterprise-level services web services solutions windows xp windows vista support simple service discovery protocol ssdp ws-discovery extensible discovery support protocols windows vista includes function discovery api function discovery serves abstraction layer applications devices allowing applications discover devices referencing device function rather bus type nature connection function discovery api aims create applications enumerate system resources use devices specific type discover manage lists devices objects sorted functionality class whether local network connected function discovery supports extensible discovery provider model vendors also create custom provider expose resources function discovery pnp-x uses ssdp ws-discovery network communication protocols make network-connected devices discoverable connected directly computer bus universal serial bus usb pnp-x allows network-connected devices appear devices inside windows connected physically provides installation experience similar attaching bus-connected device device manufacturer implements pnp-x capabilities supplement either upnp web services devices wsd enabled devices result end users device relatively easy install traditional plug play devices universal plug play upnp ip-based protocol suite based preliminary versions web services protocols xml simple object access protocol soap upnp device dynamically join network obtain ip address convey capability discover presence capabilities devices network information set services particular device type provide captured xml device description document device hosts device description also lists properties device name icons associated device upnp adopted widely devices interact home network audio-video scenarios upnp supported windows windows xp windows vista windows vista upnp integrated pnp-x function discovery
[ 7149, 6420, 714, 378, 720, 1460, 2928, 7907, 5747, 7565, 2953, 6840, 422, 4017, 6504, 4022, 4026, 7607, 1526, 458, 3687, 4759, 2283, 5479, 7263, 5850, 4436, 150, 6933, 519, 3052, 4448, 3407, 1232, 2702, 7687, 1989, 4848, 4129, 8073, 698...
Test
7,137
3
Rent's_rule:rent rule rent rule pertains organization computing logic specifically relationship number external signal connections logic block i.e. number pins number logic gates logic block applied circuits ranging small digital circuits mainframe computers 1960s e. f. rent ibm employee found remarkable trend number pins terminals boundaries integrated circuit designs ibm number internal components g logic gates standard cells log–log plot datapoints straight line implying power-law relation formula_1 p constants p 1.0 generally 0.5 p 0.8 rent findings ibm-internal memoranda published ibm journal research development 2005 relation described 1971 landman russo performed hierarchical circuit partitioning way hierarchical level top-down least number interconnections cut partition circuit less equal parts partitioning step noted number terminals number components partition partitioned sub-partitions found power-law rule applied resulting versus g plot named rent rule rent rule empirical result based observations existing designs therefore less applicable analysis non-traditional circuit architectures however provides useful framework compare similar architectures christie stroobandt later derived rent rule theoretically homogeneous systems pointed amount optimization achieved placement reflected parameter formula_2 rent exponent also depends circuit topology particular values formula_3 correspond greater fraction short interconnects constant formula_4 rent rule viewed average number terminals required single logic block since formula_5 formula_6 random arrangement logic blocks typically formula_7 larger values impossible since maximal number terminals region containing g logic components homogeneous system given formula_8 lower bounds p depend interconnection topology since generally impossible make wires short lower bound formula_9 often called intrinsic rent exponent notion first introduced hagen et al used characterize optimal placements also measure interconnection complexity circuit higher intrinsic rent exponent values correspond higher topological complexity one extreme example formula_10 long chain logic blocks clique formula_7 realistic 2d circuits formula_9 ranges 0.5 highly-regular circuits sram 0.75 random logic system performance analysis tools bacpac typically use rent rule calculate expected wiring lengths wiring demands estimate rent exponent one use top-down partitioning used min-cut placement every partition count number terminals connected partition compare number logic blocks partition rent exponent found fitting datapoints log–log plot resulting exponent p optimally partitioned circuits formula_13 longer case practical heuristic partitioning approaches partitioning-based placement algorithms formula_14 landman russo found deviation rent rule near far end i.e. partitions large number blocks known region ii rent rule similar deviation also exists small partitions found stroobandt called region iii another ibm employee donath discovered rent rule used estimate average wirelength wirelength distribution vlsi chips motivated system level interconnect prediction workshop founded 1999 entire community working wirelength prediction see survey stroobandt resulting wirelength estimates improved significantly since used technology exploration use rent rule allows perform estimates priori i.e. actual placement thus predict properties future technologies clock frequencies number routing layers needed area power based limited information future circuits technologies comprehensive overview work based rent rule published stroobandt
[ 2036 ]
Test
7,138
0
Text_simplification:text simplification text simplification operation used natural language processing modify enhance classify otherwise process existing corpus human-readable text way grammar structure prose greatly simplified underlying meaning information remains text simplification important area research natural human languages ordinarily contain complex compound constructions easily processed automation terms reducing language diversity semantic compression employed limit simplify set words used given texts text simplification illustrated example siddharthan 2006 first sentence contains two relative clauses one conjoined verb phrase text simplification system aims simplify first sentence second sentence “ ability simplify means eliminate unnecessary necessary may speak ”
[ 3601, 1718, 1444, 4760, 8065, 715, 2648, 5304, 3292, 2215, 1751, 7372, 837, 4337, 3651, 4349, 4089, 5429, 5528, 5612, 5885, 5008 ]
Test
7,139
4
Defense_in_depth_(computing):defense depth computing defense depth also known castle approach information assurance ia concept multiple layers security controls defense placed throughout information technology system intent provide redundancy event security control fails vulnerability exploited cover aspects personnel procedural technical physical security duration system life cycle idea behind defense depth approach defend system particular attack using several independent methods layering tactic conceived national security agency nsa comprehensive approach information electronic security term defense depth computing inspired military strategy name quite different concept military strategy revolves around weaker perimeter defense intentionally yielding space buy time envelop ultimately counter-attack opponent whereas ia strategy simply involves parallel systems controls intentionally ceding ground cf honeypot defense depth divided three areas physical technical administrative physical controls anything physically limits prevents access systems fences guards dogs cctv systems like technical controls hardware software whose purpose protect systems resources examples technical controls would disk encryption fingerprint readers windows active directory hardware technical controls differ physical controls prevent access contents system physical systems administrative controls organization policies procedures purpose ensure proper guidance available regards security regulations met include things hiring practices data handling procedures security requirements usage non-standard ports valid means security using one following layers constitutes defense depth
[ 1631, 3680, 5813, 1461, 5568, 2566, 3794, 2310, 7120, 7300, 3495, 7865, 4014, 1805 ]
Test
7,140
4
Vault_Corporation:vault corporation vault corporation founded 1981 w. krag brotby unsung technology pioneer already successful real-estate entrepreneur brotby authored book software program called tax cash frustrated pirating software people making copies free without paying brotby came mechanism attempt defeat illegal copying called prolok disk us patent 4,785,361 technology influential many later copy-protection techniques original patent referenced 140 later patents prolok used many early 80 software companies including ashton-tate developers first massively successful pc database software vault also invested millions dollars legal front behalf software industry whole authoring testing first many controversial shrink wrap software law vault contract ultimately defeated 5th circuit federal appeals court
[]
Test
7,141
3
The_Return_of_Ishtar:return ishtar translating english resurrection ishtar action role-playing arcade game released namco 1986 runs namco system 86 hardware sequel tower druaga released two years earlier second game company babylonian castle saga series later ported msx nec pc-8801 fm7 sharp x68000 platforms also included namco museum volume 4 playstation return ishtar adventure game requires two players also first game namco password feature give players opportunity continue left first feature scoring system player 1 controls priestess ki fights magic player 2 controls sword-wielding prince gilgamesh sequel starts directly gilgamesh saved ki druaga focuses escape tower inhabitants gilgamesh ki avenge former master total 128 rooms sixty-floor tower screen scroll according ki location second player stay close partner traverse tower ki attacks casting spells enemies gilgamesh automatically draws sword whenever enemy gets close enough allowing attack enemy bumping blade similar adol ys games however colliding enemies also damage gilgamesh counter bottom-right screen decrease preset amount depending enemy type counter reaches 0 disappear game players also happen ki touched enemy also several different items found rooms collected aid gilgamesh ki quest easter egg game designer masanobu endō appears unconscious desk dead end room ki use blue crystal rod spell wake proceed warp gilgamesh calvary prison room reviewing namco museum volume 4 jeff gerstmann gamespot described return ishtar plain weird incredibly boring electronic gaming monthly shawn smith said genji heike clans pretty lame due difficult control games ... well fun
[ 1237, 4016 ]
Train
7,142
2
VS/9:vs/9 vs/9 discontinued computer operating system available univac series 90 mainframes 90/60 90/70 90/80 late 1960s 1980s 90/60 90/70 repackaged univac 9700 computers rca acquisition sperry determined rca tsos operating system far advanced univac counterpart company opted merge univac hardware rca software introduced 90/70 90/60 introduced shortly thereafter slower less expensive 90/70 introduction 90/80 vs/9 finally hardware platform optimized take full advantage capability allow interactive batch operations computer september 1971 rca decided exit mainframe computer business losing half billion dollars trying failing compete ibm assets computer division sold univac included rca spectra series computers various external hardware designs video terminals tape drives punched card readers operating system time sharing operating system tsos tsos may better operating system user standpoint ibm time operating systems considered something sold separately computer manufacturer included free part purchase price univac introduced additional new features tsos renamed vs/9 name 'tsos however remained username primary privileged system manager account unix-type systems called 'root rca also sold tsos would become fujitsu basis fujitsu bs2000 operating system mainframes name interactive use vs/9 done terminals connected terminal concentrator unit passed control signals terminals manner similar way ibm would provide ibm 3270-style terminals provided general input terminal sent response enter key opposed practice pcs taking input one character time concentrator unit originally known communications control module ccm however rca sold patents designs ccm terminal controller singer corporation univac developed emulator device ccm known multiterminal connection controller model 16 mcc-16 mcc-16 supported univac standard terminal rca renamed uniscope video display terminal vdt well ordinary ascii dumb terminals univac uniscope vdt provided sophisticated time editing capability including ability edit text screen make changes line time page time transmit text back computer vdt also supported direct cursor positioning input protection cursor indicated text cursor recognized also supported special scroll mode subset screen window instead entire screen scrolling upward last line displayed possible make scroll area bottom half screen feature split screen scroll would become available 20 years later apple ii microcomputer distinction made interactive timesharing terminals transactional terminals interactive terminals controlled directly operating system transactional terminals controlled batch program initially batch program known mcp multichannel communications program developed rca sperry batch-oriented operating systems tdos tape-disk operating system dos disk operating system became clear would phased favor much robust interactive operating system vmos mcp ported run vmos vmos virtual memory operating system became new moniker tsos rca spectra 70 models 46 61 3 7 computers initially univac series 70 formerly rca computers eventually mcp enhanced support sperry univac terminals name changed cos communication operating system ports ccm later mcc running emulation mode could designated either interactive transactional port designated interactive port controlled timesharing services integrated vmos vs/9 operating system transactional ports hand controlled cos. terminals connected ports became property respective controlling host software timesharing used program development allowing much faster program development traditional batch process state art time timesharing user task could execute programs create files request system resources needed made much possible operating system ability manage virtual memory temporarily save pages memory including executing programs disk drum use retrieve later needed virtual memory page size fixed 4096 bytes allowed many tasks running simultaneously would otherwise constrained limited expensive main memory space transactional users hand controlled single program view environment limited presented identified individual tasks ability run programs request system resources ccm mcc running emulation mode dumb hardware interfaces network protocol intelligence including terminal polling error recovery message construction resided mainframe ccm mcc simply acted conduits mainframe phone lines mcc used true front end processor much overhead polling error recovery offloaded mainframe thus freeing computer time running application programs occur vs/9 era vs/9 supported one card readers connected computer activated user placing card deck hopper pressing start button presumably computer would read source deck place cards read output hopper card deck consisted valid login would process card deck job execute vs/9 controlled computer operator central site computer operators interacted system system console initially console teletype device later upgraded video display device attached system console printer system console messages logged system console printer unsolicited messages originating operating system also logged system console printer computer operators number responsibilities one useful enhancements late life vs/9 volume groups disk technology time provided limited storage space disk since disk drives comparatively large quite expensive manufacturers disk drives provided capability physically remove actual disk device replace another customers thus ability store many times capacity disk drives albeit could necessarily used simultaneously unless enough free disk drives limited disk storage space also presented users another problem often files would larger could contained one disk volume groups helped mitigate technological problem allowing files span multiple disks volumes disks mounted simultaneously designated volume group owners could defined order limit access sensitive data mounted attached active task entire volume group could dismounted attached tasks either released terminated every disk available system part volume group even one volume group volume groups could designated removable fixed fixed volume groups could removed time necessary disks housed operating system files supported transactional terminals remote batch processing rbp capability existed vs/9 although never completely exploited probably due limited demand rbp allowed remote users submit batch jobs execution mainframe receive results back offsite printer typically remote batch device consisted card reader printer connected communication line interfaced remote batch services operating system like local batch job operators could receive requests tape disk mounts/dismounts program prompts responses questions vs/9 managed tasks task type task types could either executing programs queues pending tasks following task types used vs/9 mcp cos always type 2 tasks computer operator would see count number tasks within queue system console complete list task queues available interactive terminal administrator access via field-written program known stat200 program would scan task queues every seconds display rolling list tasks terminal screen interrupted terminated officially released product became de facto standard task monitoring vs/9 controlled access use account name user name account name 1 7 character identifier user name also 1 8 character identifier identifiers account names user names could letters numbers account name equivalent directory name unix-style user accounts note user name indicated person sharing account party using thus example account name s0103 two users whose name pat leslie account would complete identifier s0103 pat s0103 leslie files would stored directory s0103 thus could create files name note account name say pa5 user named pat identifier would pa5 pat would completely unrelated user named pat accounts could given restrictions requiring password use limits amount files amount usage time permitted usage allowing logons 5 p.m. 8 a.m. cpu limits user could also issue commands system interrupt program current session used certain amount wall-clock cpu time user terminal logged wanted start session would press red transmit key univac vdt use control-c ascii terminal vs/9 would issue following response followed slash case univac vdt prompt character looked like inverse color greater sign user would logon typing word 'logon followed identifier e.g account name comma user name password account would type comma followed password could 1 4 characters contained one spaces trailing spaces could omitted typed single quotes contained non-printable binary characters typed using letter x followed quote 8-character hexadecimal value password account s0103 password hexadecimal a0b0c0 space user leslie would logon system typing credentials incorrect either account name user name password incorrect would get message would given prompt logon credentials correct system manager owner account tsos posted system message would display time user would command mode standard prompt would appear could type various commands user would finish session typing logoff pressing transmit univac vdt control-c ascii terminal univac vdt terminal four function keys top vs/9 specifically recognized vs/9 accepted commands typing command options commands issued batch stream either cards batch file required preceded slash commands entered terminal require use slash commands included following one issued break running program break key ascii terminal f1 key univac vdt used load command instead exec one would break mode program suspended allow user command mode could issue commands well following file names could 56 characters length file could consist letters numbers dashes digits file name digits permissible file could two consecutive periods access file another account necessary user account make file public file public could accessed another user prefixing name file indicator file referenced another account dollar sign followed account name followed period file named account s0103 user account pa5 wanted access file account s0103 first file would marked public second would referenced account name name file user account pa5 wanted access file account s0103 file public would reference s0103.a note user account s0103 could reference file simply could reference fully qualified file name including dollar sign account name followed period name public files special account tsos could accessed using alone first character file unless file began name identical account number case explicit account reference tsos would required also tsos would called path name missing files referenced name found user account example file called s0103.xyzzy account tsos account system named s0103 user wanting access would access tsos.s0103.xyzzy tsos also default account file referenced exist locally example execute edt editor program one would issue command run program exec followed name file called edt user created file named edt could execute edt editor typing pressing transmit key reason created program name use system editor would type could explicitly type system account unisys discontinued sales 9000 series mainframes favor exec 8 series computers probably longer cost effective market mainframes shrank vs/9 effectively abandoned company
[ 1807, 4297, 4670, 5021, 13, 3271, 3276, 3626, 5041, 7546, 7550, 405, 1855, 4347, 65, 4733, 5783, 6853, 5088, 6500, 785, 2266, 788, 3682, 1522, 7605, 7611, 4759, 7242, 4397, 6892, 5116, 2300, 126, 6907, 4786, 4423, 6197, 4061, 1208, 1574...
Test
7,143
3
Multipath_I/O:multipath i/o computer storage multipath i/o fault-tolerance performance-enhancement technique defines one physical path cpu computer system mass-storage devices buses controllers switches bridge devices connecting example scsi hard disk drive may connect two scsi controllers computer disk may connect two fibre channel ports one controller port switch fail operating system route i/o remaining controller port switch transparently changes visible applications perhaps resulting increased latency multipath software layers leverage redundant paths provide performance-enhancing features including dynamic load balancing traffic shaping automatic path management dynamic reconfiguration
[ 7856, 6667, 1254, 5738, 890, 1237, 6892, 900, 5996 ]
Test
7,144
5
X.500:x.500 x.500 series computer networking standards covering electronic directory services x.500 series developed telecommunication standardization sector international telecommunications union itu-t itu-t formerly known consultative committee international telephony telegraphy ccitt x.500 approved first 1988 directory services developed support requirements x.400 electronic mail exchange name lookup international organization standardization iso partner developing standards incorporating open systems interconnection suite protocols iso/iec 9594 corresponding iso identification protocols defined x.500 include protocols used osi networking stack number alternatives dap developed allow internet clients access x.500 directory using tcp/ip networking stack well-known alternative dap lightweight directory access protocol ldap dap x.500 protocols use tcp/ip networking stack ldap remains popular directory access protocol primary concept x.500 single directory information tree dit hierarchical organization entries distributed across one servers called directory system agents dsa entry consists set attributes attribute one values entry unique distinguished name formed combining relative distinguished name rdn one attributes entry rdns superior entries root dit ldap implements similar data model x.500 description data model article ldap x.520 x.521 together provide definition set attributes object classes used representing people organizations entries dit one widely deployed white pages schema x.509 portion standard providing authentication framework also widely used outside x.500 directory protocols specifies standard format public-key certificates current use x.509v3 certificates outside directory structure loaded directly web browsers necessary e-commerce develop allowing secure web based ssl/tls communications require x.500 directory source digital certificates originally conceived x.500 1988 one contrast role x.500 x.509 understand relationship x.509 designed secure access method updating x.500 www web browsers became popular needed simple method encrypting connections transport layer web sites hence trusted root certificates supported certificate authorities pre loaded certificate storage areas personal computer device added security envisaged scheduled 2011-2014 implementation us national strategy trusted identities cyberspace two- three-year project protecting digital identities cyberspace www e-commerce implementation x.509v3 bypassed replace original iso standard authentication mechanism binding distinguished names x.500 directory packages certificates added removed end user software reviewed microsoft mozilla terms continued trustworthiness problem arise occurred diginotar browser security experts issue update mark certificate authority untrusted serious removal effectively ca internet trust x.500 offers way view organization claims specific root certificate outside provided bundle function 4 corner model trust adding another check determine root certificate compromised rules governing federal bridge policy revoking compromised certificates available www.idmanagement.gov contrast browser bundled approach x.500 ldap attribute cacertificate bound directory entry checked addition default pre-loaded bundle certificates end users typically never noticed unless ssl warning message appeared example web site using ssl typically dns site name www.foobar.com verified browser software using libraries would check see certificate signed one trusted root certificates given user therefore creating trust users reached correct web site via https however stronger checks also possible indicate domain name verified contrast x.500 certificate one attribute many entry entry could contain anything allowable specific directory schema thus x.500 store digital certificate one many attributes could potentially verify organization physical address contact telephone number email contact ca certs certificate authority certs loaded browser automatically case microsoft update mechanism new version updates browsers user given choices import delete develop individual trust relationship loaded certificate authorities determine browser behave ocsp revocation servers unreachable contrast directory model associates attribute cacertificate listed certificate authority thus browser verify ssl cert website means loaded group accepted certificates root certificates looked x.500 ldap directory via http/s imported list trusted certificate authorities bound distinguished name located subject fields certificate matches directory entry x.509v3 contain extensions depending community interest international domain names broad internet use rfc-5280 pkix describes profile fields may useful applications encrypted email end user relies authenticity certificate presented browser email simple way compare forged certificate presented perhaps triggers browser warning valid certificate without also given opportunity validate dn distinguished name designed looked x.500 dit certificate public considered unforgeable therefore distributed manner associated binding identity occurs directory binding links certificate identity claims using certificate example x.500 software runs federal bridge cross certificates enable trust certificate authorities simple homographic matching domain names resulted phishing attacks domain appear legitimate x.509v3 certificate bound valid organization distinguished name within directory simple check made regards authenticity certificate comparison presented browser present directory options exist check notaries see certificate recently seen therefore likely compromised cert likely trusted failing domain name slight mismatch initially fail browser subjected notary trust bypass browser warning valid organizational entry o=foobarwidgets also associated alphanumeric oid identity proofed ansi providing another layer assurance regarding binding certificate identity recent events 2011 indicated threat unknown actors nation states forged certificates done order create mitm attack political activists syria accessing facebook web would normally triggered browser warning would mitm certificate issued valid certificate authority already trusted browser software similar attacks used stuxnet allowed software impersonate trusted code point certificate transparency allow end user determine using simple procedure certificate fact valid checking default bundle certificates may enough therefore additional check desired suggestions certificate transparency also advanced different attack used comodo certificate authority resulted forged certificates directed high-profile communications websites necessitated emergency patch major browsers certificates actually issued trusted certificate authority therefore user would warning gone faked website contrast syria incident certificate crudely forged including substituting alto palo palo alto incorrect serial numbers projects designed exchange phi protected health information considered highly hipaa sensitive may obtain x.509v3 certs via cert dns resource record via ldap x.500 2008 directory issue authoritative bind detailed rfcs related accuracy dns information secured signing root using dnssec concept root name servers source major contention internet community dns largely resolved name space associated x.500 traditionally thought start national naming authority mirrors iso/itu approach global systems national representation thus different countries create unique x.500 services u.s. x.500 privatized 1998 u.s. government longer offered x.500 dns registration outside known government agencies x.500 pilot project development commercial space technology continues present major installations millions users within corporate data centers within u.s. government credentialing authors rfc 2693 concerning spki note original x.500 plan unlikely ever come fruition collections directory entries ... considered valuable even confidential owning lists likely released world form x.500 directory sub-tree x.500 idea distinguished name single globally unique name everyone could use referring entity also likely occur x.500 complex support desktops internet ldap created provide service 'for rest us
[ 6512, 6172, 5908, 3855, 7721, 3620, 1543, 6428, 644, 7732, 6015, 2214, 1650, 737, 743, 7998, 4884, 6208, 1114, 5948, 2140, 4351, 6564, 1774, 2057, 2872, 2877, 4901, 6049, 3916, 698, 1435, 7144, 3426 ]
Test
7,145
9
ObjectPAL:objectpal objectpal short object-oriented paradox application language programming language used borland paradox database application owned corel paradox 11th version constituent corel word perfect x3 office suite 32-bit microsoft windows language tightly-bound application forms provides rapid robust development environment creating database applications windows objectpal full free-standing object-oriented language belongs family languages inspired hypercard influences pal wherever functionality could kept smalltalk garnet ui language created brad myers objects encapsulate source code support polymorphism limited inheritance concept wedded objects form controlled code placed higher object form object hierarchy however objectpal provides wideranging versatile language creating paradox applications syntax structure language resembles visual basic knowing visual basic would help someone new objectpal sense programming skill would transferable objectpal objectpal successor pal paradox dos programming language advent paradox windows 1.0 1993 owned borland corporation objectpal born version 1.0 quickly succeeded version 4.5 year used web server scripting language combined corel web server control ocx implements server api similar cgi standalone console corel web server
[ 4759, 7618, 2054 ]
Test
7,146
3
Ys_II:_Ancient_Ys_Vanished_–_The_Final_Chapter:ys ii ancient ys vanished – final chapter later adapted anime ys ii castle heavens 1992 like predecessor ys ii ported various platforms following first release fm-7 x1 msx2 famicom released along predecessor part enhanced compilation ys ii turbografx-cd hudson soft 1989 many years version ys ii received official english release ms-dos remake called ys ii special developed mantra released exclusively south korean market 1994 mash-up ys ii anime ys ii castle heavens 1992 along large amount new content including secrets version game game success korea despite competition korean rpg astonishia story year years later third remake released microsoft windows-based pcs ys ii eternal later ys ii complete versions game also developed mobile phone platforms ys ii also remade 2008 nintendo ds english translation version released atlus north america along ds version ys single card legacy ys books ii 2009 japanese version released single game came 2008 ys ii picks immediately ys left adol christin transported floating island ys meets young woman named lilia takes adol home lance village begin quest unravel secrets ys finally rid esteria evil player controls adol battles way across land ys first game adol strength measured typical rpg fashion numerical statistics hp attack power defense power determine strength stats increased raising experience level battling also returning first game 'bump combat system player attacks enemies running enemy takes damage according adol stats enemy stats adol position enemy position new addition ys ii magic system adol acquire several different spells use throughout course play fire spell attack time spell stop enemies long active use magic consumes adol mp stat another major change combat game compared previous game bump combat system used bosses crashing two bosses game attempt damage result adol taking damage bosses must defeated fire spell soundtrack ys ii composed yuzo koshiro hideya nagata several music cds dedicated music ys ii released falcom include japanese game magazine famitsu gave famicom nes version score 27 40 famitsu gave pce-cd turbografx-cd version score 35 40
[ 6380, 4759 ]
Test
7,147
3
Xploder:xploder xploder brand game cheats multimedia devices games consoles similar action replay xploder products released dreamcast ps2 playstation psp xbox gamecube n64 game boy game boy advance pc others support ps3 xbox 360 nintendo wii started 2006-2007 xploder products often bundled accessories game consoles lexar memory sticks psp x-link cable ps2 v5 media centre version newer versions xbox 360 playstation 3 allow users download saved games internet utilizing xploder disc original playstation users found possible boot backup copied versions games
[ 6124 ]
Test
7,148
5
XMPP:xmpp extensible messaging presence protocol xmpp communication protocol message-oriented middleware based xml extensible markup language enables near-real-time exchange structured yet extensible data two network entities originally named jabber protocol developed homonym open-source community 1999 near real-time instant messaging im presence information contact list maintenance designed extensible protocol used also publish-subscribe systems signalling voip video file transfer gaming internet things iot applications smart grid social networking services unlike instant messaging protocols xmpp defined open standard uses open systems approach development application anyone may implement xmpp service interoperate organizations implementations xmpp open protocol implementations developed using software license many server client library implementations distributed free open-source software numerous freeware commercial software implementations also exist internet engineering task force ietf formed xmpp working group 2002 formalize core protocols ietf instant messaging presence technology xmpp working group produced four specifications rfc 3920 rfc 3921 rfc 3922 rfc 3923 approved proposed standards 2004 2011 rfc 3920 rfc 3921 superseded rfc 6120 rfc 6121 respectively rfc 6122 specifying xmpp address format 2015 rfc 6122 superseded rfc 7622 addition core protocols standardized ietf xmpp standards foundation formerly jabber software foundation active developing open xmpp extensions xmpp-based software deployed widely across internet 2003 used ten million people worldwide according xmpp standards foundation jeremie miller began working jabber technology 1998 released first version jabberd server january 4 1999 early jabber community focused open-source software mainly jabberd server major outcome proved development xmpp protocol early jabber protocol developed 1999 2000 formed basis xmpp published rfc 3920 rfc 3921 primary changes formalization ietf xmpp working group addition tls channel encryption sasl authentication note rfc 3920 rfc 3921 superseded rfc 6120 rfc 6121 published 2011 first im service based xmpp jabber.org operated continuously offered free accounts since 1999 1999 february 2006 service used jabberd server software time migrated ejabberd free software application servers january 2010 service migrated proprietary m-link server software produced isode ltd august 2005 google introduced google talk combination voip im system uses xmpp instant messaging base voice file transfer signaling protocol called jingle initial launch include server-to-server communications google enabled feature january 17 2006 google since added video functionality google talk also using jingle protocol signaling may 2013 google announced xmpp compatibility would dropped google talk server-to-server federation although would retain client-to-server support january 2008 aol introduced experimental xmpp support aol instant messenger aim service allowing aim users communicate using xmpp however march 2008 service discontinued may 2011 aol offers limited xmpp support september 2008 cisco systems acquired jabber inc. creators commercial product jabber xcp february 2010 social-networking site facebook opened chat feature third-party applications via xmpp functionality unavailable xmpp support dropped april 2014 similarly december 2011 microsoft released xmpp interface microsoft messenger service skype de facto successor also provides limited xmpp support however native xmpp implementations xmpp network uses client–server architecture clients talk directly one another model decentralized anyone run server design central authoritative server services aol instant messenger windows live messenger confusion often arises point public xmpp server run jabber.org large number users subscribe however anyone may run xmpp server domain every user network unique xmpp address called jid historical reasons xmpp addresses often called jabber ids jid structured like email address username domain name ip address server user resides separated sign username example.com since user may wish log multiple locations may specify resource resource identifies particular client belonging user example home work mobile may included jid appending slash followed name resource example full jid user mobile account could username example.com/mobile resource may specified numerical value called priority messages simply sent username example.com go client highest priority sent username example.com/mobile go mobile client highest priority one largest numerical value jids without username part also valid may used system messages control special features server resource remains optional jids well means route messages based logical endpoint identifier jid instead explicit ip address present opportunities use xmpp overlay network implementation top different underlay networks one original design goals early jabber open-source community enabling users connect multiple instant messaging systems especially non-xmpp systems single client application done entities called transports gateways instant messaging protocols also protocols sms email unlike multi-protocol clients xmpp provides access server level communicating via special gateway services running alongside xmpp server user register one gateways providing information needed log network communicate users network though xmpp users thus gateways function client proxies gateway authenticates user behalf non-xmpp service result client fully supports xmpp access network gateway without extra code client without need client direct access internet however client proxy model may violate terms service protocol used although terms service legally enforceable several countries also requires user send im username password third-party site operates transport may raise privacy security concerns another type gateway server-to-server gateway enables non-xmpp server deployment connect native xmpp servers using built interdomain federation features xmpp server-to-server gateways offered several enterprise im software products including xmpp provides general framework messaging across network offers multitude applications beyond traditional instant messaging im distribution presence data several service discovery protocols exist today zeroconf service location protocol xmpp provides solid base discovery services residing locally across network availability services via presence information specified xep-0030 disco building capability support discovery across local network domains xmpp well-suited cloud computing virtual machines networks firewalls would otherwise present obstacles alternative service discovery presence-based solutions cloud computing storage systems rely various forms communication multiple levels including messaging systems relay state also migration distribution larger objects storage virtual machines along authentication in-transit data protection xmpp applied variety levels may prove ideal extensible middleware message-oriented middleware mom protocol widely known ability exchange xml-based content natively become open platform exchange forms content including proprietary binary streams full motion video fmv content transport file-based content via example jingle series extensions majority applications nothing human communications i.e. im instead provide open means support machine-to-machine peer-to-peer communications across diverse set networks xmpp implemented large number clients servers code libraries implementations provided variety software licenses original native transport protocol xmpp transmission control protocol tcp using open-ended xml streams long-lived tcp connections alternative tcp transport xmpp community also developed http transport web clients well users behind restricted firewalls original specification xmpp could use http two ways polling binding polling method deprecated essentially implies messages stored server-side database fetched posted regularly xmpp client way http 'get 'post requests binding method implemented using bidirectional-streams synchronous http bosh allows servers push messages clients soon sent push model notification efficient polling many polls return new data client uses http firewalls allow clients fetch post messages without hindrances thus scenarios tcp port used xmpp blocked server listen normal http port traffic pass without problems various websites let people sign xmpp via browser furthermore open public servers listen standard http port 80 https port 443 ports hence allow connections behind firewalls however iana-registered port bosh actually 5280 80 several large public im services natively use xmpp including livejournal lj talk nimbuzz hipchat various hosting services dreamhost enable hosting customers choose xmpp services alongside traditional web email services specialized xmpp hosting services also exist form cloud domain owners need directly run xmpp servers including cisco webex connect chrome.pl flosoft.biz i-pobox.net hosted.im largest messaging providers use using various forms xmpp based protocols backend systems without necessarily exposing fact end users includes whatsapp google talk facebook chat deprecated facebook messaging system deployments built free-software erlang-based xmpp server called ejabberd xmpp also used deployments non-im services including smart grid systems demand response applications message-oriented middleware replacement sms provide text messaging many smartphone clients xmpp de facto standard private chat gaming related platforms origin raptr playstation discontinued xfire two notable exceptions steam xbox live use proprietary messaging protocols xmpp standards foundation xsf develops publishes extensions xmpp standards process centered xmpp extension protocols xeps previously known jabber enhancement proposals jeps following extensions especially wide use xmpp features federation across domains publish/subscribe authentication security even mobile endpoints used implement internet things several xmpp extensions part experimental implementation efficient xml interchange exi format sensor data provisioning control concentrators discovery efforts documented page xmpp wiki dedicated internet things xmpp iot mailing list ietf xmpp working group produced series request comments rfc documents important widely implemented specifications xmpp often regarded competitor simple based session initiation protocol sip standard protocol instant messaging presence notification xmpp extension multi-user chat seen competitor internet relay chat irc although irc far simpler far fewer features far widely used xmpp extensions publish-subscribe provide many features advanced message queuing protocol amqp xmpp standards foundation xsf formerly jabber software foundation active developing open xmpp extensions called xep however extensions also defined individual software project organization another example federation protocol apache wave based xmpp
[ 709, 4676, 2555, 4677, 7168, 7170, 2201, 4683, 20, 6432, 1462, 2566, 5039, 6446, 3971, 1105, 740, 2219, 3640, 4337, 4709, 3312, 57, 2961, 7214, 7217, 2255, 2612, 3337, 2261, 1900, 456, 3350, 6879, 7967, 2281, 6521, 106, 7975, 2284, 2644...
Test
7,149
2
Windows_Color_System:windows color system windows color system wcs platform color management first included windows vista aims achieve color consistency across various software hardware including cameras monitors printers scanners different devices interpret colors differently according software hardware configurations result must properly calibrated reproduce colors consistently across different devices wcs aims make process color calibration automatic transparent evolution icc profiles windows color system features color infrastructure translation engine cite core backed color processing pipeline supports bit-depths 32 bits per pixel multiple color channels three alternative color spaces high dynamic range coloring using technology named kyuanos developed canon color processing pipeline allows device developers add gamut mapping algorithm pipeline customize color response device new pipeline also supports floating point calculations minimize round-off errors inherent integer processing color pipeline finishes processing colors cite engine applies color translation according color profile specific device ensure output color matches expected wcs features explicit support lcd well crt monitors projectors printers imaging devices provides customized support wcs uses color profiles according ciecam02 defined using xml define color representation actually translates visible color icc v4 color profiles also supported windows photo gallery photo viewer support deprecated v2 standard show dark images used v4 profiles windows imaging component hd photo format xps print path xps documents support color management wcs superset image color management icm first included windows 2000 windows xp windows server 2003
[ 6420, 714, 720, 1460, 2928, 7907, 5747, 2953, 6840, 422, 4017, 6504, 4022, 4026, 7607, 1526, 3687, 2283, 5479, 7263, 5850, 150, 6933, 519, 3052, 4448, 3407, 1232, 2702, 7687, 1989, 4848, 4129, 8073, 2018, 8085, 6989, 6991, 8094, 4156, 9...
Validation
7,150
1
Encyclopedia_of_Triangle_Centers:encyclopedia triangle centers encyclopedia triangle centers etc online list thousands points centers associated geometry triangle maintained clark kimberling professor mathematics university evansville list identifies 32,784 triangle centers point list identified index number form x n —for example x 1 incenter information recorded point includes trilinear barycentric coordinates relation lines joining identified points links geometer sketchpad diagrams provided key points encyclopedia also includes glossary terms definitions point list assigned unique name cases particular name arises geometrical historical considerations name star used instead example 770th point list named point acamar first 10 points listed encyclopedia points entries encyclopedia include similar albeit shorter lists exist quadri-figures quadrilaterals systems four lines polygon geometry see external links
[]
Test
7,151
4
Data_loss_prevention_software:data loss prevention software data loss prevention software detects potential data breaches/data ex-filtration transmissions prevents monitoring detecting blocking sensitive data use endpoint actions motion network traffic rest data storage terms data loss data leak related often used interchangeably data loss incidents turn data leak incidents cases media containing sensitive information lost subsequently acquired unauthorized party however data leak possible without losing data originating side terms associated data leakage prevention information leak detection prevention ildp information leak prevention ilp content monitoring filtering cmf information protection control ipc extrusion prevention system eps opposed intrusion prevention system technological means employed dealing data leakage incidents divided categories standard security measures advanced/intelligent security measures access control encryption designated dlp systems standard security measures firewalls intrusion detection systems idss antivirus software commonly available products guard computers outsider insider attacks use firewall example prevents access outsiders internal network intrusion detection system detects intrusion attempts outsiders inside attacks averted antivirus scans detect trojan horses send confidential information use thin clients operate client-server architecture personal sensitive data stored client device advanced security measures employ machine learning temporal reasoning algorithms detecting abnormal access data e.g. databases information retrieval systems abnormal email exchange honeypots detecting authorized personnel malicious intentions activity-based verification e.g. recognition keystroke dynamics user activity monitoring detecting abnormal data access designated systems detect prevent unauthorized attempts copy send sensitive data intentionally unintentionally mainly personnel authorized access sensitive information order classify certain information sensitive use mechanisms exact data matching structured data fingerprinting statistical methods rule regular expression matching published lexicons conceptual definitions keywords network data motion technology typically installed network egress points near perimeter analyzes network traffic detect sensitive data sent violation information security policies multiple security control points may report activity analyzed central management server endpoint data use systems run internal end-user workstations servers like network-based systems endpoint-based technology address internal well external communications therefore used control information flow groups types users e.g 'chinese walls also control email instant messaging communications reach corporate archive blocked communication i.e. one never sent therefore subject retention rules identified subsequent legal discovery situation endpoint systems advantage monitor control access physical devices mobile devices data storage capabilities cases access information encrypted endpoint-based systems provide application controls block attempted transmissions confidential information provide immediate user feedback must installed every workstation network used mobile devices e.g. cell phones pdas practically installed example workstation internet café dlp includes techniques identifying confidential sensitive information sometimes confused discovery data identification process organizations use dlp technology determine look data classified either structured unstructured structured data resides fixed fields within file spreadsheet unstructured data refers free-form text media text documents pdf files video estimated 80 data unstructured 20 structured data classification divided content analysis focused structured data contextual analysis looks place origin application system generated data methods describing sensitive content abundant divided precise imprecise methods precise methods involve content registration trigger almost zero false positive incidents methods imprecise include keywords lexicons regular expressions extended regular expressions meta data tags bayesian analysis statistical analysis techniques machine learning behavior analytics hierarchical threat modeling predefined dlp templates etc strength analysis engine directly relates accuracy accuracy dlp identification important lowering/avoiding false positives negatives accuracy depend many variables may situational technological testing accuracy recommended ensure virtually zero false positives/negatives high false positive rates cause system considered dld dlp sometimes data distributor gives sensitive data one third parties sometime later data found unauthorized place e.g. web user laptop distributor must investigate source leak data rest specifically refers old archived information information great concern businesses government institutions simply longer data left unused storage likely might retrieved unauthorized individuals protecting data involves methods access control data encryption data retention policies data use refers data user currently interacting dlp systems protect data in-use may monitor flag unauthorized activities activities include screen-capture copy/paste print fax operations involving sensitive data intentional unintentional attempts transmit sensitive data communication channels data motion data traversing network endpoint
[ 2173, 6417, 6419, 7186, 2577, 5401, 6823, 3644, 74, 3680, 88, 4025, 7963, 6515, 5467, 2996, 5813, 3698, 1554, 3713, 496, 5848, 6920, 3727, 8018, 3047, 3071, 2354, 3426, 880, 1998, 2733, 210, 2789, 8133, 6682, 651, 1376, 2850, 1766, 7122...
Test
7,152
9
John_C._Reynolds:john c. reynolds john charles reynolds june 1 1935 – april 28 2013 american computer scientist john reynolds studied purdue university earned phd theoretical physics harvard university 1961 professor information science syracuse university 1970 1986 death professor computer science carnegie mellon university also held visiting positions aarhus university denmark university edinburgh imperial college london microsoft research cambridge queen mary university london uk reynolds main research interest area programming language design associated specification languages especially concerning formal semantics invented polymorphic lambda calculus system f formulated property semantic parametricity calculus independently discovered jean-yves girard wrote seminal paper definitional interpreters clarified early work continuations introduced technique defunctionalization applied category theory programming language semantics defined programming languages gedanken forsythe known use intersection types worked separation logic describe reason shared mutable data structures editor journals communications acm journal acm 2001 appointed fellow acm acm sigplan programming language achievement award 2003 lovelace medal british computer society 2010
[ 5915, 7791, 4573, 1348, 3895, 6750, 920, 8097, 1243, 5751, 2311 ]
Test
7,153
7
Computation_offloading:computation offloading computer science computation offloading transfer resource intensive computational tasks external platform cluster grid cloud offloading may necessary due hardware limitations devices limited computational power storage energy resource intensive tasks may searching virus scanning image processing artificial intelligence computational decision making etc offloading mainly used mobile cloud computing edge computing fog computing
[ 108, 4159, 2961 ]
Test
7,154
5
Qpopper:qpopper qpopper one oldest popular server implementations pop3 free open-source server distributed bsd style license common choice internet service providers schools corporations organizations included several linux unix distributions qpopper longer maintained final version 4.1.0 released 2011 qpopper distributed qualcomm source code parties offer pre-compiled pre-configured versions various platforms qpopper ran wide variety platforms including virtually unix linux distribution mac os x even windows cygwin qpopper generally recognized fast stable secure commonly used standard unix mbox format inboxes spools also supported homedir mail mbox linear format messages stored sequentially qpopper supports number optimizations improve speed scalability including cache file maintain mailbox state sessions several optional i/o techniques qpopper started popper around 1989 university california berkeley qualcomm took 1993 renamed qpopper qualcomm original goal promote availability correct modern servers eudora mail client use also provide platform newer extensions
[ 1950, 333, 3555, 6874, 46, 8034, 6908, 3135, 293 ]
Validation
7,155
4
Cyber_Storm_II:cyber storm ii cyber storm ii international cyber security exercise sponsored united states department homeland security 2008 week-long exercise centered washington dc concluded march 15
[ 580 ]
Validation
7,156
1
SQLAlchemy:sqlalchemy sqlalchemy open-source sql toolkit object-relational mapper orm python programming language released mit license sqlalchemy provides full suite well known enterprise-level persistence patterns designed efficient high-performing database access adapted simple pythonic domain language sqlalchemy philosophy relational databases behave less like object collections scale gets larger performance starts concern object collections behave less like tables rows abstraction designed reason adopted data mapper pattern similar hibernate java rather active record pattern used number object-relational mappers however optional plugins allow users develop using declarative syntax sqlalchemy first released february 2006 quickly become one widely used object-relational mapping tools python community alongside django orm following example represents n-to-1 relationship movies directors shown user-defined python classes create corresponding database tables instances relationships created either side relationship finally data queried—illustrating automatically-generated sql queries lazy eager loading creating two python classes according database tables dbms one insert director-movie relationship via either entity sqlalchemy issues following query dbms omitting aliases output setting codice_1 default instead sqlalchemy would first issue query get list movies needed lazy director query get name according director
[ 2180, 5965, 7920, 3915, 5571, 6081, 2660, 7848, 6594 ]
Test
7,157
9
Multi-user_BASIC:multi-user basic multi-user basic dialect basic language dec pdp-11 running rt-11 operating system one users supported separate address spaces sharing language interpreter syntax language similar identical basic-11 key language element support virtual files similar virtual arrays basic-plus limited array integers floatingpoint character strings length 1 2 4 8 16 32 64 could placed file accessed subscript file could actually opened re-opened different definition allowing integers characters floating point numbers stored file like basic-11 multi-user basic provided support lab equipment support character terminals la30 vt100 multi-user system support real-time data collection
[ 861, 5571 ]
Test
7,158
4
ThreatConnect:threatconnect threatconnect cyber-security firm based arlington virginia provide threat intelligence platform companies aggregate act upon threat intelligence firm founded 2011 cyber squared inc. adam vincent richard barger andrew pendergast leigh reichel renamed threatconnect series funding 4 million 2014 december 2015 obtained series b funding 16 million company gained attention linked anthem medical data breach chinese government-sponsored entities according cybercrime expert brian krebs threatconnect identified domains used group intentionally similar legitimate domains used anthem also linked guccifer 2.0 responsible 2016 democratic national committee email leak russian-backed cyberespionage group fancy bear cyberattacks attributed fancy bear include group investigating malaysia airlines 17 crash world anti-doping agency recently issued report state-sponsored doping
[ 1467, 124, 1805 ]
Train
7,159
2
Scanner_Access_Now_Easy:scanner access easy scanner access easy sane application programming interface api provides standardized access raster image scanner hardware flatbed scanner handheld scanner video- still-cameras frame grabbers etc. sane api public domain discussion development open everybody commonly used linux sane differs twain cleanly separated front ends user programs back ends scanner drivers whereas twain driver handles user interface well communications scanner hardware sane driver provides interface hardware describes number options drive scan options specify parameters resolution scan scan area colour model etc option name information type units range possible values e.g. enumerated list convention several well known options front ends supply using convenient gui interaction e.g. scan area options set dragging rectangular outline preview image options presented using gui elements appropriate type e.g. sliders drop-down lists etc one consequence separation network scanning easily implemented special handling either front ends back ends host scanner saned daemon runs handles network requests client machines net back end driver connects remote host fetch scanner options perform previews scans saned daemon acts front end locally simply passes requests data network connections local scanner similarly net back end passes requests data local front end remote host various types unsupervised batch scanning also possible minimum support needed back end driver many scanners support attachment document feeders allow large number sheets paper automatically scanned succession using sane api front end simply play back set options scan driving document feed scans load next sheet paper front end obtain set options user several user interfaces written combine sane easy user method controlling xsane graphical front end sane written oliver rauch available microsoft windows linux unix os/2 licensed gnu general public license gpl windows version allows windows computer access scanner attached unix os/2 mac os x network computer generally local windows computer complete sane-back-ends versions possibly work scanner models connected locally simple scan simplified gui using sane intended easier use better integrate gnome desktop xsane initially written ubuntu maintained robert ancell canonical ltd. linux simple scan first fielded part ubuntu 10.04 lucid lynx also used lubuntu xubuntu gscan2pdf interface scanning documents pdf gnome desktop uses sane communicate scanner available gpl includes common editing tools e.g. rotating cropping pages also able perform ocr using several optional ocr tools save searchable pdf pdf files downsampled upon saving swingsane cross-platform java front end sane written maintained roland quast available microsoft windows linux mac os x licensed apache 2.0 license source code project also adapted use existing swing application
[ 2810, 7959, 4759, 6883, 1267, 7263, 5571, 2026, 578, 2581, 2131, 753, 6211, 7669, 7581, 6489, 5523, 3152, 2260 ]
Validation
7,160
9
Orchidée:orchidée orchidée software developed ircam computer-aided orchestration tool matlab-based application communicates traditional computer-aided composition environments open sound control messages means effectively controlled programs like max/msp openmusic developed grégoire carpentier damien tardieu phds ircam help supervision composer yan maresz recent example use orchestral composition jonathan harvey speakings premiered 2008 speech analyzed computed provide orchestral combinations composer given input target sound orchidée creates musical score imitates sound using mixture traditional instruments searches within large instrument sample database combinations sounds perceptually match target application takes account complex combinatorial possibilities considering virtually infinite sets different sounds created orchestra also considers musical attributes instruments dynamics perceptual attributes brightness roughness example speakings mantra oh/ah/hum analyzed imputed orchidée turn generated different possibilities orchestration mantra developed throughout piece using possibilities musical works using orchidée
[ 1890, 5117 ]
Test
7,161
6
List_of_default_file_systems:list default file systems default file system used various operating systems
[ 3599, 4291, 2547, 4672, 6431, 3626, 2933, 5049, 405, 6117, 759, 1123, 6854, 5437, 5784, 7587, 4375, 6500, 444, 6505, 5457, 460, 1534, 7976, 3359, 4406, 821, 7258, 6902, 5130, 126, 6907, 1561, 836, 5843, 2313, 6558, 2683, 5859, 5865, 444...
Validation
7,162
2
List_of_input_methods_for_Unix_platforms:list input methods unix platforms intended non-exhaustive list input methods unix platforms input method means entering characters glyphs corresponding encoding character set see input method page information
[ 1904 ]
Test
7,163
3
Socket_AM1:socket am1 socket fs1b branded socket am1 socket designed amd launched april 2014 desktop socs value segment socket am1 intended class cpus contain integrated gpu chipset essentially forming complete soc implementation pins display pci express sata i/o interfaces directly socket amd first compatible cpus designated apus 4 socketable chips kabini family jaguar microarchitecture marketed athlon sempron names announced april 9 2014 brand names athlon sempron underlying microarchitectures jaguar puma products socs means chipset die apu motherboard amd mobile cpus available one 722-pin package socket fs1 sure whether notebook cpus compatible socket am1 vice versa mobile counterpart socket ft3 bga-769 least one board supported coreboot
[ 2539, 6599, 2541, 5895, 4931, 2997, 3362, 1735, 5377, 6351, 913, 7826, 4694, 2751, 6545, 6373, 5063, 6655, 6562, 7484, 3145, 4090, 866, 694, 5436, 1143 ]
Test
7,164
4
Cost-based_anti-spam_systems:cost-based anti-spam systems since spam occurs primarily cheap send proposed set solutions require senders pay cost order send spam making prohibitively expensive spammers gatekeeper would sell electronic stamps keep proceeds micropayment electronic money would paid sender recipient isp gatekeeper proof-of-work systems hashcash penny black require sender pay computational cost performing calculation receiver later verify verification must much faster performing calculation computation slows sender significantly impact receiver point slow machines send spam—often millions millions every user wants send email moderate number recipients suffers seconds delay sending millions emails would take unaffordable amount time approach suffers sender maintains computation farm zombies refinement stamp systems method requiring micropayment made form penalty imposed recipient considers email abusive addresses principal objection stamp systems popular free legitimate mailing list hosts would unable continue provide services pay postage every message sent 2004 bill gates announced microsoft working solution requiring so-called “ unknown senders ” i.e senders accepted list recipient post “ electronic equivalent ” stamp whose value would lost sender recipient disapproves email gates said microsoft favors solutions short-term would rely contingent payment solution solve spam problem longer run microsoft aol well yahoo recently introduced systems allow commercial senders avoid filters obtain paid pre-paid certificate certification lost sender recipients complain approach suffers user initially signs legitimate mailing list later decides want receive e-mail lazy users simply click spam button e-mail client rather going formal unsubscription process detailed bottom message end-user gets effect either way without realizing consequences list host may face however companies implementing penalty approach certifying withdrawing certification commercial senders learned account problem setting appropriate complaint thresholds intent sender-at-risk solutions impose significant cost sender recipient rejects message subsequent receiving email deter spam making economically prohibitive send unwanted email messages allowing legitimate emailers send messages little expense anti-spam activist daniel balsam attempts make spamming less profitable bringing lawsuits spammers approach financially sustainable activist questionable whether actually reduces spam either activist anyone else
[ 5733, 4734, 1321, 5722, 6102, 3017, 2482, 1649, 1036, 6092 ]
Test
7,165
4
CTERA_Networks:ctera networks ctera networks privately held enterprise software company headquartered new york israel company regional offices uk italy france spain germany australia ctera partnered companies including amazon web services hewlett packard enterprise ibm clients include deutsche telekom banco santander axa united states department defense october 2016 ibm became ctera reseller ibm cloud object storage integrated ctera enterprise file services platform deployed on-premises softlayer cloud hybrid on-premises/cloud setup ctera mentioned gartner 2016 magic quadrant data center backup recovery software ctera founded 2008 liran eshel zohar kaufman company raised 9 million series funding round january 2009 led benchmark capital march 2012 ctera raised 11 million funding round lead venrock included strategic investment cisco systems participation prior investor benchmark capital raised approximately 15 million july 2014 ctera raised 25 million series c funding round led bessemer venture partners participation benchmark capital cisco venrock september 2016 ctera announced additional 25 million funding round led bessemer venture partners participation cisco new investor vintage investment partners investment considered part earlier series c funding round consisted 25 million july 2014 2016 ctera raised 70 million funding gartner named ctera one five cool venders storage technologies 2013 gartner included ctera 2015 critical capabilities enterprise endpoint backup magic quadrant enterprise file synchronization sharing efss ctera included deloitte fast 500 list technology 2015 ctera mentioned gartner 2016 magic quadrant data center backup recovery software june 2016 ctera earned contract provide private cloud file sharing solution united states department defense part agreement ctera disa defense information systems agency co-developed mutual authentication technology using government-issued smart cards additional layers protection beyond standard enterprise integration microsoft active directory servers 2009 ctera released first cloud storage gateway c200 gateway combined speed local network storage off-site cloud storage backup technology 2010 ctera released c400 cloud storage gateway added features office server backup recovery collaboration capability multiple users working files stored cloud gateway 2011 c800 gateway released 24 tb raw local storage 2016 ctera announced virtual cloud storage gateway deployed vmware kvm servers enabled customers use existing hardware ctera released updates cloud storage gateway portfolio april 2016 focused efficiency storage capacity ctera released enterprise file sync share efss 2012 enabled users access share collaborate files location storing files either locally cloud also 2012 ctera launched mobile app made possible access files backups ios android devices december 2015 ctera announced cloud server data protection storage-as-a-service server data protection software enterprise cloudops cloud server data protection protects server data private virtual private cloud using backup agents windows linux environments object storage services cloud platforms amazon web services microsoft azure ibm cloud openstack-based clouds
[ 2988, 7613, 632, 1634, 3091, 6262, 4594, 6806, 3627, 5927, 2212, 4783, 5135, 2666, 1757, 3028, 7743, 7838, 842, 5064, 330, 4627, 2961, 1134, 7037, 2700, 1514, 5889 ]
Test
7,166
7
Networked_Help_Desk:networked help desk networked help desk open standard initiative provide common api sharing customer support tickets separate instances issue tracking bug tracking customer relationship management crm project management systems improve customer service reduce vendor lock-in initiative created zendesk june 2011 collaboration eight founding member organizations including atlassian new relic otrs pivotal tracker servicenow sugarcrm first integration zendesk atlassian issue tracking product jira announced 2011 atlassian summit august 2011 34 member companies joined initiative year launching 50 organizations joined within zendesk instances feature branded ticket sharing support tools generally built around common paradigm begins customer making request incident report create ticket ticket progress status updated annotations attachments annotations attachments may visible customer public visible analysts private customers notified progress made ticket complete people necessary complete ticket using separate support tools additional overhead introduced maintaining relevant information ticket tool notifying customer progress made group completing ticket example customer support issue caused software bug reported help desk using one system fix documented developers another analyzed customer relationship management tool keeping records system up-to-date notifying customer manually using swivel chair approach unnecessarily time-consuming error-prone information transferred correctly customer may re-explain problem time ticket transferred systems networked help desk api implemented possible several different applications related customer support experience synchronize data one uniquely identified shared ticket many applications domains implemented apis allow data imported exported modified network help desk provides common standard customer support information automatically synchronize several systems implemented two systems quickly share tickets configuration change understand interface communication two instances specific ticket occurs three steps invitation agreement sharing ticket data continued synchronization tickets standard allows full delegation analysts systems make public private comments synchronize status well partial delegation instance receiving ticket make private comments status changes synchronized tickets may shared multiple instances harvey kandola countersoft suggested would preferable single application consolidates tracking related functions rather using multiple tools connecting dots initiatives like networked help desk
[ 6029, 2451, 5983, 6428, 3383 ]
Test
7,167
2
Event_Driven_Executive:event driven executive event driven executive edx computer operating system originally developed ibm control research laboratory devices experiments included application programming language known edl hcf host communication facility ibm research division opened san jose research laboratory sjrl 1956 building 025 ibm plant site san jose california dr. henry m. gladney established first laboratory automation project 1968 ibm 1800 computer various instruments chemistry physics laboratories throughout sjrl linked 1800 control data acquisition processing note long time instrumentation came embedded chips microprocessors output sophisticated research instrument likely strip chart paper squiggly marks perhaps punched paper tape dr. gladney became manager research computing facility rcf research moved building 028 1970 established new department rcf laboratory automation group tasked transition new sensor-based computer ibm system/7 produced boca raton florida robert w. martin appointed first line manager group staff consisting ray aylsworth donald l. raimondi gerd hochweller post-doctoral fellow assignment germany system/7 much smaller machine 1800 intended co-located individual research labs along instruments would service multiple system/7s hosted large scale computing purposes ibm system/360 “ mainframe ” served sjrl whole system/7 somewhat unusual especially programmer perspective lack supporting software basic human input/output interface teletype keyboard printer along paper tape reader punch hard disc drive data storage along digital analog input/output process interrupt could used lab instrument interface data acquisition instrument control sort operating system high level programming facility basic assembler language program another way putting would say delivered user friendly users research scientists engineers i.e non-programming professionals clear start order provide successful system/7 based environment laboratory automation sjrl would necessary develop real-time sensor-based multitasking multiprogramming operating system associated application development facility provided appropriate high level application programming language requisite special features e.g sensor i/o also communication interface large scale host computer program development bidirectional data transfer data analysis result development operating system known laboratory automation basic supervisor system/7 labs/7 application development language labs/7 real-time multitasking multiprogramming operating system application development language needed provide timing process interrupt capability analog digital input output commands allow data acquisition control external laboratory instruments along basic computational functions direct access data storage host communications hierarchical environment addition programming language associated program preparation facility compiler also needed defined decided use syntactical model could processed system/360 macro assembler would obviate need writing compiler machine language instructions created interpret object code output assembler effect high level instruction set programming language hypothetical virtual real-time sensor-based computer labs/7 provided language interpreter implemented system/7 machine language mimicked today language emulated virtual machine another element labs/7 package general purpose utility programs today would probably called apps finally system/360 software package known host communication facility hcf developed provide bi-directional data transfer host system/360 multiple satellite system/7s together labs/7 provided environment 1 application program could written compiled host system/360 downloaded host system/7 scientist laboratory 3 invoked control laboratory apparatus/instrument/machine 4 acquire measurement results instrument 5 send data host computer 6 start program host analyze data 7 return display results analysis scientist laboratory course system/7 could operated completely standalone i.e non-hierarchical environment usage labs/7 increased sjrl ibm organizations trying implement applications system/7 became aware labs/7 tried found extremely useful among general product division ibm plant site san jose sjrl sister research labs yorktown ny zürich switzerland ibm federal systems division oswego ny ibm office products division lexington ky. word labs/7 spread “ field ” charged marketing system/7 ibm customers cooperative effort mounted involving program authors sjrl team ibm system engineers led fred schneider make software available customers installed user program iup iup thought “ ” software package available ibm without support warranties associated formal product software labs/7 iup relatively successful came rather late product lifetime system/7 1976 ibm announced ibm series/1 successor system/7 series/1 last line special purpose sensor-based computers produced ibm laboratory automation group sjrl acquired early model series/1 announcement time ported labs/7 series/1 labs/7 became edx/1 event driven executive course included embedded interpreter programming language appropriately named edl event driven language time ibm field support team expanded significant effort underway make software available ibm customers field developed program fdp fdp step ibm software hierarchy still caveat “ ” package minimal formal ibm support development powerful terminal control product known communications facility edx/cf sales edx especially focused distributed computing environment whereby series/1 used primarily terminal controller many cases attached system/370 host computer edx efficient system able support large number work stations installed base edx grew product support edx transferred ibm general systems division series/1 product division boca raton fl edx became fully supported ibm program product edx origin tool laboratory automation 1981 ibm announced series/1 edx-based application software package edx laboratory automation software developed sjrl iup product number 5798-rhb edx edl well accepted marketplace successful ibm software products application programs developed edl run edx e.g communication facility multiple terminal monitor u.s. marine corps recognized extensive usage series/1 edx 1984 edx edl ported ibm pc product known hummingbird ibm plant site san jose california implemented completely automated warehouse facility inventory system production parts complete robot fork lifts control one series/1 computer running edx system operation late 1999 one example major applications within ibm companies developed edx-based applications e.g utility packages developed legler recently september 2014 program announced business partners ibm datatrend allows running applications ported series/1 unix based systems 1980 martin raimondi received ibm corporate award work developing edx edl
[ 1522, 7331, 5571 ]
Test
7,168
5
SIP_URI_scheme:sip uri scheme sip uri scheme uniform resource identifier uri scheme session initiation protocol sip multimedia communications protocol sip address uri addresses specific telephone extension voice ip system number could private branch exchange e.164 telephone number dialled specific gateway scheme defined sip address written user domain.tld format similar fashion email address address like instructs sip client use naptr srv schemes look sip server associated dns name voip-provider.example.net connect server records found name associated ip address client directly contact sip server ip address port 5060 default using udp transport protocol ask server may gateway connected destination user 1-999-123-4567 gateway may require user register using sip placing call destination port provided part sip uri naptr/srv lookups used rather client directly connects specified host port sip address text much like e-mail address may contain non-numeric characters client may sip phone device numeric telephone-like keypad various schemes exist associate entirely numeric identifier publicly reachable sip address include inum initiative issues e.164-formatted numbers corresponding sip address number sip.inum.net sip broker-style services associate numeric *prefix sip domain name e164.org e164.arpa domain name servers convert numbers addresses one-by-one dns reverse-lookups sip addresses may used directly configuration files instance asterisk pbx installations specified web interface voice-over-ip gateway provider usually call forwarding destination address book entry systems allow speed dial user address book using vertical service code may allow short numeric code like *75xx translated pre-stored alphanumeric sip address theory owner sip-capable telephone handset could publish sip address could freely directly reached worldwide much way smtp e-mail recipients may contacted anywhere almost cost message sender anyone broadband connection could install softphone ekiga call sip addresses free practice various forms network abuse discouraging creation publication openly reachable sip addresses server logs looks like attempt call palestinian mobile telephone israel country code +972 randomly trying 9- common code outside line office pbx 011- overseas call prefix north american numbering plan 7- off-chance pbx using instead 9- outside line security tools firewalls fail2ban must therefore deployed prevent unauthorised outside call attempts many voip providers also disable overseas calls countries specifically requested enabled subscriber sips uri scheme adheres syntax sip uri differing scheme codice_1 rather codice_2 default internet port address sips 5061 unless explicitly specified uri sips allows resources specify reached securely mandates hop request forwarded target domain must secured tls last hop proxy target domain user agent secured according local policies sips protects attackers try listen signaling link provide real end-to-end security since encryption hop-by-hop every single intermediate proxy trusted
[ 7148, 2626, 2281, 7170, 20, 4415, 6908, 3383, 4607, 2043, 6381, 7214, 7494, 7765, 3827, 8039, 6240, 2261 ]
Test
7,169
7
Streaming_media:streaming media streaming media multimedia constantly received presented end-user delivered provider verb stream refers process delivering obtaining media manner term refers delivery method medium rather medium alternative file downloading process end-user obtains entire file content watching listening client end-user use media player start playing digital video digital audio content entire file transmitted distinguishing delivery method media distributed applies specifically telecommunications networks delivery systems either inherently streaming e.g radio television streaming apps inherently non-streaming e.g books video cassettes audio cds example 1930s elevator music among earliest popular music available streaming media nowadays internet television common form streamed media term streaming media apply media video audio live closed captioning ticker tape real-time text considered streaming text live streaming delivery internet content real-time much live television broadcasts content airwaves via television signal live internet streaming requires form source media e.g video camera audio interface screen capture software encoder digitize content media publisher content delivery network distribute deliver content live streaming need recorded origination point although frequently challenges streaming content internet user enough bandwidth internet connection may experience stops lags slow buffering content users may able stream certain content due compatible computer software systems popular streaming services include video sharing website youtube netflix amazon video vudu stream films television shows spotify apple music stream music video game live streaming sites twitch mixer early 1920s george o. squier granted patents system transmission distribution signals electrical lines technical basis later became muzak technology streaming continuous music commercial customers without use radio attempts display media computers date back earliest days computing mid-20th century however little progress made several decades primarily due high cost limited capabilities computer hardware late 1980s 1990s consumer-grade personal computers became powerful enough display various media primary technical issues related streaming enough cpu power bus bandwidth support required data rates creating low-latency interrupt paths operating system prevent buffer underrun enabling skip-free streaming content however computer networks still limited mid-1990s audio video media usually delivered non-streaming channels downloading digital file remote server saving local drive end user computer storing digital file playing back cd-roms 1991 first commercial ethernet switch see network switch introduced enabled powerful computer networks leading first streaming video solutions see business developments used schools corporations expanding bloomberg television worldwide mid 1990s world wide web established streaming audio would practical years later practical streaming media made possible advances data compression due impractically high bandwidth requirements uncompressed media raw digital audio encoded pulse-code modulation pcm requires bandwidth 1.4mbps uncompressed cd audio raw digital video requires bandwidth 168mbps sd video 1gbps fhd video important compression technique enabled practical streaming media discrete cosine transform dct form lossy compression conceived 1972 nasir ahmed developed algorithm t. natarajan k. r. rao university texas 1973 dct algorithm basis first practical video coding format h.261 1988 initially used online video conferencing followed dct-based video coding standards notably mpeg video formats 1991 onwards dct algorithm adapted modified discrete cosine transform mdct j. p. princen a. w. johnson b. bradley university surrey 1987 mdct algorithm fundamental mp3 audio format introduced 1994 especially widely used advanced audio coding aac format introduced 1999 late 1990s early 2000s users increased access computer networks especially internet early 2000s users access increased network bandwidth especially last mile technological improvements facilitated streaming audio video content computer users homes workplaces also increasing use standard protocols formats tcp/ip http html internet became increasingly commercialized led infusion investment sector band severe tire damage first group perform live internet june 24 1993 band playing gig xerox parc elsewhere building scientists discussing new technology mbone broadcasting internet using multicasting proof parc technology band performance broadcast could seen live australia elsewhere march 2017 interview band member russ haines stated band used approximately half total bandwidth internet stream performance 152-by-76 pixel video updated eight twelve times per second audio quality best bad telephone connection microsoft research developed microsoft tv application compiled ms windows studio suite tested conjunction connectix quickcam realnetworks also pioneer streaming media markets broadcast baseball game new york yankees seattle mariners internet 1995 first symphonic concert internet took place paramount theater seattle washington november 10 1995 concert collaboration seattle symphony various guest musicians slash guns n roses velvet revolver matt cameron soundgarden pearl jam barrett martin screaming trees word magazine launched 1995 featured first-ever streaming soundtracks internet metropolitan opera live hd program metropolitan opera streams opera performance live performance taking place 2013–2014 10 operas transmitted via satellite least 2,000 theaters 66 countries term streaming first used tape drives made data electronics inc. drives meant slowly ramp run entire track slow ramp times resulted lower drive costs making competitive product streaming applied early 1990s better description video demand later live video ip networks first done starlight networks video streaming real networks audio streaming time video usually referred store forward video misleading nomenclature first commercial streaming product appeared late 1992 named starworks starworks enabled demand mpeg-1 full motion videos randomly accessed corporate ethernet networks starworks starlight networks also pioneered live video streaming ethernet via internet protocol satellites hughes network systems early companies created streaming media technology include realnetworks known progressive networks protocomm prior wide spread world wide web usage web became popular late 90s streaming video internet blossomed startups vdonet acquired realnetworks precept acquired cisco microsoft developed media player known activemovie 1995 allowed streaming media included proprietary streaming format precursor streaming feature later windows media player 6.4 1999 june 1999 apple also introduced streaming media format quicktime 4 application later also widely adopted websites along realplayer windows media streaming formats competing formats websites required user download respective applications streaming resulted many users three applications computer general compatibility 2000 industryview.com launched world largest streaming video archive website help businesses promote webcasting became emerging tool business marketing advertising combined immersive nature television interactivity web ability collect data feedback potential customers caused technology gain momentum quickly around 2002 interest single unified streaming format widespread adoption adobe flash prompted development video streaming format flash format used flash-based players video hosting sites first popular video streaming site youtube founded steve chen chad hurley jawed karim 2005 initially used flash-based player played mpeg-4 avc video aac audio defaults html5 video increasing consumer demand live streaming prompted youtube implement new live streaming service users company currently also offers secured link returning available connection speed user recording industry association america riaa revealed 2015 earnings report streaming services responsible 34.3 percent year total music industry revenue growing 29 percent previous year becoming largest source income pulling around 2.4 billion us streaming revenue grew 57 percent 1.6 billion first half 2016 accounted almost half industry sales advances computer networking combined powerful home computers modern operating systems made streaming media practical affordable ordinary consumers stand-alone internet radio devices emerged offer listeners no-computer option listening audio streams audio streaming services become increasingly popular recent years streaming music hit record 118.1 billion streams 2013 general multimedia content large volume media storage transmission costs still significant offset somewhat media generally compressed storage streaming increasing consumer demand streaming high definition hd content led industry develop number technologies wirelesshd itu-t g.hn optimized streaming hd content without forcing user install new networking cables 1996 digital pioneer marc scarpa produced first large-scale online live broadcast history adam yauch-led tibetan freedom concert event would define format social change broadcasts scarpa continued pioneer streaming media world projects woodstock '99 townhall president clinton recently covered ca campaign tell friend get covered live streamed youtube media stream streamed either live demand live streams generally provided means called true streaming true streaming sends information straight computer device without saving file hard disk on-demand streaming provided means called progressive streaming progressive download progressive streaming saves file hard disk played location on-demand streams often saved hard disks servers extended amounts time live streams available one time e.g. football game streaming media increasingly coupled use social media example sites youtube encourage social interaction webcasts features live chat online surveys user posting comments online furthermore streaming media increasingly used social business e-learning due popularity streaming medias many developers introduced free hd movie streaming apps people use smaller devices tablets smartphones everyday purposes horowitz research state pay tv ott svod 2017 report said 70 percent viewing content streaming service 40 percent tv viewing done way twice number five years earlier millennials report said streamed 60 percent content one movie streaming industry largest impacts dvd industry effectively met demise mass popularization online content rise media streaming caused downfall many dvd rental companies blockbuster july 2015 new york times published article netflix dvd services stated netflix continuing dvd services 5.3 million subscribers significant drop previous year hand streaming services 65 million members march 2016 study assessing “ impact movie streaming traditional dvd movie rental ” found respondents purchase dvd movies nearly much anymore streaming taken market according study viewers find movie quality significantly different dvd online streaming issues respondents believed needed improvement movie streaming included functions fast forwarding rewinding well search functions article highlighted quality movie streaming industry would increase time advertising revenue continued soar yearly basis throughout industry providing incentive quality content production music streaming one popular ways consumers interact streaming media age digitization private consumption music transformed public good largely due one player market napster napster peer-to-peer p2p file sharing network users could upload download mp3 files freely broke music industry conventions launched early 1999 hull massachusetts platform developed shawn john fanning well sean parker interview 2009 shawn fanning explained napster “ something came result seeing sort unmet need passion people able find music particularly lot obscure stuff ’ something go record store purchase felt like problem worth solving. ” development disrupt music industry making songs previously required payment acquire freely accessible napster user demonstrated power p2p networks turning digital file public shareable good brief period time napster existed mp3 files fundamentally changed type good songs longer financially excludable barring access computer internet access rival meaning one person downloaded song diminish another user napster like providers public goods faced problem free riding every user benefits individual uploads mp3 file requirement mechanism forces users share music thus napster users incentivized let others upload music without sharing files structure revolutionized consumer ’ perception ownership digital goods made music freely replicable napster quickly garnered millions users growing faster business history peak existence napster boasted 80 million users globally site gained much traffic many college campuses block access napster created network congestion many students sharing music files advent napster sparked creation numerous p2p sites including limewire 2000 bittorrent 2001 pirate bay 2003 reign p2p networks short lived first fall napster 2001 numerous lawsuits filed napster various record labels subsidiaries universal music group sony music entertainment warner music group emi addition recording industry association america riaa also filed lawsuit napster grounds unauthorized distribution copyrighted material ultimately led napster shutting 2001 interview gary stiffelman represents eminem aerosmith tlc explained napster problem record labels loss revenue interview new york times stiffelman said “ ’ opponent artists ’ music included services ’ opponent revenue shared lawsuit records inc. v. napster inc. fundamentally changed way consumers interact music streaming argued october 2 2000 decided february 12 2001 court appeals ninth circuit ruled p2p file sharing service could held liable contributory vicarious infringement copyright serving landmark decision intellectual property law first issue court addressed “ fair use ” says otherwise infringing activities permissible long purposes “ criticism comment news reporting teaching ... scholarship research. ” judge beezer judge case noted napster claimed services fit “ three specific alleged fair uses sampling users make temporary copies work purchasing space-shifting users access sound recording napster system already audio cd format permissive distribution recordings new established artists. ” judge beezer found napster fit criteria instead enabling users repeatedly copy music would affect market value copyrighted good second claim plaintiffs napster actively contributing copyright infringement since knowledge widespread file sharing platform since napster took action reduce infringement financially benefited repeated use court ruled p2p site court found “ much eighty-seven percent files available napster may copyrighted seventy percent may owned administered plaintiffs. ” injunction ordered napster ended brief period music streaming public good non-rival non-excludable nature p2p networks success sharing mp3 ’ though met similar fate court ruling set precedent copyrighted digital content freely replicated shared unless given consent owner thereby strengthening property rights artists record labels alike although music streaming longer freely replicable public good streaming platforms spotify deezer apple music soundcloud prime music shifted music streaming club-type good platforms notably spotify give customers access freemium service enables use limited features exposure advertisements companies operate premium subscription model circumstances music streaming financially excludable requiring customers pay monthly fee access music library non-rival since one customer ’ use impair another ’ music streaming platforms grown rapidly popularity recent years spotify 207 million users january 1 2019 78 different countries apple music 60 million soundcloud 175 million platforms provide varying degrees accessibility apple music prime music offer services paid subscribers whereas spotify soundcloud offer freemium premium services napster owned rhapsody since 2011 resurfaced music streaming platform offering subscription based services 4.5 million users january 2017 music streaming providers proliferated competition pushed price subscriptions music piracy rates also fallen see chart right music industry ’ response music streaming initially negative along music piracy streaming services disrupted market contributed fall revenue 14.6 billion revenue 1999 6.3 billion 2009 u.s. cd ’ single-track downloads selling content freely available internet result record labels invested artists “ safe ” chart music became appealing producers bands unique sounds 2018 however music streaming revenue exceeded traditional revenue streams e.g record sales album sales downloads 2017 alone saw 41.1 increase streaming revenue alone 8.1 increase overall revenue streaming revenue one largest driving forces behind growth music industry interview jonathan dworkin senior vice president strategy business development universal said “ afraid perpetual change dynamism driving growth. ” broadband speed 2 mbit/s recommended streaming standard definition video without experiencing buffering skips especially live video example roku apple tv google tv sony tv blu-ray disc player 5 mbit/s recommended high definition content 9 mbit/s ultra-high definition content streaming media storage size calculated streaming bandwidth length media using following formula single user file requires storage size megabytes equal length seconds × bit rate bit/s 8 × 1024 × 1024 example one hour digital video encoded 300 kbit/s typical broadband video 2005 usually encoded 320 × 240 pixels window size 3,600 × 300,000 bit/s 8×1024×1024 requires around 128 mb storage file stored server on-demand streaming stream viewed 1,000 people time using unicast protocol requirement 300 kbit/s × 1,000 300,000 kbit/s 300 mbit/s bandwidth equivalent around 135 gb per hour using multicast protocol server sends single stream common users therefore stream would use 300 kbit/s serving bandwidth see information protocols calculation live streaming similar assuming seed encoder 500 kbit/s show lasts 3 hours 3,000 viewers calculation number mbs transferred encoder speed bit/s × number seconds × number viewers 8*1024*1024 results calculation follows number mbs transferred 500 x 1024 bit/s × 3 × 3,600 3 hours × 3,000 number viewers 8*1024*1024 1,977,539 mb audio stream compressed make file size smaller using audio coding format mp3 vorbis aac opus video stream compressed using video coding format make file size smaller video coding formats include h.264 hevc vp8 vp9 encoded audio video streams assembled container bitstream mp4 flv webm asf isma bitstream delivered streaming server streaming client e.g. computer user internet-connected laptop using transport protocol adobe rtmp rtp 2010s technologies apple hls microsoft smooth streaming adobe hds non-proprietary formats mpeg-dash emerged enable adaptive bitrate streaming http alternative using proprietary transport protocols often streaming transport protocol used send video event venue cloud transcoding service cdn uses http-based transport protocols distribute video individual homes users streaming client end user may interact streaming server using control protocol mms rtsp quality interaction servers users based workload streaming service users attempt access service quality affected unless enough bandwidth host using enough proxy networks designing network protocol support streaming media raises many problems datagram protocols user datagram protocol udp send media stream series small packets simple efficient however mechanism within protocol guarantee delivery receiving application detect loss corruption recover data using error correction techniques data lost stream may suffer dropout real-time streaming protocol rtsp real-time transport protocol rtp real-time transport control protocol rtcp specifically designed stream media networks rtsp runs variety transport protocols latter two built top udp another approach seems incorporate advantages using standard web protocol ability used streaming even live content adaptive bitrate streaming http adaptive bitrate streaming based http progressive download contrary previous approach files small compared streaming packets much like case using rtsp rtp reliable protocols transmission control protocol tcp guarantee correct delivery bit media stream however accomplish system timeouts retries makes complex implement also means data loss network media stream stalls protocol handlers detect loss retransmit missing data clients minimize effect buffering data display delay due buffering acceptable video demand scenarios users interactive applications video conferencing experience loss fidelity delay caused buffering exceeds 200 ms. unicast protocols send separate copy media stream server recipient unicast norm internet connections scale well many users want view television program concurrently multicast protocols developed reduce server/network loads resulting duplicate data streams occur many recipients receive unicast content streams independently protocols send single stream source group recipients depending network infrastructure type multicast transmission may may feasible one potential disadvantage multicasting loss video demand functionality continuous streaming radio television material usually precludes recipient ability control playback however problem mitigated elements caching servers digital set-top boxes buffered media players ip multicast provides means send single media stream group recipients computer network multicast protocol usually internet group management protocol used manage delivery multicast streams groups recipients lan one challenges deploying ip multicast routers firewalls lans must allow passage packets destined multicast groups organization serving content control network server recipients i.e. educational government corporate intranets routing protocols protocol independent multicast used deliver stream content multiple local area network segments mass delivery content multicast protocols need much less energy resources widespread introduction reliable multicast broadcast-like protocols preferential use wherever possible significant ecological economic challenge peer-to-peer p2p protocols arrange prerecorded streams sent computers prevents server network connections becoming bottleneck however raises technical performance security quality business issues useful – typical – applications streaming concept example long video lectures performed online internet advantage presentation lectures long although always interrupted repeated arbitrary places also new marketing concepts example berlin philharmonic orchestra sells internet live streams whole concerts instead several cds similar fixed media so-called digital concert hall using youtube trailing purposes online concerts also spread lot different places – cinemas – various places globe similar concept used metropolitan opera new york many successful startup ventures based business streaming media also livestream international space station media live streamed recorded certain media players vlc player use screen recorder live-streaming platforms twitch may also incorporate video demand system allows automatic recording live broadcasts watched later popular site youtube also recordings live broadcasts including television shows aired major networks streams potential recorded anyone access whether legally otherwise streaming copyrighted content involve making infringing copies works question recording distribution streamed content also issue many companies rely revenue based views attendance net greenhouse gas emissions streaming music estimated 200 350 million kilograms per year united states according 2019 study increase emissions pre-digital music period estimated 140 million kilograms 1977 136 million kilograms 1988 157 million 2000 several ways decrease ghgs associated streaming music including efforts make data centers carbon neutral converting electricity produced renewable sources individual level purchase physical cd may environmentally friendly played 27 times another option reducing energy use downloading music offline listening reduce need streaming distance spotify service built-in local cache reduce necessity repeating song streams
[ 7232, 979, 3168, 6967, 1159, 7880, 7063, 1536, 7619, 2379, 8174, 3855, 7170, 3857, 4495, 6531, 6621, 8085, 5386, 3704, 7176, 7261, 6440, 5571, 7637, 3871, 8099, 6025, 499, 4970, 2135, 3559, 6381, 2233, 6923, 3314, 6219, 5169, 3821, 2961, ...
Test
7,170
5
Session_Initiation_Protocol:session initiation protocol session initiation protocol sip signaling protocol used initiating maintaining terminating real-time sessions include voice video messaging applications sip used signaling controlling multimedia communication sessions applications internet telephony voice video calls private ip telephone systems instant messaging internet protocol ip networks well mobile phone calling lte volte protocol defines specific format messages exchanged sequence communications cooperation participants sip text-based protocol incorporating many elements hypertext transfer protocol http simple mail transfer protocol smtp call established sip may consist multiple media streams separate streams required applications text messaging exchange data payload sip message sip works conjunction several protocols specify carry session media commonly media type parameter negotiation media setup performed session description protocol sdp carried payload sip messages sip designed independent underlying transport layer protocol used user datagram protocol udp transmission control protocol tcp stream control transmission protocol sctp secure transmissions sip messages insecure network links protocol may encrypted transport layer security tls transmission media streams voice video sdp payload carried sip messages typically employs real-time transport protocol rtp secure real-time transport protocol srtp sip originally designed mark handley henning schulzrinne eve schooler jonathan rosenberg 1996 protocol standardized 1999 november 2000 sip accepted 3gpp signaling protocol permanent element ip multimedia subsystem ims architecture ip-based streaming multimedia services cellular networks june 2002 specification revised various extensions clarifications published since sip designed provide signaling call setup protocol ip-based communications supporting call processing functions features present public switched telephone network pstn vision supporting new multimedia applications extended video conferencing streaming media distribution instant messaging presence information file transfer internet fax online games sip distinguished proponents roots internet community rather telecommunications industry sip standardized primarily ietf protocols h.323 traditionally associated international telecommunication union itu sip involved signaling operations media communication session primarily used set terminate voice video calls sip used establish two-party unicast multiparty multicast sessions also allows modification existing calls modification involve changing addresses ports inviting participants adding deleting media streams sip also found applications messaging applications instant messaging event subscription notification sip works conjunction several protocols specify media format coding carry media call set call setup body sip message contains session description protocol sdp data unit specifies media format codec media communication protocol voice video media streams typically carried terminals using real-time transport protocol rtp secure real-time transport protocol srtp every resource sip network user agents call routers voicemail boxes identified uniform resource identifier uri syntax uri follows general standard syntax also used web services e-mail uri scheme used sip sip typical sip uri form nowiki sip username domainname /nowiki nowiki sip username hostport /nowiki domainname requires dns srv records locate servers sip domain hostport ip address fully qualified domain name host port secure transmission required scheme sips used sip employs design elements similar http request response transaction model transaction consists client request invokes particular method function server least one response sip reuses header fields encoding rules status codes http providing readable text-based format sip carried several transport layer protocols including transmission control protocol tcp user datagram protocol udp stream control transmission protocol sctp sip clients typically use tcp udp port numbers 5060 5061 sip traffic servers endpoints port 5060 commonly used non-encrypted signaling traffic whereas port 5061 typically used traffic encrypted transport layer security tls sip-based telephony networks often implement call processing features signaling system 7 ss7 special sip protocol extensions exist although two protocols different ss7 centralized protocol characterized complex central network architecture dumb endpoints traditional telephone handsets sip client-server protocol equipotent peers sip features implemented communicating endpoints traditional ss7 architecture use switching centers network elements use session initiation protocol communication called sip user agents user agent ua performs function user agent client uac requesting service function user agent server uas responding request thus two sip endpoints may principle operate without intervening sip infrastructure however network operational reasons provisioning public services users directory services sip defines several specific types network server elements service elements also communicates within client-server model implemented user agent clients servers user agent logical network end-point sends receives sip messages manages sip sessions user agents client server components user agent client uac sends sip requests user agent server uas receives requests returns sip response unlike network protocols fix roles client server e.g. http web browser acts client never server sip requires peers implement roles roles uac uas last duration sip transaction sip phone ip phone implements client server functions sip user agent provides traditional call functions telephone dial answer reject call hold call transfer sip phones may implemented hardware device softphone vendors increasingly implement sip standard telephony platform distinction hardware-based software-based sip phones blurred sip elements implemented basic firmware functions many ip-capable communications devices smartphones sip http user agent may identify using message header field user-agent containing text description software hardware product name user agent field sent request messages means receiving sip server evaluate information perform device-specific configuration feature activation operators sip network elements sometimes store information customer account portals useful diagnosing sip compatibility problems display service status proxy server network server uac uas components functions intermediary entity purpose performing requests behalf network elements proxy server primarily plays role routing meaning job ensure request sent another entity closer targeted user proxies also useful enforcing policy determining whether user allowed make call proxy interprets necessary rewrites specific parts request message forwarding sip proxy servers route messages one destination called forking proxies forking sip requests means multiple dialogs established single request explains need two-sided dialog identifier without contribution recipients originator could disambiguate multiple dialogs established single request sip forking refers process forking single sip call multiple sip endpoints powerful feature sip single call ring many endpoints time sip forking allows desk phone ring time mobile allowing call taken either device redirect server user agent server generates 3xx redirection responses requests receives directing client contact alternate set uris redirect server allows proxy servers direct sip session invitations external domains registrar sip endpoint provides location service accepts register requests recording address parameters user agent subsequent requests provides essential means locate possible communication peers network location service links one ip addresses sip uri registering agent multiple user agents may register uri result registered user agents receive calls uri sip registrars logical elements often co-located sip proxies improve network scalability location services may instead located redirect server session border controllers serve middle boxes user agents sip servers various types functions including network topology hiding assistance nat traversal gateways used interconnect sip network networks public switched telephone network use different protocols technologies sip text-based protocol syntax similar http two different types sip messages requests responses first line request method defining nature request request-uri indicating request sent first line response response code requests initiate functionality protocol sent user agent client server answered one sip responses return result code transaction generally indicate success failure state transaction responses sent user agent server indicating result received request several classes responses recognized determined numerical range result codes sip defines transaction mechanism control exchanges participants deliver messages reliably transaction state session controlled various timers client transactions send requests server transactions respond requests one responses responses may include provisional responses response code form 1xx one multiple final responses 2xx – 6xx transactions categorized either type invite type non-invite invite transactions differ establish long-running conversation referred dialog sip include acknowledgment ack non-failing final response e.g. 200 ok session initiation protocol instant messaging presence leveraging extensions simple sip-based suite standards instant messaging presence information message session relay protocol msrp allows instant message sessions file transfer sip developer community meets regularly conferences organized sip forum test interoperability sip implementations ttcn-3 test specification language developed task force etsi stf 196 used specifying conformance tests sip implementations developing sip software deploying new sip infrastructure important test capability servers ip networks handle certain call load number concurrent calls number calls per second sip performance tester software used simulate sip rtp traffic see server ip network stable call load software measures performance indicators like answer delay answer/seizure ratio rtp jitter packet loss round-trip delay time sip connection marketing term voice internet protocol voip services offered many internet telephony service providers itsps service provides routing telephone calls client private branch exchange pbx telephone system public switched telephone network pstn services may simplify corporate information system infrastructure sharing internet access voice data removing cost basic rate interface bri primary rate interface pri telephone circuits sip trunking similar marketing term preferred service used simplify telecom infrastructure sharing carrier access circuit voice data internet traffic removing need primary rate interface pri circuits sip-enabled video surveillance cameras initiate calls alert operator events motion objects protected area sip used audio ip broadcasting applications provides interoperable means audio interfaces different manufacturers make connections one another u.s. national institute standards technology nist advanced networking technologies division provides public-domain java implementation serves reference implementation standard implementation work proxy server user agent scenarios used numerous commercial research projects supports full number extension rfcs including event notification reliable provisional responses numerous commercial open-source sip implementations exist see list sip software sip-i session initiation protocol encapsulated isup protocol used create modify terminate communication sessions based isup using sip ip networks services using sip-i include voice video telephony fax data sip-i sip-t two protocols similar features notably allow isup messages transported sip networks preserves detail available isup header important many country-specific variants isup implemented last 30 years always possible express detail using native sip message sip-i defined itu-t whereas sip-t defined via ietf rfc route concerns security calls via public internet addressed encryption sip protocol secure transmission uri scheme sips used mandate hop request forwarded target domain must secured transport layer security tls last hop proxy target domain user agent secured according local policies tls protects attackers try listen signaling link provide end-to-end security prevent espionage law enforcement interception encryption hop-by-hop every single intermediate proxy trusted end-to-end security may also achieved secure tunneling ipsec service providers offer secure connections use tls securing signaling tls connections use uris form nowiki sips user example.com /nowiki media streams separate connections signaling stream may encrypted secure real-time transport protocol srtp key exchange srtp performed sdes zrtp one may also add mikey exchange sip determine session keys use srtp
[ 5361, 7148, 709, 8, 371, 1453, 4676, 2555, 3952, 4677, 7168, 7169, 2201, 4316, 4683, 6432, 1462, 5039, 6446, 740, 2219, 3640, 4337, 4709, 7916, 6465, 3312, 3657, 5775, 7214, 430, 1503, 7217, 7220, 2612, 3337, 1900, 4383, 5453, 6871, 456...
Validation
7,171
3
Enterprise_Storage_OS:enterprise storage os enterprise storage os also known esos linux distribution serves block-level storage server storage area network san esos composed open-source software projects required linux distribution several proprietary build install time options scst project core component esos provides back-end storage functionality esos niche linux distribution esos intended run usb flash drive type removable media secure digital compactflash etc esos memory resident operating system boot tmpfs file system initialized root file system usb flash drive image copied onto file system configuration files logs periodically written usb flash drive persistent storage user intervention configuration changes occur esos utilizes text-based user interface tui system management network configuration storage provisioning functions tui used esos written c ncurses cdk libraries used esos supports connectivity several different front-end storage area network technologies core functions supported scst third-party target drivers vendors developed scst open-source software projects commodity computing server hardware used back-end side provide underlying storage utilized front-end target interfaces esos differs popular linux distributions bootable iso image provided esos consists one archive file extracted local computer running supported operating system linux windows mac os x local computer used installing esos image usb flash drive removable media device users esos extract archive execute esos install script esos installer script prompts user installation target device writes image allow users integrate proprietary cli raid controller utilities esos usb flash drive january 16 2019 commit bfb8c55 license esos project changed gnu general public license gpl apache license version 2.0
[ 5518, 6117, 3764, 7242, 5571, 174, 1435, 2536, 7051 ]
Validation
7,172
3
DOS/V:dos/v dos/v japanese computing initiative starting 1990 allow dos ibm pc compatibles vga cards handle double-byte dbcs japanese text via software alone developed ibm ps/55 machines localized version ps/2 kanji fonts locale information stored hard disk rather special chips preceding ax architecture ax great value japanese computing industry allowing compatibility foreign software possible nec proprietary pc-98 system market leader dos/v emerged dos/v stands disk operating system/vga version 5 dos/v came approximately time dos 5 promotion dos/v done ibm consortium called pc open architecture developers group oadg digital research released japanese dos/v compatible version dr dos 6.0 1992 early 1980s ibm japan released two x86-based personal computer lines asian-pacific region ibm 5550 ibm jx 5550 read kanji fonts disk drew text graphic characters 1024×768 high resolution monitor jx extended ibm pcjr ibm pc architecture supported english japanese version pc dos 720×512 resolution monitor machines could n't break dominant nec pc-98 consumer market japan 5550 expensive mostly sold large enterprises used ibm mainframes jx used 8088 processor instead faster 8086 processor ibm thought consumer product jx must n't surpass business-class 5550 damaged buyer reputations whatever actual speed another point software company said ibm uncooperative developing jx softwares ibm japan planned 100 pc/xt compatible machine codenamed jx2 cancelled 1986 masahiko hatori developer jx dos 1987 started developing dos/v spare time ibm yamato development laboratory era toshiba released japanese version t3100 laptop microsoft introduced ax architecture months later ibm japan released ps/55 model 5535 proprietary laptop using special version dos hatori thought ibm need shift proprietary pc ibm pc compatibles bosses tsutomu maruyama nobuo mii thought japan closed pc market needed changed attempt could n't done ibm alone summer 1989 decided carry development dos/v disclose architecture ps/55 found pc open architecture developers group oadg dos/v development team designed dos/v simple better scalability compatibility original pc dos difficulty reducing text drawing time stopwatch necessity dos/v development hatori said first version dos/v introduced 11 october 1990 shipped november 1990 announcement letter said designed low-end desktops laptops ps/55 users reported bbs could run dos/v ibm pc clones development team confirmed comments modified incompatibilities dos/v secret inside company would prevent sales ps/55 meet opposition hatori said maruyama mii convince ibm branches agree plan beginning december 1990 maruyama went ibm management committee presented plan low-end pc strategy japan committee usual topic took 15 minutes topic took hour plan finally approved john akers committee microsoft japan got contract ibm japan receive source code dos/v 20 december 1990 ibm japan announced founded oadg microsoft would supply dos/v pc manufacturers 1992 1994 japanese manufacturers begun selling ibm pc clones dos/v global manufacturers entered japanese market compaq 1992 dell 1993 fujitsu released ibm pc clones fmv series october 1993 200,000 units shipped 1994 microsoft japan released first retail versions windows windows 3.1 dos/v pc-98 dos/v contributed dawn ibm pc clones japan yet pc-98 kept 50 market share 1996 changed release windows 95 pc dos versions dos/v j japanese p chinese prc taiwanese h korean ms-dos versions dos/v dr dos versions dos/v
[ 1522, 972, 4291, 4751, 7605, 4759, 786, 6256, 6705, 8173, 5648, 5822, 8087, 5571, 126, 4421, 5232, 402, 224, 7509, 839, 4428, 1994, 6294, 1668, 4524, 6380, 7663, 3039, 336, 3907, 2786, 607, 2431, 3664, 5872, 6849, 6399, 4277, 352, 3751,...
Test
7,173
5
Session_Announcement_Protocol:session announcement protocol session announcement protocol sap experimental protocol broadcasting multicast session information sap published ietf rfc 2974 sap typically uses session description protocol sdp format real-time transport protocol session descriptions announcement data sent using ip multicast user datagram protocol sap senders periodically broadcast sdp descriptions well-known multicast address port sap listening application listen sap multicasts construct guide advertised multicast sessions announcement interval cooperatively modulated sap announcements multicast delivery scope default consume 4000 bits per second regardless maximum announce interval 300 seconds 5 minutes announcements automatically expire 10 times announcement interval one hour whichever greater announcements may also explicitly withdrawn original issuer sap features separate methods authenticating encrypting announcements use encryption recommended authentication prevents unauthorized modification dos attacks authentication optional two authentication schemes supported message body may optionally compressed using zlib format defined rfc 1950 vlc media player monitors sap announcements presents user list available streams. /ref sap one optional discovery connection management techniques described aes67 audio-over-ethernet interoperability standard
[ 979, 6871, 1543, 2566, 5492, 3794, 5847, 7916, 5773, 4101, 3597, 1709 ]
Test
7,174
4
Boxbe:boxbe boxbe free service prioritizes screens spam personal email users select email want receive email goes spam presents challenge sender requires human response bulk anonymous data provided parent company provides email validation tracking service boxbe starts user allowing boxbe access user email contacts boxbe gives priority contacts users allow integration within gmail including google apps aol yahoo mail affiliates lets boxbe stay date screen email one way boxbe promotes service sending email addresses member guest list boxbe founded 2005 thede loder corbett barr venture capital firm draper fisher jurvetson esther dyson investors dyson steve jurvetson serving board members way filter spam beyond challenge response boxbe initially used option allowing recipients define price senders must risk deliver initial message paying fee deliver email called attention bond mechanism later abandoned boxbe company founder thede loder along marshall van alstyne rick wash wrote initial paper attention bond mechanism technically capable users assemble many functions whitelisting 2012 edatasource inc. purchased assets boxbe inc
[ 5733, 4734, 1321, 5722, 6102, 1036 ]
Validation
7,175
4
SMBRelay:smbrelay smbrelay smbrelay2 computer programs used carry smb man-in-the-middle mitm attacks windows machines written sir dystic cult dead cow cdc released march 21 2001 lantacon convention atlanta georgia seven years release microsoft released patch fixed hole exploited smbrelay fix fixes vulnerability smb reflected back client forwarded another host vulnerability still exploited smbrelay receives connection udp port 139 relays packets client server connecting windows machine originating computer port 139 modifies packets necessary connecting authenticating target client disconnected smbrelay binds port 139 new ip address relay address connected directly using net use \\192.1.1.1 used networking functions built windows program relays smb traffic excluding negotiation authentication long target host remains connected user disconnect reconnect virtual ip smbrelay collects ntlm password hashes writes hashes.txt format usable l0phtcrack cracking later time port 139 privileged port requires administrator access use smbrelay must run administrator access account however since port 139 needed netbios sessions difficult block according sir dystic problem marketing standpoint microsoft wants products much backward compatibility possible continuing use protocols known issues continue leave customers risk exploitation ... yet known issues existed since day one protocol bug fundamental design flaw assume nobody used method exploit people silly took less two weeks write smbrelay smbrelay2 works netbios level across protocol netbios bound nbf nbt differs smbrelay uses netbios names rather ip addresses smbrelay2 also supports man-in-the-middling third host however supports listening one name time
[ 819, 4759, 7427, 3592, 1404, 6157, 6411, 3426 ]
Test
7,176
2
DirectX_Media:directx media directx media set multimedia-related apis microsoft windows complementing directx included directanimation 2d/3d web animation directshow multimedia playback streaming media directx transform web interactivity direct3d retained mode higher level 3d graphics directshow additionally contained directx plugins audio signal processing directx video acceleration accelerated video playback directx media runtime components distributed part internet explorer directx media sdk directx sdk existed two separate sdks directx 6.0 later microsoft deprecated directx media integrated directshow key part directx media directx april 2005 directshow removed directx moved microsoft platform sdk instead directx however still required build directshow samples directshow components gradually deprecated favor newer media foundation retained mode used variety applications still implemented systems newer xp copying d3drm.dll file older version windows system32 directory 32 bit windows syswow64 directory 64 bit windows regain system-wide support
[ 4026, 6696, 4759, 4848, 555, 7169, 5378, 8183, 6991, 7734, 7907, 6381, 2420, 7850, 1970, 422, 3052, 1232, 6495, 2085 ]
Test
7,177
4
Network_behavior_anomaly_detection:network behavior anomaly detection network behavior anomaly detection nbad provides one approach network security threat detection complementary technology systems detect security threats based packet signatures nbad continuous monitoring network unusual events trends nbad integral part network behavior analysis nba offers security addition provided traditional anti-threat applications firewalls intrusion detection systems antivirus software spyware-detection software security monitoring systems utilize signature-based approach detect threats generally monitor packets network look patterns packets match database signatures representing pre-identified known security threats nbad-based systems particularly helpful detecting security threat vectors 2 instances signature-based systems new zero-day attacks ii threat traffic encrypted command control channel certain botnets nbad program tracks critical network characteristics real time generates alarm strange event trend detected could indicate presence threat large-scale examples characteristics include traffic volume bandwidth use protocol use nbad solutions also monitor behavior individual network subscribers order nbad optimally effective baseline normal network user behavior must established period time certain parameters defined normal departure one flagged anomalous nbad used addition conventional firewalls applications detection malware vendors begun recognize fact including nba/nbad programs integral parts network security packages nbad technology/techniques applied number network security monitoring domains including log analysis ii packet inspection systems iii flow monitoring systems iv route analytics
[ 496, 2434, 651, 7637, 4783, 5181, 1634, 557 ]
Test
7,178
3
Computational_RAM:computational ram computational ram c-ram random-access memory processing elements integrated chip enables c-ram used simd computer also used efficiently use memory bandwidth within memory chip influential implementations computational ram came berkeley iram project vector iram v-iram combines dram vector processor integrated chip reconfigurable architecture dram radram dram reconfigurable computing fpga logic elements integrated chip simplescalar simulations show radram system conventional processor give orders magnitude better performance problems traditional dram system processor embarrassingly parallel computational problems already limited von neumann bottleneck cpu dram researchers expect total cost machine built computational ram run orders magnitude faster traditional general-purpose computer kinds problems 2011 dram process layers optimized high capacitance cpu process optimized high frequency typically twice many beol layers dram since additional layer reduces yield increases manufacturing cost chips relatively expensive per square millimeter compared dram distinct enough three approaches computational ram cpus designed built dram process technology rather cpu logic process technology specifically optimized cpus include berkeley iram project tomi technology dsp1 memory bus off-chip memory many times capacitance on-chip memory bus system separate dram cpu chips several times energy consumption iram system computer performance computational dram expected run hotter traditional dram increased chip temperatures result faster charge leakage dram storage cells computational dram expected require frequent dram refresh processor-in-/near-memory pinm refers computer processor cpu tightly coupled memory generally silicon chip chief goal merging processing memory components way reduce memory latency increase bandwidth alternatively reducing distance data needs moved reduces power requirements system much complexity hence power consumption current processors stems strategies deal avoiding memory stalls 1980s tiny cpu executed forth fabricated dram chip improve push pop forth stack-oriented programming language improved efficiency transputer also large chip memory given made early 1980s making essentially processor-in-memory notable pim projects include berkeley iram project iram university california berkeley project university notre dame pim effort
[ 949, 1670, 1237 ]
Train
7,179
3
Galaxian:galaxian galaxian designed kazunori sawano worked many namco electro-mechanical shooting gallery games programmed kōichi tashiro namco set capitalize success taito space invaders massive impact video game market proving critical financial success although first video game galaxian popularized use rgb colorful enemy designs well use short jingles scrolling backgrounds one company first video games exported outside japan thanks licensing deal midway games galaxian proved critical commercial success upon release many applauding improvements invader -type games innovations 1982 sold 40,000 arcade units north america alone japan proved success pac-man followed long series sequels spin-offs multiple platforms — first galaga would usurp original popularity recognized one greatest video games time original ported numerous game consoles including atari 2600 msx family computer included multiple namco video game compilations cited one influential important video games shoot'em genre galaxian fixed shooter video game player controls starship called galaxip objective clear round aliens enemies appear formation towards top screen two escort ships labeled galaxian flagship galboss enemies make divebomb towards bottom screen shooting projectiles attempt hit player galaxip fire single shot on-screen must wait hit top able fire another due limitations hardware flagships make divebomb two red escort ships shooting three award player bonus points extra points awarded destruction flagship enemy movement increase game progresses alongside number shots enemies fire game attract mode featured short plotline titled galaxians mission destroy aliens rounds indicated small flags bottom screen galaxian designed kazunori sawano previously worked many namco electro-mechanical shooting gallery arcade games notably shoot away 1977 early game development taito released space invaders japan swept country storm helped turn video game industry highly-profitable business help capitalize game success namco president masaya nakamura ordered sawano make best post-invaders game could put vast amount pressure development team although development game lasted six months sawano made several ideas half year production began sawano team set make game anybody could play using simple best motto production — helped trim away large-scale ideas favor game could loop endlessly able use two enemy types alongside space invaders large portion game inspired star wars specifically large-scale space battles sawano wanted replicate feeling space war specifically game sound effects several back-and-forth sound effects made many rejected sawano matching vision game namco first arcade game composed synthesizer game balance important part game sawano want make game suddenly spike difficulty build-up warning development team made number enemies on-screen gradually increased difficulty player progresses becoming noticeable later stages enemies designed personality programmed monitor player movements make attacks based early development sawano envisioned enemies resemble tie fighters star wars save hardware memory processing programmers created tilemap hardware model created set 8x8 pixel tiles — reduced processing memory requirements upwards 64 times compared framebuffer model used space invaders galaxian released namco japan november 1979 following large success namco approached midway games terms releasing game overseas midway previously lost license taito success space invaders west midst trying find new partner releasing games agreed deal released game north america early 1980 — move helped strengthen midway challenged atari leadership market help keep demand game japan namco would license game companies manufacturing cabinets including taito irem galaxian critical commercial success upon release 1982 sold 40,000 arcade units north america japan would outperform pac-man short critics applauded game use true color graphics improving formula established space invaders april 5 1980 issue cashbox noted game colorful attractive cabinet design april 26 issue called earthshaking hit referring true followup space invaders video magazine 1982 reviewed astrocade version galaxian named galactic invasion noting graphics inferior coin-op pc versions praising play-action magnificent compared console versions astrocade version would later awarded certificate merit best arcade-to-home video game translation 4th annual arkie awards 2007 retrospective review sir clive eurogamer labeled masterpiece praising beautifully drawn game graphics intense gameplay historically important game industry home computing weekly 1983 gave spectrum version galaxian 3/5 stars describing well-written version praising graphics fast although flickery softline 1983 criticized atari 8-bit version game shipped rom cartridge raised cost stated game becomes tedious quickly atari inc. published ports galaxian systems—atari 8-bit family atari 2600 atari 5200— 1982-3 three years galaxian appeared arcades year galaga additional ports published atarisoft label apple ii colecovision commodore 64 vic-20 ibm pc zx spectrum ports companies sold msx europe japan nec pc-8801 famicom japan sharp x1 bally astrocade version published galaxian name later changed galactic invasion coleco released stand-alone mini-arcade tabletop version galaxian 1981 along pac-man donkey kong frogger sold three million units combined entex released handheld electronic game called galaxian 2 1981 game called galaxian 2 two-player mode sequel entex galaxian galaxian would spawn long series sequels spin-offs multiple game platforms including arcade hardware home video game systems first galaga released year later 1981 usurping original popularity cited one greatest video games time becoming popular game golden age arcade video games north america followed gaplus 1984 added power-up items juggling-based bonus stages galaga '88 released 1987 published north america atari games featured branching level paths new enemy types multiple endings 1990 namco produced theme-park attraction based series originally presented expo '90 moved namco wonder eggs theme park two years later rail shooter 28 players used lightguns shoot enemies projectiles smaller version arcades released 1992 followed 1996 playstation release japan europe 1995 arcade remake galaga released namco classic collection vol 1 compilation galaga arrangement game added two-player co-operative play boss fights alongside new enemy weapon types ported xbox playstation 2 gamecube 2002 part compilation disk namco museum japan-only medal game spin-off galaxian fever released 2000 part namco shooting medal series following year hasbro interactive released playstation game boy color adding side-scrolling third-person stages core gameplay 2005 playstation portable compilation namco museum battle collection includes remake galaga titled galaga arrangement relation one featured namco classic collection vol 1 game later ported ios devices 2009 renamed galaga remix 2008 namco bandai games released downloadable game xbox 360 playstation 3 galaga legions — game instead twin-stick shooter game score attack modes multiple stages followed 2011 sequel galaga legions dx branded now-defunct namco generations label galaxian included namco museum series collections across several platforms galaxian galaga bundled together game boy release arcade classic 3 galaxian released microsoft windows 1995 part microsoft return arcade game also released part pac-man arcade party 30th anniversary arcade machine game also seen jakks pacific plug play tv game controllers galaxian along galaga gaplus galaga '88 redesigned modernized iphone app compilation called galaga 30th anniversary collection released commemoration event namco bandai super impulse also released stand-alone tiny arcade version galaxian galaxian world record focus many competitive gamers since release famous galaxian rivalry british player gary whelan american perry rodgers faced apollo amusements pompano beach florida usa 6–9 april 2006 whelan held world record 1,114,550 points beaten newcomer aart van vliet netherlands scored 1,653,270 points 27 may 2009 funspot family fun center weirs beach new hampshire usa
[ 8052, 4759, 7430, 723, 6626, 7362, 4506, 5589, 7388, 3993, 2148, 158, 6234, 1237, 3421, 4016 ]
Test
7,180
3
PRIMEHPC_FX10:primehpc fx10 primehpc fx10 supercomputer designed manufactured fujitsu announced 7 november 2011 supercomputing conference primehpc fx10 improved commercialized version k computer first supercomputer obtain 10 pflops linpack benchmark largest configuration primehpc fx10 peak performance 23.2 pflops power consumption 22.4 mw list price us 655.4 million succeeded primehpc fx100 sparc64 xifx processors 2015 first installation primehpc fx10 university tokyo information technology center named oakleaf-fx system peak performance 1.135 pflops consists 4,800 nodes total 76,800 cores 150 tb memory 50 racks oakleaf-fx ordered november 2011 became operational april 2012 june 2012 ranked 18th fastest supercomputer 39th top500 list fastest supercomputers linpack benchmark performance 1.043 pflops june 2012 fujitsu received order republic china central weather bureau first primehpc fx10 sale outside japan system installed 2014 performance 1 pflops addition serving platform high-performance computing primehpc fx10 also intended serve software development platform k computer compatible fujitsu sold several systems k computer software development including 96-node system june 2012 kobe university graduate school informatics 384-node system august 2012 university tokyo institute solid-state physics
[ 6987, 2433, 1023, 578, 3015, 971, 1678, 1042 ]
Validation
7,181
4
Department_of_Defense_Cyber_Crime_Center:department defense cyber crime center department defense cyber crime center dc3 designated federal cyber center national security presidential directive 54/homeland security presidential directive 23 department defense dod center excellence digital multimedia d/mm forensics dod directive 5505.13e serves operational focal point defense industrial base dib cybersecurity information assurance cs/ia program dc3 operates air force office special investigations afosi osi deliver superior d/mm forensic services cyber technical training vulnerability sharing technical solutions development cyber analysis following dod mission areas cybersecurity cs critical infrastructure protection cip law enforcement counterintelligence le/ci document media exploitation domex counterterrorism ct dc3 cyber forensics laboratory dc3/cfl performs d/mm forensic examinations device repair data extraction expert testimony dod lab robust intrusion malware analysis capability supports dc3 lines business activities lab operations accredited iso 17025 american society crime laboratory directors/laboratory accreditation board ascld/lab guides reliable repeatable valid exam results subjected quality control peer review dc3 cyber training academy formerly dcita defense cyber investigations training academy provides in-residence online training dod elements protect dod information systems unauthorized use criminal fraudulent foreign intelligence activities academy curriculum offers courses organized specialty areas since founding 1998 academy recorded 35,000 student enrollments courses dc3 technical solutions development dc3/tsd directorate tailors software system solutions engineered specific requirements digital forensic examiners cyber intrusion analysts tsd validates commercial off-the-shelf cots government off-the-shelf gots in-house developed software/hardware used forensic process addition tsd functions dod repository cyber counterintelligence ci tools operational hub dib cs/ia program dib collaborative information sharing environment dc3/dcise assists dib companies safeguard dod content intellectual property residing transiting unclassified networks dcise develops shares actionable threat products performs cyber analysis diagnostics remediation consults dib partners dc3 analytical group dc3/ag supports le/ci agencies including air force office special investigations afosi naval criminal investigative services ncis key mission partners federal bureau investigation fbi member agency national cyber investigative joint task force ncijtf ag leads collaborative analytical technical exchange subject matter experts le/ci computer network defense cnd intelligence community ic information assurance ia agencies build threat picture enabling proactive le/ci cyber operations focuses nation-state threat actors 2006 2013 dc3 held free online international competition consisting individual progressive-level exercises challenges tests included stenography data carving data recovery detection malicious software first year 140 teams u.s. participated challenge final year challenge grown include 1,254 teams 53 countries dc3 hosted dod cyber crime conference 2003 2012 military criminal investigative organizations federal law enforcement
[ 1715, 5561, 3700, 5568, 7825, 7363, 6020, 1756, 4523, 7848, 2505, 3822, 3823, 1501, 5254, 6488, 1805 ]
Validation
7,182
1
DBM_(computing):dbm computing computing dbm library file format providing fast single-keyed access data original dbm library file format simple database engine originally written ken thompson released 1979 name three letter acronym database manager also refer family database engines apis features derived original dbm dbm library stores arbitrary data use single key primary key fixed-size buckets uses hashing techniques enable fast retrieval data key hashing scheme used form extendible hashing hashing scheme expands new buckets added database meaning nearly empty database starts one bucket split becomes full two resulting child buckets split become full database grows keys added dbm library derivatives pre-relational databases manage associative arrays implemented on-disk hash tables practice offer practical solution high-speed storage accessed key require overhead connecting preparing queries balanced fact generally opened writing single process time agent daemon handle requests multiple processes introduces ipc overhead original dbm library replaced many successor implementations notable examples include 2001 ndbm implementation dbm standard solaris irix whereas berkeley db implementations standard free operating systems
[ 3599, 2429, 5983, 6462, 5852, 7498, 1989, 2097, 3244, 3873, 1105, 1435, 6367 ]
Validation
7,183
2
Blob_emoji:blob emoji google blob emoji feature android mobile operating system 2013 2017 google introduced blobs part android kitkat mobile operating system 2013 next year google expanded blob style include emojis normally depict humans example instead flamenco dancer apple emoji style derivates google blob style showed less glamorous blob rose teeth 2016 google redesigned blobs gumdrop-shape unicode group establishes emoji standards introduced skin tone gender options emojis google emojis progressively appeared humans less yellow amorphous blobs google retired blobs 2017 release android oreo favor circular emojis similar style platforms consistent cross-platform emoji interpretation among redesign primary aims redesign development year mimicked apple effort include detail emoji glyph offer yellow skin tone default since 2017 effort maintain blob emojis google retired called blobmoji available github blob emoji divisive feature 2013 2017 proponents praised novel interpretation emoji ideograms detractors criticized miscommunication results emoji interpreted differently across platforms google released sticker packs featuring blob emoji gboard android messages 2018
[ 3583, 1582 ]
Test
7,184
7
SciDB:scidb scidb column-oriented database management system dbms designed multidimensional data management analytics common scientific geospatial financial industrial applications developed paradigm4 co-created turing award winner michael stonebraker stonebraker claims arrays 100 times faster scidb relational dbms class problems swapping rows columns mathematical arrays put fewer restrictions data work number dimensions unlike conventionally widely used relational database management system model relation supports one dimension records according 2011 conference presentation scidb supports marilyn matz became chief executive company
[ 7205, 5419 ]
Validation