node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
7,185
4
Hamza_Bendelladj:hamza bendelladj hamza bendelladj arabic حمزة بن دلاج algerian hacker goes code name bx1 nicknamed smiling hacker born 1988 tizi ouzou algeria top 10 list wanted hackers interpol fbi allegedly embezzling tens millions dollars two hundred american european financial institutions via computer virus rimig33k infected 50 million computers worldwide mostly united states developed russian accomplice aleksandr andreevich panin aka gribodemon steal banking information stored infected computers hacked official website israeli government using malicious software called spyeye bendelladj pseudonyms bx1 daniel hb broke computers banks private individuals acquire passwords identification codes took control account emptied three-year hunt bendelladj arrested january 8 2013 thai police making stopover bangkok transit malaysia egypt resist arrest said goodbye family arrested wife daughter continued journey egypt without earned nickname smiling hacker due smile face media presentation photos taken arrest even handcuffed according thai police bendelladj top 10 wanted fbi asked money claimed donated millions dollars palestinian charities trial documents mention extradited may 2013 united states tried atlanta pleaded guilty june 25 2015 faced sentence 30 years prison fine fourteen million dollars accomplice aleksandr andreevich panin arrested july 1 2013 atlanta hartsfield-jackson international airport pleaded guilty january 2014 atlanta federal court 2015 tunisian website posted rumor bendelladj sentenced death rumor spread social networks algeria several facebook support groups created reaction support petition launched demanding algerian ministry foreign affairs president barack obama intervene release us ambassador algeria joan a. polaschik wrote twitter account computer crimes capital crimes punishable death penalty bendelladj prison united states since may 2013 us court sentenced april 20 2016 15 years prison 3 years probation russian accomplice panin 27 aka gribodemon sentenced 9 years 6 months prison report united states department justice estimated spyeye virus stolen approximately billion dollars 2010 2012 affected banks repaired damage caused malware bendelladj lawyer announced intended appeal court decision
[ 7186, 3486 ]
Test
7,186
4
Zeus_(malware):zeus malware zeus zeus zbot trojan horse malware package runs versions microsoft windows used carry many malicious criminal tasks often used steal banking information man-in-the-browser keystroke logging form grabbing also used install cryptolocker ransomware zeus spread mainly drive-by downloads phishing schemes first identified july 2007 used steal information united states department transportation became widespread march 2009 june 2009 security company prevx discovered zeus compromised 74,000 ftp accounts websites companies bank america nasa monster.com abc oracle play.com cisco amazon businessweek similarly koobface zeus also used trick victims technical support scams giving scam artists money pop-up messages claim user virus reality might viruses scammers may use programs command prompt event viewer make user believe computer infected zeus difficult detect even up-to-date antivirus security software hides using stealth techniques considered primary reason zeus malware become largest botnet internet damballa estimated malware infected 3.6 million pcs u.s. 2009 security experts advising businesses continue offer training users teach click hostile suspicious links emails web sites keep antivirus protection date antivirus software claim reliably prevent infection example symantec browser protection says prevent infection attempts october 2010 us fbi announced hackers eastern europe managed infect computers around world using zeus virus distributed e-mail targeted individuals businesses municipalities opened e-mail trojan software installed victimized computer secretly capturing passwords account numbers data used log online banking accounts hackers used information take victims ’ bank accounts make unauthorized transfers thousands dollars time often routing funds accounts controlled network money mules paid commission many u.s. money mules recruited overseas created bank accounts using fake documents false names money accounts mules would either wire back bosses eastern europe withdraw cash smuggle country 100 people arrested charges conspiracy commit bank fraud money laundering 90 us others uk ukraine members ring stolen 70 million 2013 hamza bendelladj known bx1 online arrested thailand deported atlanta georgia usa early reports said mastermind behind zeus accused operating spyeye bot functionally similar zeus botnets suspected also operating zeus botnets charged several counts wire fraud computer fraud abuse court papers allege 2009 2011 bendelladj others developed marketed sold various versions spyeye virus component parts internet allowed cybercriminals customize purchases include tailor-made methods obtaining victims ’ personal financial information also alleged bendelladj advertised spyeye internet forums devoted cyber- crimes operated command control servers charges georgia relate spyeye spyeye botnet control server based atlanta late 2010 number internet security vendors including mcafee internet identity claimed creator zeus said retiring given source code rights sell zeus biggest competitor creator spyeye trojan however experts warned retirement ruse expect developer return new tricks
[ 2173, 7151, 6419, 376, 3281, 7185, 7186, 2577, 5401, 6823, 1482, 51, 1500, 7213, 74, 2618, 7600, 3680, 2632, 4759, 6515, 3698, 4783, 129, 496, 7657, 7294, 2693, 862, 7307, 3071, 2354, 4110, 3426, 880, 2724, 2376, 1632, 2733, 2021, 5578,...
Validation
7,187
4
Lorcon:lorcon lorcon acronym loss radio connectivity open source network tool library injecting 802.11 wlan frames capable injecting via multiple driver frameworks without need change application code lorcon built patching third-party codice_1-driver cards based qualcomm atheros wireless chipset project maintained joshua wright michael kershaw dragorn
[ 7848 ]
Test
7,188
3
Integration_Objects:integration objects integration objects software development firm created 2002 company systems integrator solutions provider knowledge management automation plant process management decision support applications develops opc software products knowledge management platforms manufacturers primarily oil gas refining petrochemicals chemical food beverage steel pharmaceutical industries also provides consulting services integration objects member opc foundation international society automation mimosa also collaborated partnered companies invensys osisoft gensym abb large projects clients include exxonmobil saudi aramco solvay chemicals opc technology follows set open standards specifications created managed opc foundation ensure interoperability devices systems industrial automation within enterprise systems origins opc based microsoft ole com dcom technology today opc set standards allow field systems devices automation control applications business applications communicate acquired real-time historical data records enterprise systems production devices multiple vendors standards evolving created rewritten account emerging technologies trends manufacturing companies invest large amounts money industrial automation infrastructures many yet realize full value investment many remain islands automation information silos disconnected systems including business systems enormous amounts data may available companies often lack proper infrastructure would allow adequately share data use improve process efficiency profitability integration process control plant-level enterprise systems longer option manufacturing energy companies want remain competitive convergence world automation process controls greatly helps effort providing economically technically competitive solutions however sharing process information within networks must done way aligns overall security policies enterprise system integrators must find customized solutions fit specific company needs goals many enterprises across various industries face issue important resources data information knowledge embedded computer systems documentation minds individuals across organization accessing extremely difficult time-consuming however using intelligent computer platforms capture integrate knowledge analyze organize store well users monitor manage operations performances effectively make safe smart decisions rapidly improve results knowledge management allows organization benefit collective knowledge written resources employees experiences know-how applications knowledge management systems found many fields example case abnormal plant conditions knowledge management platforms allow operator identify root cause problem correct action taken automatically reviewing stored analyzed data found system knowledge management strategic asset necessary organization remain competitive
[ 2087 ]
Validation
7,189
3
Huawei:huawei huawei technologies co. ltd. chinese multinational technology company provides telecommunications equipment sells consumer electronics including smartphones headquartered shenzhen guangdong province company founded 1987 ren zhengfei initially focused manufacturing phone switches huawei expanded business include building telecommunications networks providing operational consulting services equipment enterprises inside outside china manufacturing communications devices consumer market huawei 188,000 employees around 76,000 engaged research development r 21 r institutes around world april 2019 opened dedicated ox horn campus dongguan company invested us 13.8 billion r huawei deployed products services 170 countries served 45 50 largest telecom operators networks numbering 1,500 reach one third world population huawei overtook ericsson 2012 largest telecommunications-equipment manufacturer world overtook apple 2018 second-largest manufacturer smartphones world behind samsung electronics ranks 72nd fortune global 500 list december 2018 huawei reported annual revenue risen us 108.5 billion 2018 21 increase 2017 although successful internationally huawei faced difficulties markets due cybersecurity allegations—primarily united states government—that huawei infrastructure equipment may enable surveillance chinese government especially development 5g wireless networks china aggressively promoted calls u.s. prevent use products huawei fellow chinese telecom zte u.s. allies huawei argued products posed greater cybersecurity risk vendor evidence u.s. espionage claims nonetheless huawei pulled u.s. consumer market 2018 concerns affected ability market consumer products u.s. measures intensified may 2019 midst ongoing trade war china united states huawei restricted commerce u.s. companies due alleged previous willful violations u.s. sanctions iran 29 june 2019 u.s. president donald trump reached agreement resume trade talks china announced would ease aforementioned sanctions huawei name huawei literally translates china hua shortened form huaxia poetic name china wei means make chinese pinyin huáwéi pronounced mandarin chinese cantonese name transliterated jyutping waa-wai pronounced however pronunciation huawei non-chinese varies countries example hoe-ah-wei netherlands company considered changing name english concerned non-chinese may find name hard pronounce decided keep name launched name recognition campaign instead encourage pronunciation closer wah-way using words wow way 1980s chinese government tried modernize country underdeveloped telecommunications infrastructure core component telecommunications network telephone exchange switches late 1980s several chinese research groups endeavored acquire develop technology usually joint ventures foreign companies ren zhengfei former deputy director people liberation army engineering corps founded huawei 1987 shenzhen company reports rmb 21,000 registered capital time founding ren sought reverse engineer foreign technologies local researchers time china telecommunications technology imported abroad ren hoped build domestic chinese telecommunication company could compete ultimately replace foreign competitors first several years company business model consisted mainly reselling private branch exchange pbx switches imported hong kong meanwhile reverse-engineering imported switches investing heavily research development manufacture technologies 1990 company approximately 600 r staff began independent commercialization pbx switches targeting hotels small enterprises company first major breakthrough came 1993 launched c c08 program controlled telephone switch far powerful switch available china time initially deploying small cities rural areas placing emphasis service customizability company gained market share made way mainstream market huawei also key contract build first national telecommunications network people liberation army deal one employee described small terms overall business large terms relationships 1994 founder ren zhengfei meeting party general secretary jiang zemin telling switching equipment technology related national security nation switching equipment like one lacked military jiang reportedly agreed assessment 1990s canadian telecom giant nortel outsourced production entire product line huawei subsequently outsourced much product engineering huawei well another major turning point company came 1996 government beijing adopted explicit policy supporting domestic telecommunications manufacturers restricting access foreign competitors huawei promoted government military national champion established new research development offices 1997 huawei contract provide fixed-line network products hong kong company hutchison whampoa later year huawei launched wireless gsm-based products eventually expanded offer cdma umts 1999 company opened research development r center bangalore india develop wide range telecom software may 2003 huawei partnered 3com joint venture known h3c focused enterprise networking equipment marked 3com re-entrance high-end core routers switch market abandoned 2000 focus businesses 3com bought huawei share venture 2006 us 882 million 2005 huawei foreign contract orders exceeded domestic sales first time huawei signed global framework agreement vodafone agreement marked first time telecommunications equipment supplier china received approved supplier status vodafone global supply chain huawei also signed contract british telecom bt deployment multi-service access network msan transmission equipment bt 21st century network 21cn 2007 huawei began joint venture u.s. security software vendor symantec corporation known huawei symantec aimed provide end-to-end solutions network data storage security huawei bought symantec share venture 2012 new york times noting symantec fears partnership would prevent obtaining united states government classified information cyberthreats may 2008 australian carrier optus announced would establish technology research facility huawei sydney october 2008 huawei reached agreement contribute new gsm-based hspa+ network deployed jointly canadian carriers bell mobility telus mobility joined nokia siemens networks huawei delivered one world first lte/epc commercial networks teliasonera oslo norway 2009 july 2010 huawei included global fortune 500 2010 list published u.s. magazine fortune first time strength annual sales us 21.8 billion net profit us 2.67 billion october 2012 announced huawei would move uk headquarters green park reading berkshire september 2017 huawei created narrowband iot city-aware network using one network one platform n applications construction model utilising iot cloud computing big data next-generation information communications technology also aims one world five largest cloud players near future april 2019 huawei established huawei malaysia global training centre mgtc cyberjaya malaysia huawei ’ first training centre outside china end 2018 huawei sold 200 million smartphones reported strong consumer demand premium range smart phones helped company reach consumer sales excess 52 billion 2018 huawei announced worldwide revenues 105.1 billion 2018 net profit 8.7 billion huawei q1 2019 revenues 39 year-over-year us 26.76 billion huawei centre espionage allegations chinese 5g network equipment 2018 united states passed defense funding bill contained passage barring federal government business huawei zte several chinese vendors surveillance products due security concerns 1 december 2018 huawei vice-chairwoman cfo meng wanzhou daughter company founder ren zhengfei arrested canada request u.s. authorities faced extradition united states charges violating sanctions iran 22 august 2018 arrest warrant issued u.s. district court eastern district new york meng charged conspiracy defraud multiple international institutions according prosecutor warrant based allegations conspiracy defraud banks clearing money claimed huawei actually skycom entity claimed entirely controlled huawei said dealing iran contrary sanctions none allegations proven court 11 december 2018 meng released bail 28 january 2019 u.s. federal prosecutors formally indicted meng huawei thirteen counts bank wire fraud order mask sale u.s. technology iran illegal sanctions obstruction justice misappropriating trade secrets department also filed formal extradition request meng canadian authorities day huawei responded charges said denies subsidiary affiliate committed asserted violations well asserted meng similarly innocent china ministry industry information technology believed charges brought united states unfair august 2018 national defense authorization act fiscal year 2019 ndaa 2019 signed law containing provision banned huawei zte equipment used u.s. federal government citing security concerns huawei filed lawsuit act march 2019 alleging unconstitutional specifically targeted huawei without granting chance provide rebuttal due process 15 may 2019 department commerce added huawei 70 foreign subsidiaries affiliates entity list export administration regulations citing company indicted knowingly willfully causing export re-export sale supply directly indirectly goods technology services banking financial services united states iran government iran without obtaining license department treasury office foreign assets control ofac restricts u.s. companies business huawei without government license various u.s.-based companies immediately froze business huawei comply regulation including google—which removes ability certify future devices updates android operating system licensed google mobile services gms google play store well broadcom intel qualcomm microsoft xilinx western digital german chipmaker infineon technologies also voluntarily suspended business huawei pending assessments reported huawei limited stockpile u.s.-sourced parts obtained prior sanctions 17 may 2019 huawei voluntarily suspended membership jedec temporary measure restrictions imposed u.s. government removed speaking chinese media huawei founder ren zhengfei accused u.s. politicians underestimating company strength explained terms 5g technologies others wo n't able catch huawei two three years sacrificed families ideal stand top world reach ideal sooner later conflict us kevin wolf international trade lawyer former assistant secretary commerce export administration obama administration argued huawei could even use open source android open source project aosp code could fall u.s. trade regulations technology u.s. origin google majority developer china normal android phones including huawei include google play store gms google business region phones typically bundled aosp-based distribution built around oem software suite including either first-party app store run oem huawei appgallery third-party service google issued statement assuring user access google play existing huawei devices would disrupted huawei made similar pledge continued support existing devices including security patches make statements regarding availability future android versions upcoming android q 19 may 2019 department commerce granted huawei temporary three-month license continue business u.s. companies purposes maintaining existing smartphone telecom products without interruption whilst long-term solutions determined 22 may 2019 arm holdings also suspended business huawei including active contracts support entitlements pending engagements although japanese-owned company based uk arm cited intellectual property contained technologies u.s. origin believed covered department commerce order prevents huawei manufacturing chips use arm architecture also reported several asian wireless carriers including japan softbank kddi taiwan chunghwa telecom taiwan mobile suspended sale upcoming huawei devices p30 lite citing uncertainties effects u.s. sanctions availability android platform ntt docomo similarly suspended pre-orders new huawei phones without citing reasoning 23 may 2019 reported sd association removed huawei list members—implicating revocation membership association day toshiba briefly suspended shipments huawei temporary measure determining whether selling u.s. made components technologies huawei panasonic also stated determined business relationship compliance u.s. law would suspend next day wi-fi alliance also temporarily restricted huawei membership 24 may 2019 huawei told reuters fedex attempted divert two packages sent japan addressed huawei china united states tried divert two packages sent vietnam huawei offices elsewhere asia without authorization first fedex china claimed media reports true may 28 however apologized chinese social media account fact small number huawei shipments misrouted claimed external parties require fedex ship shipments 29 may 2019 reported huawei listed member jedec sd association wi-fi alliance addition science organization ieee initially banned huawei employees peer-reviewing papers handling papers editors may 30th 2019 citing legal concerns ban also revoked june 3rd 2019 29 june 2019 g20 summit trump chinese president general secretary xi jinping agreed resume trade negotiations trump made statements implicating plans ease restrictions u.s. companies business huawei explaining sold tremendous amount products company exactly happy could n't sell referring equipment great national security problem bbc news considered move significant concession sanctions noted huawei working in-house operating system codenamed hongmeng os interview die welt executive richard yu stated in-house os could used plan b prevented using android windows result u.s. action would prefer work ecosystems google microsoft efforts develop in-house os huawei date back far 2012 huawei filed trademarks names ark ark os harmony europe speculated connected os june 2019 huawei communications vp andrew williamson told reuters company testing hongmeng china could ready months however july 2019 chairman liang hua senior vice president catherine chen stated hongmeng os actually intended mobile operating system smartphones actually embedded operating system designed internet things iot hardware huawei classifies collective entity prior 2019 refer private company richard mcgregor author said definitional distinction essential company receipt state support crucial points development mcgregor argued huawei status genuine collective doubtful huawei position shifted 2019 dr. song liuping huawei chief legal officer commented us government ban said politicians us using strength entire nation come private company emphasis added ren zhengfei founder ceo huawei power veto decisions made board directors huawei disclosed list board directors first time 2010 liang hua current chair board members board liang hua guo ping xu zhijun hu houkun meng wanzhou cfo deputy chairwoman currently bail vancouver arrested december 1 2018 extradition request us authorities suspicion iran sanctions evasion ding yun yu chengdong wang tao xu wenwei chen lifang peng zhongyang tingbo li yingtao ren zhengfei yao fuhai tao jingwen yan lida guo ping chairman huawei device huawei mobile phone division huawei ’ chief ethics compliance officer zhou daiqi also huawei ’ communist party committee secretary chief legal officer song liuping huawei maintains employee-owned company ren zhengfei retains approximately 1 percent shares huawei holding company huawei investment holding remainder shares held trade union committee trade union per se internal governance procedures committee members leaders selected remain unknown claimed representative huawei employee shareholders company trade union committee registered pay dues shenzhen federation all-china federation trade unions also due limitation chinese law preventing limited liability companies 50 shareholders half huawei staff participate scheme foreign employees eligible hold company calls virtual restricted shares shares nontradable allocated reward performance employees leave huawei shares revert company compensates holding although employee shareholders receive dividends shares entitle direct influence management decisions enables vote members 115-person representatives ’ commission preselected list candidates representatives ’ commission selects huawei holding board directors board supervisors scholars found stages historical morphing employees part huawei “ shares ” instead “ virtual stock contract right property right gives holder voting power either huawei tech huawei holding transferred cancelled employee leaves firm subject redemption payment huawei holding tuc low fixed price ” debate whether trade union committee structure enabling government people republic china influence huawei chinese company trade unions report senior trade union organizations turn report all-china federation trade unions controlled communist party china therefore academics considered huawei owned controlled chinese government also argued huawei much state owned enterprise party owned enterprise approximately 80 world top 50 telecoms companies worked huawei prominent partners include since 2016 german camera company leica established partnership huawei leica cameras co-engineered huawei smartphones including p mate series first smartphone co-engineered leica camera huawei p9 huawei organized around three core business segments huawei announced enterprise business january 2011 provide network infrastructure fixed wireless communication data center cloud computing solutions global telecommunications customers huawei core network solutions offer mobile fixed softswitches plus next-generation home location register internet protocol multimedia subsystems ims huawei sells xdsl passive optical network pon next-generation pon ng pon single platform company also offers mobile infrastructure broadband access service provider routers switches sprs huawei software products include service delivery platforms sdps bsss rich communication suite digital home mobile office solutions huawei global services provides telecommunications operators equipment build operate networks well consulting engineering services improve operational efficiencies include network integration services mobile fixed networks assurance services network safety learning services competency consulting huawei devices division provides white-label products content-service providers including usb modems wireless modems wireless routers mobile wi-fi embedded modules fixed wireless terminals wireless gateways set-top boxes mobile handsets video products huawei also produces sells variety devices name ideos smartphones tablet pcs huawei smartwatch july 2003 huawei established handset department 2004 huawei shipped first phone c300 u626 huawei first 3g phone june 2005 2006 huawei launched first vodafone-branded 3g handset v710 u8220 huawei first android smartphone unveiled mwc 2009 ces 2012 huawei introduced ascend range starting ascend p1 s. mwc 2012 huawei launched ascend d1 september 2012 huawei launched first 4g ready phone ascend p1 lte ces 2013 huawei launched ascend d2 ascend mate mwc 2013 ascend p2 launched world first lte cat4 smartphone june 2013 huawei launched ascend p6 december 2013 huawei introduced honor subsidiary independent brand china ces 2014 huawei launched ascend mate2 4g 2014 mwc 2014 huawei launched mediapad x1 tablet ascend g6 4g smartphone launched 2014 included ascend p7 may 2014 ascend mate7 ascend g7 ascend p7 sapphire edition china first 4g smartphone sapphire screen january 2015 huawei discontinued ascend brand flagship phones launched new p series huawei p8 huawei also partnered google build nexus 6p 2015 current models p mate lines p30 p30 pro mate 20 mate 20 pro mate 20 x released 2018 2019 emotion ui emui rom/os developed huawei technologies co. ltd. based google android open source project aosp emui pre-installed huawei smartphone devices subsidiaries honor series huawei technologies co. ltd. world largest telecom equipment maker china largest telephone-network equipment maker 3,442 patents huawei became world 1 applicant international patents 2014 21 r institutes countries including china united states canada united kingdom pakistan finland france belgium germany colombia sweden ireland india russia israel turkey huawei considering opening new research development r center russia 2019/2020 would third country moscow st. petersburg r centers huawei also announced plans november 2018 open r center french city grenoble would mainly focused smartphone sensors parallel computing software development new r team grenoble expected grow 30 researchers 2020 said company company said new addition brought five number r teams country two located sophia antipolis paris researching image processing design two existing teams based huawei facilities boulogne-billancourt working algorithms mobile 5g standards technology giant also intended open two new research centers zürich lausanne switzerland huawei time employed around 350 people switzerland huawei faced criticism various aspects operations prominent controversies involved u.s. allegations products containing backdoors chinese government espionage—consistent domestic laws requiring chinese citizens companies cooperate state intelligence warranted huawei executives consistently denied allegations stated company never received requests chinese government introduce backdoors equipment would refuse chinese law compel huawei also accused various instances intellectual property theft parties nortel cisco systems t-mobile us huawei employee photographed robotic arm used stress-test smartphones taken fingertip robot
[ 6788, 2, 1443, 2550, 6422, 5740, 740, 6456, 6825, 6132, 65, 768, 2961, 1134, 74, 1142, 6865, 7956, 6874, 803, 5473, 3009, 5822, 121, 4783, 1565, 7275, 136, 500, 3395, 1582, 7289, 5509, 6219, 6937, 1977, 2001, 4480, 1261, 3447, 6615, 5...
Train
7,190
2
Wish_(Unix_shell):wish unix shell wish windowing shell tcl interpreter extended tk commands available unix-like operating systems x window system macos microsoft windows android provides developers facility create gui widgets using tk toolkit tcl programming language wish open-source currently part tcl/tk programming suite codice_1 run without parameters codice_2 prompt displayed interpreter awaits commands entered interactively user empty window opened widgets created user commands displayed mode suitable experimenting often codice_1 run name file containing tcl/tk script parameter also possible run directly tcl/tk scripts unix using shebang construction windows associating codice_4 extension wish program
[ 6050, 1524, 3915, 4759, 5571, 8142, 486 ]
Validation
7,191
4
William_B._Black_Jr.:william b black jr. william bolding black jr. born august 25 1936 former deputy director national security agency black joined national security agency 1959 operational linguist/analyst three years army employed nsa black completed wide variety assignments including special assistant director information warfare chief group operations analysis chief nsa/css representative europe office nceur associate deputy director operations/ military support served chief deputy chief major field installation worked way senior cryptologic executive service primary focus building new organizations creating new ways business black retired nsa 1997 1997 black became assistant vice president director information operations advanced technologies solutions group science applications international corporation saic saic black led information operations research worked information operations technology center establish institute analysis complex systems develop advanced techniques analysis networks critical infrastructures black returned nsa 2000 become deputy director since 2002 overseeing trailblazer project aimed analyzing data computer networks tracking cell phone email communications 2002 main contract trailblazer ultimately worth us 1.2 billion awarded black former employer science applications international corporation april 2005 outgoing nsa director michael hayden told senate hearing trailblazer program several hundred million dollars budget years behind schedule michael hayden promotion deputy director national intelligence black acting director nsa appointment new nsa director lt. gen. keith b. alexander august 2006 black replaced john c. inglis offered take position liaison officer nsa british intelligence counterpart native new mexico black currently resides pasadena maryland wife iris three children 1975 mr. black served various positions nsa headquarters nsa european headquarters pentagon
[ 4666, 202, 7895, 228, 5412, 7568, 4727, 4988, 2343, 258, 3335 ]
Test
7,192
4
Certified_Information_Systems_Security_Professional:certified information systems security professional certified information systems security professional cissp independent information security certification granted international information system security certification consortium also known isc ² december 31 2018 131,180 isc ² members holding cissp certification worldwide 171 countries united states holding highest member count 84,557 members cissp designation accredited ansi also formally approved u.s. department defense dod information assurance technical iat managerial iam categories dodd 8570 certification requirement mid-1980s need arose standardized vendor-neutral certification program provided structure demonstrated competence november 1988 special interest group computer security sig-cs member data processing management association dpma brought together several organizations interested goal international information systems security certification consortium isc ² formed mid-1989 non-profit organization 1990 first working committee establish common body knowledge cbk formed first version cbk finalized 1992 cissp credential launched 1994 2003 cissp adopted baseline u.s. national security agency issep program cissp curriculum covers subject matter variety information security topics cissp examination based isc ² terms common body knowledge cbk according isc ² cissp cbk taxonomy – collection topics relevant information security professionals around world cissp cbk establishes common framework information security terms principles allow information security professionals worldwide discuss debate resolve matters pertaining profession common understanding 15 april 2018 cissp curriculum updated follows 2015 early 2018 cissp curriculum divided eight domains similar latest curriculum domain changed name security engineering 2018 revision expanded security architecture engineering 2015 covered ten similar domains number cissp members december 31 2018 holders cissp certifications earn additional certifications areas specialty three possibilities standard exam costs 699 usd 650 eur 2019 cissp credential valid three years holders renew submitting continuing professional education cpe credits also yearly membership fee required maintain certification fee increased nearly 50 starting mid-2019 2005 certification magazine surveyed 35,167 professionals 170 countries compensation found cissps led list certificates ranked salary 2006 certification magazine salary survey also ranked cissp credential highly ranked cissp concentration certifications top best-paid credentials 2008 another study came conclusion professionals cissp major security certifications least 5 years experience tend salaries around us us 26 higher professionals similar experience levels certificates note actual cause-and-effect relationship certificate salaries remains unproven 2017 study cybersecuritydegrees.com surveyed 10,000 current historical cyber security job listings preferred candidates holding cissp certifications cybersecuritydegrees found job openings offered average salary average cyber security salary ansi certifies cissp meets requirements ansi/iso/iec standard 17024 personnel certification accreditation program
[ 7234, 6694, 3517, 815, 904, 6004, 4783, 221, 7203, 7111, 1034, 7486, 7487 ]
Test
7,193
4
ClamTk:clamtk clamtk free software graphical interface clamav command line antivirus software program linux desktop users provides on-demand scheduled scanning project started dave mauroni february 2004 remains development clamtk originally written using tk widget toolkit named later re-written perl using gtk toolkit interface evolved considerably time recent versions quite different early releases adding features changing interface presentation dual-licensed gnu general public license version 1 later artistic license clamtk interface allows scanning single files directories configured recursive scans scanning sub-directories whitelists scan potentially unwanted applications puas exclude hidden files large files 20 mb 2017 ghacks reviewer mike turcotte-mccusker noted high rate false positives pua-inclusive scans return history selection allows reviewing results previous scans quarantined files clamtk allows manual automatic updates configured clamav virus definitions application interfaces thunar-sendto-clamtk nemo-sendto-clamtk clamtk-gnome clamtk-kde provide context menu functionality associated file managers thunar nemo gnome files dolphin allowing users directly send files clamtk scanning clamtk also run command-line interface although main reason command line access exists interface various file managers clamtk included repositories many linux distributions including alt linux arch linux centos debian fedora gentoo linux mint mandriva opensuse pclinuxos red hat enterprise linux ubuntu well freebsd users install clamtk repositories linux distribution using application website also provides downloads latest release versions form .rpm .deb files 2014 review clamtk 5.0.7 silviu stahie softpedia recommended application means getting clamav functionality easy-to-use graphical interface wrote basically functions clamtk performed terminal clamav would fine desktop environment like server reason use terminal regular linux distribution 2015 review bill toulas forge noted clamtk seemed take comparable amount time scan clamav indicting n't slowing scanning engine 2017 review linux ubuntu said clamtk provides simple gui allows beginners comfortable use cli upon launching clamtk presented clean gui 4 main sections 2018 listing mangesh dhulap top 10 best free linux antivirus programs – reviewed smart tricks listed clamtk first choice free linux antivirus programs ubuntu pit listing best linux antivirus top 10 reviewed compared clamtk recommended average users described lightweight 2019 review make tech easier included clamtk review best antivirus programs ubuntu reported need good virus scanner ’ fan command line clamtk best choice rewiew derrik diener additive tips 2019 stated ... like features clamav tool dislike dealing command-line ’ get useful features nice easy-to-use interface ... clamtk takes advanced clamav features command-line wraps incredibly simple user interface average linux user use
[ 5452, 91, 4115, 5983, 4759, 7425, 3089, 4492, 1931, 4138, 385, 910, 1838, 6005, 2296, 4689, 6006, 5571, 4783, 3111, 7087, 578, 496, 6644, 5144, 3123, 142, 935, 3561, 7108, 7478, 5601, 6043, 6305, 8134, 5523, 4456, 6777, 4645, 7597, 88 ]
Test
7,194
4
List_of_cyber_attack_threat_trends:list cyber attack threat trends list cyber attack threat trends presented alphabetical order methods used 1990s 2015
[ 5269, 5723, 2281, 1635, 5914, 3302, 2944, 2043, 4256, 2678, 3038, 2055, 57, 6756, 8133, 6589, 1241 ]
Test
7,195
3
Windows_NT_processor_scheduling:windows nt processor scheduling windows nt processor scheduling refers process windows nt determines job task run computer processor time without scheduling processor would give attention jobs based arrived queue usually optimal part scheduling processor gives priority level different processes running machine two processes requesting service time processor performs jobs one higher priority six named priority levels levels associated numbers applications start base priority level eight system dynamically adjusts priority level give applications access processor priority levels 0 15 used dynamic applications priority levels 16- 31 reserved real-time applications multiprocessing environment one logical processor i.e multiple cores hyperthreading one task running time however process thread set run subset available logical processors windows task manager utility offers user interface process level
[ 3937, 3263, 378, 2198, 6096, 1475, 7553, 5410, 7564, 422, 6844, 2245, 435, 5442, 5090, 3340, 7602, 6164, 1534, 6885, 7619, 2999, 6528, 2290, 4774, 1181, 3711, 140, 6558, 6575, 3407, 3057, 1597, 2345, 1237, 7688, 2710, 1248, 8049, 6256, ...
Validation
7,196
1
European_Sleep_Apnea_Database:european sleep apnea database european sleep apnea database esada also referred spelling european sleep apnoea database european sleep apnoea cohort collaboration european sleep centres part european cooperation science technology cost action b 26 main contractor project sahlgrenska academy gothenburg university institute medicine department internal medicine co-ordinator jan hedner md phd professor sleep medicine book clinical genomics practical applications adult patient care said esada example initiatives afford excellent opportunity future collaborative research genetic aspects obstructive sleep apnea syndrome osas european respiratory society european sleep research society noted impact research cooperative efforts database resource 2006 european sleep apnea database esada began initiative 27 european sleep study facilities combine information compile one shared resource formed part european cooperation science technology cost action b 26 addition financial help cost initiative received assistance companies philips respironics resmed database storing association resource information located gothenburg sweden group goal twofold serve reference guide researching sleep disorders compile information different caregivers treat patients suffering sleep apnea 5,103 patients tracked march 2007 august 2009 data collected patients included symptoms suffered medication medical history sleep data inputted online format analysis database researchers reported methodology results 2010 american thoracic society observed findings regarding percentages metabolic cardiovascular changes related patients obstructive sleep apnea 2010 research resulted collaboration 22 study centres across 16 countries europe involving 27 researchers primary participants presented american thoracic society included researchers sahlgrenska university hospital gothenburg sweden technion – israel institute technology haifa israel national tb lung diseases research institute warsaw poland cnr institute biomedicine molecular palermo italy instituto auxologico italiano ospedale san luca milan italy st. vincent university hospital dublin ireland analysis published 2010 american journal respiratory critical care medicine 2011 22 sleep disorder centres europe involved collaboration group published research 2011 analyzing percentage patients suffering sleep apnea obesity 2012 database maintained information 12,500 patients europe also contained dna samples 2,600 individuals esada represented 2012 21st annual meeting european sleep research society paris france one four european sleep research networks held session event pierre escourrou fadia jilwan wrote 2012 article european respiratory journal studying data esada involving 8,228 total patients 23 different facilities analyzed whether polysomnography good measure hypopnea sleep apnea researchers department pulmonary diseases turku university hospital turku finland compared variations sleep centres esada database published findings european respiratory journal looked traits 5,103 patients 22 centres reported average age patients database prevalence region performing sleep study cardiorespiratory polygraphy database added centre hamburg germany 2013 managed physician holger hein group annual meeting 2013 held edinburgh united kingdom run renata riha march 2013 approximately 13,000 total patients studied program 200 additional patients added database month analysis published researchers italy sweden september 2013 european respiratory journal analyzed correlation renal function problems obstructive sleep apnea analyzed data 17 countries europe representing 24 sleep centres 8,112 total patients tested whether patients different types demographics existing health problems change probability kidney function problems concurrently suffered obstructive sleep apnea 2014 researchers released data studying 5,294 patients database compared prevalence sleep apnea increased blood sugar results published european respiratory journal studied glycated hemoglobin levels patients compared measured severity sleep apnea researchers analyzed glycated hemoglobin levels among class individuals less severe sleep apnea higher determined amount sleep apnea problems 20 march 2014 database included information total 15,956 patients 2014 article european respiratory journal drawing esada analyzed whether lack adequate oxygen night sleep indicator high blood pressure 2013 book clinical genomics practical applications adult patient care esada said example kind initiative affords excellent opportunity future collaborative research genetic aspects obstructive sleep apnea syndrome osas european respiratory society european sleep research society noted impact research cooperative efforts database resource
[]
Test
7,197
3
The_Sacred_Armour_of_Antiriad:sacred armour antiriad sacred armour antiriad action game published palace software september 1986 amstrad cpc commodore 64 ibm pc compatibles trs-80 zx spectrum north america game published epyx rad warrior original game came 16-page comic book created graphic artist daniel malone game one earliest examples metroidvania genre developed without knowledge concurrently metroid sacred armour antiriad mixture platform maze game player controls tal start simply man dressed loincloth thrown rocks weapon later find legendary antiriad armour wear activate status panel bottom screen shows tal suit strength remaining lives in-game messages among things game-environment full dangerous creatures minions mysterious overlords tal defend hostile beings throwing rocks suit using suits beam-weapon capabilities located installed necessary equipment antiriad armour tal also needs find collect additions armour order allow fly shoot etc tal use suit explore game area occasionally need leave collect power re-charges suit come too-much attack suit destroyed power depleted 2086 civilization destroys nuclear armageddon two factions develop anti-radiation battlesuit completely immune conventional weapons go war diplomatic peace talks break following millennia survivors develop hardy peaceful race living quiet agricultural existence one day mysterious alien forces emerge old volcano containing prewar military base attack quickly conquering enslaving new breed humans forcing populace work mines many rebel mysterious overlords one rebels tal instructed elders seek-out legendary armoured suit sacred armour antiriad last word corruption anti-radiation fact one prewar battlesuits whose development originally instigated diplomatic crisis started nuclear war armour rumoured render wearer impervious attack help tal hopes defeat overthrow alien rulers earth however armour requires equipment added order make function fully include anti-gravity boots particle negator pulsar beam implosion mine last add-on important one needed destroy volcano enemy uses base
[ 4277 ]
Test
7,198
8
Search/Retrieve_Web_Service:search/retrieve web service search/retrieve web service srw web service search retrieval srw provides soap interface queries augment url interface provided companion protocol search/retrieve via url sru queries sru srw expressed using contextual query language cql standards srw sru cql promulgated united states library congress
[ 6986, 2819, 98, 5612, 80, 84, 7315, 2261, 5885, 6024 ]
Validation
7,199
6
Fdupes:fdupes fdupes program written adrián lópez scan directories duplicate files options list delete replace files hardlinks pointing duplicate first compares file sizes partial md5 signatures full md5 signatures performs byte-by-byte comparison verification fdupes written c released mit license
[ 1710, 1281, 1435 ]
Test
7,200
4
Distinguishing_attack:distinguishing attack cryptography distinguishing attack form cryptanalysis data encrypted cipher allows attacker distinguish encrypted data random data modern symmetric-key ciphers specifically designed immune attack words modern encryption schemes pseudorandom permutations designed ciphertext indistinguishability algorithm found distinguish output random faster brute force search considered break cipher similar concept known-key distinguishing attack whereby attacker knows key find structural property cipher transformation plaintext ciphertext random prove cryptographic function safe often compared random oracle function would random oracle attacker able predict output function function distinguishable random oracle non-random properties exists relation different outputs input output used attacker example find part input example let sequence random bits generated random oracle sequence generated pseudo-random bit generator two parties use one encryption system encrypt message length n bitwise xor next n bits respectively output encryption using truly random sequence distinguished output encryption appear random well sequence distinguishable encryption may reveal information m. two systems said indistinguishable exists algorithm connected either able decide whether connected t. distinguishing attack given algorithm d. broadly attack attacker given black box containing either instance system attack unknown key random object domain system aims emulate algorithm able tell whether system random object black box one attack example distinguishing attack stream cipher rc4 might one determines whether given stream bytes random generated rc4 unknown key classic examples distinguishing attack popular stream cipher itsik mantin adi shamir showed 2nd output byte rc4 heavily biased toward zero another example souradyuti paul bart preneel cosic shown xor value 1st 2nd outputs rc4 also non-uniform significantly theoretical biases demonstrable computer simulation
[ 1811, 4930, 464, 807, 1353, 2918, 3100, 119, 7548, 1283, 6637, 1480, 6647, 4805, 5765, 5327, 6657, 7928, 1587, 5333, 6763, 6049, 161, 433, 1320, 613, 1146, 4917 ]
Test
7,201
6
FreeArc:freearc freearc free open-source high-performance file archiver developed bulat ziganshin beta version 0.666 released 2010 freearc next version development version fa 0.11 released october 2016. still current version next version supports 32- 64-bit windows linux includes zstandard support current status information released developers since 2016 website offline longer accessible project considered abandoned users sourceforge confirmed sources reddit software archived longer actively developed august 2019 freearc uses lzma prediction partial matching trueaudio tornado grzip algorithms automatic switching file type additionally uses filters improve compression including rep finds repetitions separations 1gb dict dictionary replacements text delta improves compression tables binary data bcj executables preproccesor lzp removes repetitions text 2010 tom hardware benchmarks comparing popular archivers freearc narrowly outperformed winzip 7-zip winrar best compression mode default compression tests lost 7-zip lzma2 still compressed better winrar winzip tom hardware tests freearc outpaced default settings 7zip lzma2 default compression also winrar even best compression settings freearc compression best settings slower 7zip winrar still came ahead winzip metric devised werner bergmans maximum compression benchmark freearc compression efficient programs classic formats like .z lzw .zip deflate .gz bzip2 scoring formula used non-public test multiplies sum compression decompression times factor exponentially grades ratio archive sizes achieved program test relative best known archive size data set november 2010 freearc top program benchmark followed nanozip bsc winrar works faster winrar 7zip like rar zip archiver data compressor like gzip bzip2 initially supported archive format normally identified codice_1 file name extension incompatible others relationship .arc formats recently decompression support archive types added including zip rar 7z freearc command line interface gui features include windows binaries available developer 64-bit variant version 0.666 october 2016 first public release freearc next released currently available cli application 32 64 bit windows linux platforms new features include
[ 2810, 4213, 7058, 985, 4759, 1352, 2740, 3368, 6992, 5571, 2026, 658, 578, 4700, 7555, 1955, 7746, 3032, 2589, 753, 6211, 7387, 510, 3219, 1675, 7669, 8126, 1127, 2334, 6940, 7581, 4732, 5256, 6489, 3152, 6232, 169, 1139, 3413, 7584, 53...
Test
7,202
0
Intelligent_character_recognition:intelligent character recognition computer science intelligent character recognition icr advanced optical character recognition ocr — rather specific — handwriting recognition system allows fonts different styles handwriting learned computer processing improve accuracy recognition levels icr software self-learning system referred neural network automatically updates recognition database new handwriting patterns extends usefulness scanning devices purpose document processing printed character recognition function ocr hand-written matter recognition process involved recognising hand writing accuracy levels may circumstances good achieve 97 accuracy rates reading handwriting structured forms often achieve high recognition rates several read engines used within software given elective voting rights determine true reading characters numeric fields engines designed read numbers take preference alpha fields engines designed read hand written letters higher elective rights used conjunction bespoke interface hub hand-written data automatically populated back office system avoiding laborious manual keying accurate traditional human data entry important development icr invention automated forms processing 1993 joseph corcoran awarded patent invention involved three-stage process capturing image form processed icr preparing enable icr engine give best results capturing information using icr engine finally processing results automatically validate output icr engine application icr increased usefulness technology made applicable use real world forms normal business applications modern software applications use icr technology recognizing text forms filled hand hand-printed intelligent word recognition iwr recognize extract ria printed-handwritten information cursive handwriting well icr recognizes character-level whereas iwr works full words phrases capable capturing unstructured information every day pages iwr said evolved hand print icr meant replace conventional icr ocr systems iwr optimized processing real-world documents contain mostly free-form hard-to-recognize data fields inherently unsuitable icr means highest best use iwr eliminate high percentage manual entry handwritten data run-on hand print fields documents otherwise could keyed humans
[ 5885, 4089, 1314, 715 ]
Test
7,203
4
Shavlik_Technologies:shavlik technologies shavlik technologies privately held company founded 1993 mark shavlik one original developers windows nt late 1980s early 1990s microsoft company provided software services network vulnerability assessment managing network security patches mark shavlik left role ceo shavlik technologies acquired vmware may 2011 held position vice president general manager vmware march 2013 april 2013 landesk purchased shavlik business unit rights shavlik products vmware period landesk announced partnership made vmware alliance partner 2017 landesk merged heat software created new software company called ivanti today shavlik name retired shavlik products vital ivanti security portfolio prior acceptance windows nt legitimate enterprise operating system late 1990s enterprise software written unix mainframe operating system shavlik roots providing consulting services help organizations make leap microsoft os contributed delivering products nt shavlik later extended services business software security consulting primarily businesses highly regulated industries banking healthcare services centered providing certified information systems security professional cissp perform security audits penetration testing early 2000s failure keep software up-to-date applying patches common flag audits one central challenges addressing problem companies easy way determine machines date methodology deploy updates era microsoft wrestled addressing issue internally wanted tool detect nt servers large nt server environment missing patches hot fixes see hotfix could installed machines however nt servers critical operations microsoft required process completed without installing extra software agent servers effort address hot fix issue shavlik built first agentless patch scanner windows nt product named hfnetchk acronym designating hotfix network check hfnetchk release followed another partnership wherein shavlik helped build microsoft baseline security analyzer mbsa tool minimal patch scanning along basic os configuration checks delivered microsoft part windows 2000 server toolkit hfnetchk pro 3.0 never released externally introduced ability scan missing patches also deploy patches eliminated need administrator apply patches manually 2003 shavlik brought hfnetchk market first time version 4 featured visual basic web friendly user interface previous versions hfnetchk operated via command line interface january 2003 sql slammer worm exploited vulnerability sql server allowed denial service slowed traffic many internet hosts crawl worm went viral affecting 75,000 systems first ten minutes microsoft made patch available six months prior indicating failure patch led widespread security breach vulnerability shavlik hfnetchk first product market could scan deploy missing patches windows machines aftermath sql slammer worm series highly publicized exploits hit 2003/2004 shavlik made decision move away consulting fully invest software development patch management products shavlik added standalone integrated anti-virus capabilities version 5 hfnetchk changed product name hfnetchk protect eventually dropping hfnetchk version 6 timeframe protect introduced capability patch offline virtual machines vm templates project first series partnerships shavlik entered vmware capability meant protect could agentlessly patch machines physical virtual environments version 7 various point releases new user interface introduced well physical virtual asset inventory agent support integrated protect longer offered separately licensed product shavlik also shifted detection logic protect content version 8 protect fixed many stability issues due number customer complaints shavlik focused making product stable version 9 introduced hypervisor patching vmware implementations well ability patch off-network machines via cloud shavlik technological advancements significant enough attract attention microsoft resulting cooperative efforts two companies development microsoft baseline security analyzer mbsa based shavlik hfnetchk acronym designating hotfix network checker released 2001 technology evolved still core technology current product offerings licensed multiple oem partners provide patch management capabilities variety management solutions combined install base millions users across globe late 2000s industry saw applications exploited hackers shift microsoft os microsoft applications third-party applications like java adobe music players non-microsoft internet browsers time products like microsoft system center configuration manager sccm provided windows patch capabilities via windows server update services wsus however n't still n't patch third-party products according global analyst firm gartner left administrators limited choices n't patch third-party products leaving network risk author test custom patch time third-party product requires update deploy patches manually affected machine april 2010 shavlik released scupdates – catalog patch content automated process building third-party patches delivering windows clients via integration microsoft system center updates publisher scup sccm tandem initial scupdates release microsoft shavlik also announced shavlik inclusion microsoft system center alliance 2010 shavlik released it.shavlik provided web-based front-end traditional shavlik toolkit asset inventory patch scanning patch deployment software service saas application simplified workflow inventory systems patching possible on-premises protect solution early 2009 shavlik formed oem partnership vmware build cloud-based application designed help administrators smaller businesses deploy virtual environment vmware go vgo intended onramp virtualization serving smaller customers ready upgrade sophisticated vcenter suite vgo originally brought market free-use cloud-based product vmware shavlik invested heavily vgo product expanded include asset inventory patch scanning advisor recommendation engine later attempts monetize vgo services paid version called vmware go pro introduced patch deployment led migration users it.shavlik vmware go vmware interest vgo well virtual infrastructure patching capabilities within protect led acquisition shavlik technologies may 2011 terms acquisition publicly disclosed january 2013 vmware announced intent sharpen focus software-defined data center hybrid cloud services part realignment vmware sought sell products n't contributing core business sliderocket presentation software non-key cloud virtualization technologies shavlik product line found list april 2013 landesk software purchased shavlik business unit rights shavlik products vmware time landesk announced partnership added vmware landesk list alliance partners shavlik move landesk triggered new investment shavlik patch microsoft system center formerly scupdates well products enhance experience companies using sccm early 2017 clearlake capital group acquired landesk shavlik along heat software appsense wavelink combined company uses new corporate name product brand ivanti
[ 7192, 3962, 4295, 6256, 1805 ]
Validation
7,204
9
Essentials_of_Programming_Languages:essentials programming languages essentials programming languages eopl textbook programming languages daniel p. friedman mitchell wand christopher t. haynes eopl surveys principles programming languages operational perspective starts interpreter scheme simple functional core language similar lambda calculus systematically adds constructs addition example variable assignment thread-like control book illustrates increase expressive power programming language demand new constructs formulation direct interpreter book also demonstrates systematic transformations say store-passing style continuation-passing style eliminate certain constructs language interpreter formulated second part book dedicated systematic translation interpreter register machines transformations show eliminate higher-order closures continuation objects recursive function calls end reader left interpreter uses nothing tail-recursive function calls assignment statements plus conditionals becomes trivial translate code c program even assembly program bonus book shows pre-compute certain pieces meaning generate representation pre-computations since essence compilation book also prepares reader course principles compilation language translation related distinct topic apart text explaining key concepts book also comprises series exercises enabling readers explore alternative designs issues like sicp eopl represents significant departure prevailing textbook approach 1980s time book principles programming languages presented four six even programming languages discussed programming idioms implementation high level successful books typically covered algol 60 so-called algol family programming languages snobol lisp prolog even today fair number textbooks programming languages surveys though scope narrowed eopl started 1983 indiana one leading departments programming languages research eugene kohlbecker one friedman phd students transcribed collected 311 lectures faculty members including mitch wand christopher haynes started contributing turned hitchhiker guide meta-universe —as kohlbecker called it—into systematic interpreter transformation-based survey 25 years existence book become near-classic third edition including additional topics types modules first part incorporates ideas programming htdp another unconventional textbook uses scheme teach principles program design authors well matthew flatt recently provided drracket plug-ins language levels teaching eopl eopl spawned least two related texts queinnec lisp small pieces krishnamurthi
[ 7032, 4543, 3409, 7383, 1114, 4737, 6475 ]
Test
7,205
1
Relation_(database):relation database relational database theory relation originally defined e. f. codd set tuples ... element member data domain codd original definition notwithstanding contrary usual definition mathematics ordering elements tuples relation instead element termed attribute value attribute name paired domain nowadays commonly referred type data type attribute value attribute name paired element attribute domain tuple set attribute values two distinct elements name thus accounts tuple described function mapping names values set attributes two distinct elements name called heading set tuples heading called body relation thus heading paired body heading relation also heading tuple body number attributes constituting heading called degree term also applies tuples relations term n -tuple refers tuple degree n n ≥ 0 e. f. codd used term relation mathematical sense finitary relation set tuples set n sets ... thus n -ary relation interpreted closed world assumption extension n -adic predicate n -tuples whose values substituted corresponding free variables predicate yield propositions hold true appear relation term relation schema refers heading paired set constraints defined terms heading relation thus seen instantiation relation schema heading schema satisfies applicable constraints sometimes relation schema taken include name relational database definition database schema sometimes referred relational schema thus thought collection named relation schemas implementations domain attribute effectively data type named relation schema effectively relation variable relvar short sql database language relational databases relations represented tables row table represents single tuple values attribute form column example relation three named attributes 'id domain integers 'name 'address domain strings predicate relation using attribute names denote free variables might employee number id known name lives address examination relation tells us four tuples predicate holds true example employee 102 known name yonezawa akinori live anywhere else naha okinawa also apart four employees shown employee name address definition body tuples body appear particular order one say tuple 'murata makoto tuple 'matsumoto yukihiro one say tuple 'yonezawa akinori first tuple similar comment applies rows sql table definition heading attributes element appear particular order either therefore elements tuple similar comment apply sql define ordering columns table relational database consists named relation variables relvars purposes updating database response changes real world update single relvar causes body relation assigned variable replaced different set tuples relvars classified two classes base relation variables derived relation variables latter also known virtual relvars usually referred short term view base relation variable relation variable derived relation variables sql term base table equates approximately base relation variable view defined expression using operators relational algebra relational calculus expression operates one relations evaluated yields another relation result sometimes referred derived relation operands relations assigned database variables view defined giving name expression name subsequently used variable name note expression must mention least one base relation variable using data definition language ddl able define base relation variables sql codice_1 syntax used define base tables following example data definition language ddl also used define derived relation variables sql codice_2 syntax used define derived relation variable following example
[ 1449, 7248, 5209, 7715, 1730, 3951, 3776, 6345, 7067, 3005, 6430, 7071, 1003, 3011, 4950, 6543, 7184, 2124, 927, 4798, 5673, 6462, 1861, 6128, 2054, 7022, 5419, 7205, 684, 517, 7213, 7303, 1415, 6144, 1417, 4274, 1891, 4457, 1792, 784, ...
Validation
7,206
3
Blasteroids:blasteroids blasteroids third official sequel 1979 shoot 'em video game asteroids developed atari games released coin-operated game 1987 unlike previous games blasteroids uses raster graphics vector graphics home computer ports blasteroids released image works amiga amstrad cpc atari st commodore 64 msx ms-dos zx spectrum additionally though appeared midway arcade compilation prior emulated version blasteroids included lego dimensions unlockable mini-game gameplay game basically original player players case 2-player game controls spaceship viewed 2d representation space rotating ship using thrust give ship momentum slow completely stop moving player rotate ship face direction came generate right amount thrust nullify momentum ship limited amount fuel generate thrust fuel comes form energy also used ship shields protect collisions enemy fire energy gone player ship destroyed ship shoot destroy asteroids enemy ships ship also transformed 3 different versions namely speeder fastest version fighter firepower warrior extra armour start game player screen four warps indicating game difficulty easy medium hard expert flying warps starts game difficulty several galaxies 9 16 sectors depending difficulty sector completed destroying asteroids exit portal appears lead player galactic map screen similarly difficulty screen player choose sector visit next completed empty sectors revisited costs energy sectors currently range marked sector consists visible screen wraparound object game destroy asteroids set speed fly sector asteroids come varying sizes shot larger asteroids break multiple smaller ones shooting smallest ones actually remove sector asteroids also come different types normal asteroids n't contain anything red asteroids contain power-ups form power crystals released completely destroying asteroids crystals decay time popcorn asteroids require several hits expands size eventually makes stop spinning ca n't destroyed stopping enough finish sector egg asteroids contain leeches home user ship suck energy shot destroyed finally seeker asteroids home player ship shot besides asteroids different enemy ships trying shoot player leave equipment form power-ups destroyed different kinds equipment mukor alien boss sectors cleared asteroids try ram player send miniature enemy ships aid mukor tentacles must shot multiple times destroyed tentacles gone mukor defeated leave special equipment reappear next galaxy larger number tentacles making harder defeat mukor must defeated galaxies fully conquered player win game second player join game time pressing fire button using 1 credit turning blasteroids multiplayer game players cooperate covering well docking ships starlet docking possible one ship speeder warrior flying turn speeder stationary turret firepower top warrior turns spiaret less firepower full control ships undock either player transforms ship something else first player exit exit portal gets large bonus control galactic map
[ 6380 ]
Test
7,207
4
Wired_Equivalent_Privacy:wired equivalent privacy wired equivalent privacy wep security algorithm ieee 802.11 wireless networks introduced part original 802.11 standard ratified 1997 intention provide data confidentiality comparable traditional wired network wep recognizable key 10 26 hexadecimal digits 40 104 bits one time widely use often first security choice presented users router configuration tools 2003 wi-fi alliance announced wep superseded wi-fi protected access wpa 2004 ratification full 802.11i standard i.e wpa2 ieee declared wep-40 wep-104 deprecated wep encryption protocol available 802.11a 802.11b devices built wpa standard available 802.11g devices however 802.11b devices later provided firmware software updates enable wpa newer devices built wep ratified wi-fi security standard 1999 first versions wep particularly strong even time released u.s. restrictions export various cryptographic technology led manufacturers restricting devices 64-bit encryption restrictions lifted increased 128-bit despite introduction 256-bit wep 128-bit remains one common implementations wep included privacy component original ieee 802.11 standard ratified 1997 wep uses stream cipher rc4 confidentiality crc-32 checksum integrity deprecated 2004 documented current standard standard 64-bit wep uses 40 bit key also known wep-40 concatenated 24-bit initialization vector iv form rc4 key time original wep standard drafted u.s. government export restrictions cryptographic technology limited key size restrictions lifted manufacturers access points implemented extended 128-bit wep protocol using 104-bit key size wep-104 64-bit wep key usually entered string 10 hexadecimal base 16 characters 0–9 a–f character represents 4 bits 10 digits 4 bits gives 40 bits adding 24-bit iv produces complete 64-bit wep key 4 bits × 10 24 bits iv 64 bits wep key devices also allow user enter key 5 ascii characters 0–9 a–z a–z turned 8 bits using character byte value ascii 8 bits × 5 24 bits iv 64 bits wep key however restricts byte printable ascii character small fraction possible byte values greatly reducing space possible keys 128-bit wep key usually entered string 26 hexadecimal characters 26 digits 4 bits gives 104 bits adding 24-bit iv produces complete 128-bit wep key 4 bits × 26 24 bits iv 128 bits wep key devices also allow user enter 13 ascii characters 8 bits × 13 24 bits iv 128 bits wep key 152-bit 256-bit wep systems available vendors wep variants 24 bits iv leaving 128 232 bits actual protection 128 232 bits typically entered 32 58 hexadecimal characters 4 bits × 32 24 bits iv 152 bits wep key 4 bits × 58 24 bits iv 256 bits wep key devices also allow user enter 16 29 ascii characters 8 bits × 16 24 bits iv 152 bits wep key 8 bits × 29 24 bits iv 256 bits wep key two methods authentication used wep open system authentication shared key authentication open system authentication wlan client provide credentials access point authentication client authenticate access point attempt associate effect authentication occurs subsequently wep keys used encrypting data frames point client must correct keys shared key authentication wep key used authentication four-step challenge-response handshake authentication association pre-shared wep key also used encrypting data frames using rc4 first glance might seem though shared key authentication secure open system authentication since latter offers real authentication however quite reverse possible derive keystream used handshake capturing challenge frames shared key authentication therefore data easily intercepted decrypted shared key authentication open system authentication privacy primary concern advisable use open system authentication wep authentication rather shared key authentication however also means wlan client connect ap authentication mechanisms weak shared key wep deprecated favor wpa/wpa2 rc4 stream cipher traffic key must never used twice purpose iv transmitted plain text prevent repetition 24-bit iv long enough ensure busy network way iv used also opened wep related key attack 24-bit iv 50 probability iv repeat 5000 packets august 2001 scott fluhrer itsik mantin adi shamir published cryptanalysis wep exploits way rc4 ciphers iv used wep resulting passive attack recover rc4 key eavesdropping network depending amount network traffic thus number packets available inspection successful key recovery could take little one minute insufficient number packets sent ways attacker send packets network thereby stimulate reply packets inspected find key attack soon implemented automated tools since released possible perform attack personal computer off-the-shelf hardware freely available software aircrack-ng crack wep key minutes cam-winget et al surveyed variety shortcomings wep write experiments field show proper equipment practical eavesdrop wep-protected networks distances mile target also reported two generic weaknesses 2005 group u.s. federal bureau investigation gave demonstration cracked wep-protected network 3 minutes using publicly available tools andreas klein presented another analysis rc4 stream cipher klein showed correlations rc4 keystream key ones found fluhrer mantin shamir additionally used break wep wep-like usage modes 2006 bittau handley lackey showed 802.11 protocol used wep enable earlier attacks previously thought impractical eavesdropping single packet attacker rapidly bootstrap able transmit arbitrary data eavesdropped packet decrypted one byte time transmitting 128 packets per byte decrypt discover local network ip addresses finally 802.11 network connected internet attacker use 802.11 fragmentation replay eavesdropped packets crafting new ip header onto access point used decrypt packets relay buddy internet allowing real-time decryption wep traffic within minute eavesdropping first packet 2007 erik tews andrei pychkine ralf-philipp weinmann able extend klein 2005 attack optimize usage wep new attack possible recover 104-bit wep key probability 50 using 40,000 captured packets 60,000 available data packets success probability 80 85,000 data packets 95 using active techniques like deauth arp re-injection 40,000 packets captured less one minute good conditions actual computation takes 3 seconds 3 mb main memory pentium-m 1.7 ghz additionally optimized devices slower cpus attack used 40-bit keys even higher success probability 2008 payment card industry pci security standards council latest update data security standard dss prohibits use wep part credit-card processing 30 june 2010 prohibits new system installed uses wep 31 march 2009 use wep contributed tj maxx parent company network invasion use encrypted tunneling protocols e.g ipsec secure shell provide secure data transmission insecure network however replacements wep developed goal restoring security wireless network recommended solution wep security problems switch wpa2 wpa intermediate solution hardware could support wpa2 wpa wpa2 much secure wep add support wpa wpa2 old wi-fi access points might need replaced firmware upgraded wpa designed interim software-implementable solution wep could forestall immediate deployment new hardware however tkip basis wpa reached end designed lifetime partially broken officially deprecated release 802.11-2012 standard stopgap enhancement wep present early 802.11i drafts implementable hardware able handle wpa wpa2 extended iv key values 128 bits hoped eliminate duplicate iv deficiency well stop brute force key attacks became clear overall wep algorithm deficient iv key sizes would require even fixes wep2 name original algorithm dropped two extended key lengths remained eventually became wpa tkip wepplus also known wep+ proprietary enhancement wep agere systems formerly subsidiary lucent technologies enhances wep security avoiding weak ivs completely effective wepplus used ends wireless connection easily enforced remains serious limitation also necessarily prevent replay attacks ineffective later statistical attacks rely weak ivs dynamic wep refers combination 802.1x technology extensible authentication protocol dynamic wep changes wep keys dynamically vendor-specific feature provided several vendors 3com dynamic change idea made 802.11i part tkip actual wep algorithm
[ 5194, 3081, 6515, 2095, 1353, 1261, 3952, 728, 5929, 5046, 3797, 4517, 409, 6211, 1403, 762, 7209, 5776, 4986, 2338, 7214, 7862, 1505, 7220, 4746, 1708 ]
Test
7,208
4
Vectra_AI:vectra ai vectra ai inc. applies artificial intelligence detects responds hidden cyberattackers inside cloud data center enterprise networks company ’ cognito platform designed detect cyberattacker behaviors infrastructures allow security analysts conduct incident investigations hunt hidden threats using security-enriched metadata augment cognito platform vectra threat researchers identify investigate cyberattacks vulnerabilities malicious behaviors unknown world data sets research data scientists develop machine learning algorithms behavioral analysis drive cognito platform investors vectra include khosla ventures tcv accel partners ia ventures ame cloud ventures dag ventures wipro ventures atlantic bridge ireland strategic investment fund nissho electronics silver lake vectra founded 2010 tracevector llc new york city incorporated 2012 name vectra networks company headquartered san jose calif. facilities austin texas cambridge mass. switzerland germany ireland united kingdom france vectra ’ team includes threat researchers white hats data scientists security engineers user interface designers key executives hitesh sheth president chief executive officer oliver tavakoli chief technology officer howie shohet chief financial officer kevin moore senior vice president worldwide field operations didi dayton vice president worldwide channels alliances jennifer wang vice president customer success mike banic vice president marketing kevin kennedy vice president product management jason kehl vice president engineering aaron bean vice president human resources gerard bauer vice president emea sales board members include hitesh sheth president ceo vectra kevin dillon co-founder managing partner atlantic bridge charles giancarlo ceo pure storage brad gillespie general partner ia ventures jim messina founder ceo messina group bruce armstrong operating partner kholsa ventures eric wolford venture partner accel partners cognito platform vectra provides continuous automated threat surveillance expose hidden unknown cyberattackers actively spread inside networks cognito analyzes network traffic private data centers public clouds enterprise environments detect hidden cyberattacker behaviors cognito platform identifies prioritizes threat detections based severity certainty scores empowers security teams prevent data loss quickly mitigating serious attacks first threat behaviors cyberattack techniques detected cognito include botnet command-and-control communications botnet monetization internal reconnaissance lateral movement data theft exfiltration vectra offers three applications cognito platform address use cases using ai incident detection triage security operations center helped one vectra customer – texas university system – resolve incident 10 20 minutes rather hours days vectra ai combines data science machine learning network behavioral analysis technologies identify patterns characterize malicious behavior within network cognito uses artificial intelligence including supervised learning unsupervised machine learning deep learning techniques detect respond advanced cyberattacks remediation actions taken security information event management siems firewalls endpoint security enforcement network access control orchestration integrated cognito via application programming interface vectra issued ten u.s. patents advanced cyber security analytics capabilities automated ai vectra publishes attacker behavior industry reports provide analysis active persistent attacker behaviors inside enterprise networks vectra customers reports examine wide range cyberattack detections trends 300+ vectra customersfrom nine different industries reports span strategic phases attack lifecycle vectra customers received industry recognition including
[ 8123 ]
Test
7,209
4
Wi-Fi_Protected_Access:wi-fi protected access wi-fi protected access wpa wi-fi protected access ii wpa2 wi-fi protected access 3 wpa3 three security protocols security certification programs developed wi-fi alliance secure wireless computer networks alliance defined response serious weaknesses researchers found previous system wired equivalent privacy wep wpa sometimes referred draft ieee 802.11i standard became available 2003 wi-fi alliance intended intermediate measure anticipation availability secure complex wpa2 became available 2004 common shorthand full ieee 802.11i ieee 802.11i-2004 standard january 2018 wi-fi alliance announced release wpa3 several security improvements wpa2 wi-fi alliance intended wpa intermediate measure take place wep pending availability full ieee 802.11i standard wpa could implemented firmware upgrades wireless network interface cards designed wep began shipping far back 1999 however since changes required wireless access points aps extensive needed network cards pre-2003 aps could upgraded support wpa wpa protocol implements much ieee 802.11i standard specifically temporal key integrity protocol tkip adopted wpa wep used 64-bit 128-bit encryption key must manually entered wireless access points devices change tkip employs per-packet key meaning dynamically generates new 128-bit key packet thus prevents types attacks compromised wep wpa also includes message integrity check designed prevent attacker altering resending data packets replaces cyclic redundancy check crc used wep standard crc main flaw provide sufficiently strong data integrity guarantee packets handled well tested message authentication codes existed solve problems required much computation used old network cards wpa uses message integrity check algorithm called tkip verify integrity packets tkip much stronger crc strong algorithm used wpa2 researchers since discovered flaw wpa relied older weaknesses wep limitations message integrity code hash function named michael retrieve keystream short packets use re-injection spoofing wpa2 replaced wpa wpa2 requires testing certification wi-fi alliance implements mandatory elements ieee 802.11i particular includes mandatory support ccmp aes-based encryption mode certification began september 2004 march 13 2006 wpa2 certification mandatory new devices bear wi-fi trademark january 2018 wi-fi alliance announced wpa3 replacement wpa2 new standard uses 128-bit encryption wpa3-personal mode 192-bit wpa3-enterprise forward secrecy wpa3 standard also replaces pre-shared key exchange simultaneous authentication equals defined ieee 802.11-2016 resulting secure initial key exchange personal mode wi-fi alliance also claims wpa3 mitigate security issues posed weak passwords simplify process setting devices display interface wpa designed specifically work wireless hardware produced prior introduction wpa protocol provides inadequate security wep devices support wpa applying firmware upgrades available legacy devices wi-fi devices certified since 2006 support wpa wpa2 security protocols wpa2 may work older network cards different wpa versions protection mechanisms distinguished based target end-user according method authentication key distribution encryption protocol used originally eap-tls extensible authentication protocol transport layer security certified wi-fi alliance april 2010 wi-fi alliance announced inclusion additional eap types wpa- wpa2- enterprise certification programs ensure wpa-enterprise certified products interoperate one another 802.1x clients servers developed specific firms may support eap types certification attempt popular eap types interoperate failure one major issues preventing rollout 802.1x heterogeneous networks commercial 802.1x servers include microsoft internet authentication service juniper networks steelbelted radius well aradial radius server freeradius open source 802.1x server pre-shared key wpa wpa2 remain vulnerable password cracking attacks users rely weak password passphrase wpa passphrase hashes seeded ssid name length rainbow tables exist top 1,000 network ssids multitude common passwords requiring quick lookup speed cracking wpa-psk brute forcing simple passwords attempted using aircrack suite starting four-way authentication handshake exchanged association periodic re-authentication wpa3 replaces cryptographic protocols susceptible off-line analysis protocols require interaction infrastructure guessed password supposedly placing temporal limits number guesses however design flaws wpa3 enables attackers plausibly launch brute-force attacks see dragonblood attack wpa wpa2 n't provide forward secrecy meaning adverse person discovers pre-shared key potentially decrypt packets encrypted using psk transmitted future even past could passively silently collected attacker also means attacker silently capture decrypt others packets wpa-protected access point provided free charge public place password usually shared anyone place words wpa protects attackers n't access password safer use transport layer security tls similar top transfer sensitive data however starting wpa3 issue addressed mathy vanhoef frank piessens significantly improved upon wpa-tkip attacks erik tews martin beck demonstrated inject arbitrary amount packets packet containing 112 bytes payload demonstrated implementing port scanner executed client using wpa-tkip additionally showed decrypt arbitrary packets sent client mentioned used hijack tcp connection allowing attacker inject malicious javascript victim visits website contrast beck-tews attack could decrypt short packets mostly known content arp messages allowed injection 3 7 packets 28 bytes beck-tews attack also requires quality service defined 802.11e enabled vanhoef-piessens attack neither attack leads recovery shared session key client access point authors say using short rekeying interval prevent attacks strongly recommend switching tkip aes-based ccmp halvorsen others show modify beck-tews attack allow injection 3 7 packets size 596 bytes downside attack requires substantially time execute approximately 18 minutes 25 seconds work vanhoef piessens showed wpa used encrypt broadcast packets original attack also executed important extension substantially networks use wpa protect broadcast packets protect unicast packets execution time attack average around 7 minutes compared 14 minutes original vanhoef-piessens beck-tews attack vulnerabilities tkip significant wpa-tkip held extremely safe combination indeed wpa-tkip still configuration option upon wide variety wireless routing devices provided many hardware vendors survey 2013 showed 71 still allow usage tkip 19 exclusively support tkip serious security flaw revealed december 2011 stefan viehböck affects wireless routers wi-fi protected setup wps feature regardless encryption method use recent models feature enable default many consumer wi-fi device manufacturers taken steps eliminate potential weak passphrase choices promoting alternative methods automatically generating distributing strong keys users add new wireless adapter appliance network methods include pushing buttons devices entering 8-digit pin wi-fi alliance standardized methods wi-fi protected setup however pin feature widely implemented introduced major new security flaw flaw allows remote attacker recover wps pin router wpa/wpa2 password hours users urged turn wps feature although may possible router models also pin written label wi-fi routers wps changed compromised wpa3 introduces new alternative configuration devices lack sufficient user interface capabilities allowing nearby devices serve adequate ui network provisioning purposes thus mitigating need wps several weaknesses found ms-chapv2 severely reduce complexity brute-force attacks making feasible modern hardware 2012 complexity breaking ms-chapv2 reduced breaking single des key work moxie marlinspike marsh ray moxie advised enterprises depending mutual authentication properties ms-chapv2 connection wpa2 radius servers immediately start migrating something else tunneled eap methods using ttls peap encrypt mschapv2 exchange widely deployed protect exploitation vulnerability however prevalent wpa2 client implementations early 2000s prone misconfiguration end users cases e.g android lacked user-accessible way properly configure validation aaa server certificate cns extended relevance original weakness mschapv2 within mitm attack scenarios stricter wpa2 compliance tests announce alongside wpa3 certified client software required conform certain behaviors surrounding aaa certificate validation hole196 vulnerability wpa2 protocol abuses shared group temporal key gtk used conduct man-in-the-middle denial-of-service attacks however assumes attacker already authenticated access point thus possession gtk 2016 shown wpa wpa2 standards contain insecure expository random number generator rng researchers showed vendors implement proposed rng attacker able predict group key gtk supposed randomly generated access point ap additionally showed possession gtk enables attacker inject traffic network allowed attacker decrypt internet traffic transmitted wireless network demonstrated attack asus rt-ac51u router uses mediatek out-of-tree drivers generate gtk showed gtk recovered within two minutes less similarly demonstrated keys generated broadcom access daemons running vxworks 5 later recovered four minutes less affects example certain versions linksys wrt54g certain apple airport extreme models vendors defend attack using secure rng hostapd running linux kernels vulnerable attack thus routers running typical openwrt lede installations exhibit issue october 2017 details krack key reinstallation attack attack wpa2 published krack attack believed affect variants wpa wpa2 however security implications vary implementations depending upon individual developers interpreted poorly specified part standard software patches resolve vulnerability available devices april 2019 serious design flaws wpa3 found allow attackers perform downgrade attacks side-channel attacks enabling brute-forcing passphrase well launching denial-of-service attacks wi-fi base stations
[ 4116, 2451, 4926, 3081, 6515, 2823, 1821, 1353, 1261, 3952, 728, 3105, 4321, 5740, 7637, 5486, 309, 2659, 5929, 740, 3797, 3799, 1708, 2944, 2672, 4517, 5760, 6211, 1582, 7207, 7209, 2876, 2338, 3230, 4093, 1691, 2885, 1418, 7589, 7777, ...
Validation
7,210
9
BANCStar_programming_language:bancstar programming language bancstar specialist computer programming language financial applications language internal language national financial computer services inc later broadway seymour bancstar application software automate operations bank branch language fixed format four integer command language nfcs internally referred screen code resembles esoteric programming language much sometimes mistaken joke language conceptually bancstar application executed screen code much like primitive virtual machine 5.1c release legal characters numerals 0–9 comma minus sign carriage return however used real commercial applications originally intended generated code user interface-building tool — similar bytecode rendered ascii — due limitations tool became directly programmed language bancstar 10.0 release changed screen code format binary rearranged numeric codes opcode variable number parameter integers 10.0 opcode encoded bit mapped length value indicated length command words
[ 5171 ]
Test
7,211
2
IPhone_11:iphone 11 iphone 11 series upcoming smartphones designed developed marketed apple rumoured released september 10 2019 steve jobs theater apple park cupertino apple ceo tim cook may go sale september 21 2019 phone unique among iphones details regarding phone widely leaked august 2019 weeks phone release thirteenth-generation flagships iphone successors iphone xs xr phone criticized due small improvements predecessors mainly camera quality reported phone also keep notch design featured iphone x
[ 2108, 6788 ]
Test
7,212
3
ATX:atx atx advanced technology extended motherboard power supply configuration specification developed intel 1995 improve previous de facto standards like design first major change desktop computer enclosure motherboard power supply design many years improving standardization interchangeability parts specification defines key mechanical dimensions mounting point i/o panel power connector interfaces computer case motherboard power supply atx common motherboard design standards smaller boards including microatx flexatx nano-itx mini-itx usually keep basic rear layout reduce size board number expansion slots dimensions full-size atx board allows many atx chassis also accept microatx boards official atx specifications released intel 1995 revised numerous times since recent atx motherboard specification version 2.2 recent atx12v power supply unit specification 2.4 released april 2013 eatx extended atx bigger version atx motherboard 12 x 13 inch dimensions advantages eatx motherboard dual socket support 2004 intel announced btx balanced technology extended standard intended replacement atx atx design still remains popular btx introduced manufacturers back computer case major changes made standard originally style cases keyboard connector expansion slots add-on card backplates onboard interfaces serial parallel ports connected via flying leads connectors mounted either spaces provided case brackets placed unused expansion slot positions atx allowed motherboard manufacturer put ports rectangular area back system arrangement could define though number general patterns depending ports motherboard offers followed manufacturers cases usually fitted snap-out panel also known i/o plate i/o shield one common arrangements necessary i/o plates replaced suit motherboard fitted i/o plates usually included motherboards designed particular computer computer operate correctly without plate fitted although open gaps case may compromise emi/rfi screening allow ingress dirt random foreign bodies panels made allowed fitting motherboard atx case atx motherboards come integrated i/o plate atx also made ps/2-style mini-din keyboard mouse connectors ubiquitous systems used 5-pin din connector keyboard generally used serial port mice although ps/2 mouse ports also found systems many modern motherboards phasing ps/2-style keyboard mouse connectors favor modern universal serial bus legacy connectors slowly phased modern atx motherboards include 25-pin parallel ports 9-pin rs-232 serial ports place onboard peripheral ports ethernet firewire esata audio ports analog s/pdif video analog d-sub dvi hdmi displayport extra usb ports wi-fi several atx-derived designs specified use power supply mountings basic back panel arrangement set different standards size board number expansion slots standard atx provides seven slots spacing popular microatx size removes three slots leaving four width refers distance along external connector edge depth front rear note larger size inherits previous smaller colors area note aopen conflated term mini atx recent design since references mini atx removed atx specifications since adoption microatx aopen definition contemporary term one listed apparently historical significance number manufacturers added one two three additional expansion slots standard 0.8 inch spacing standard 12-inch atx motherboard width form factors considered obsolete 1999 included baby-at full size semi-proprietary lpx low-profile cases proprietary motherboard designs compaq packard-bell hewlett packard others existed interchangeable multi-manufacturer boards cases portable notebook computers custom motherboards unique particular products although true e-atx motherboard manufacturers also refer motherboards measurements e-atx e-atx ssi eeb server system infrastructure ssi forum enterprise electronics bay eeb share dimensions screw holes two standards align rendering incompatible 2008 foxconn unveiled foxconn f1 motherboard prototype width standard atx motherboard extended 14.4 length accommodate 10 slots firm called new design motherboard ultra atx ces 2008 showing also unveiled january 2008 ces lian li armorsuit pc-p80 case 10 slots designed motherboard name xl-atx used least three companies different ways september 2009 evga corporation already released xl-atx motherboard evga x58 classified 4-way sli gigabyte technology launched another xl-atx motherboard model number ga-x58a-ud9 2010 measuring ga-x79-ud7 2011 measuring april 2010 gigabyte announced ga-890fxa-ud7 motherboard allowed seven slots moved downward one slot position added length could allowed placement eight expansion slots top slot position vacant particular model msi released msi x58 big bang 2010 msi p67 big bang marshal 2011 msi x79 xpower big bang 2 2012 msi z87 xpower 2013 although boards room additional expansion slots 9 8 total respectively three provide seven expansion connectors topmost positions left vacant provide room cpu chipset associated cooling 2010 evga corporation released new motherboard super record 2 sr-2 whose size surpasses evga x58 classified 4-way sli new board designed accommodate two dual qpi lga1366 socket cpus e.g intel xeon similar intel skulltrail motherboard could accommodate two intel core 2 quad processors total seven pci-e slots 12 ddr3 ram slots new design dubbed hptx atx specification requires power supply produce three main outputs +3.3 v +5 v +12 v. low-power −12 v +5 v standby supplies also required −12 v supply primarily used provide negative supply voltage rs-232 ports also used one pin conventional pci slots primarily provide reference voltage models sound cards 5 v supply used produce trickle power provide soft-power feature atx pc turned well powering real-time clock conserve charge cmos battery −5 v output originally required supplied isa bus removed later versions atx standard became obsolete removal isa bus expansion slots isa bus still found computer compatible old ibm pc specification e.g. found playstation 4 originally motherboard powered one 20-pin connector atx power supply provides number peripheral power connectors modern systems two connectors motherboard 8-pin 4+4-pin auxiliary connector providing additional power cpu main 24-pin power supply connector extension original 20-pin version 20-pin molex 39-29-9202 motherboard 20-pin molex 39-01-2200 cable connector pin pitch 4.2 mm one sixth inch four wires special functions generally supply voltages must within ±5 nominal values times little-used negative supply voltages however ±10 tolerance specification ripple 10 hz–20 mhz bandwidth 20–24-pin molex mini-fit jr. power rating 600 volts 8 amperes maximum per pin using 18 awg wire large server motherboards 3d graphics cards required progressively power operate necessary revise extend standard beyond original 20-pin connector allow current using multiple additional pins parallel low circuit voltage restriction power flow connector pin maximum rated voltage single mini-fit jr pin would capable 4800 watts atx power supplies generally dimensions width height preceding lpx low profile extension form factor often incorrectly referred power supplies due ubiquitous use later baby systems even though actual power supply form factor physically larger share common mounting layout four screws arranged back side unit last dimension 140 mm depth frequently varied depths 160 180 200 230 mm used accommodate higher power larger fan and/or modular connectors original cases flat case style integrated power switch protruded power supply sits flush hole chassis utilizes paddle-style dpst switch similar pc pc-xt style power supplies later so-called baby lpx style computer cases power button directly connected system computer power supply psu general configuration double-pole latching mains voltage switch four pins connected wires four-core cable wires either soldered power button making difficult replace power supply failed blade receptacles used atx power supply typically controlled electronic switch connected power button computer case allows computer turned operating system addition many atx power supplies equivalent-function manual switch back also ensures power sent components switch power supply turned however computer turned front power button power supply connection motherboard changed older lpx standards lpx two similar connectors could accidentally interchanged forcing different keyed connectors place usually causing short-circuits irreversible damage motherboard rule thumb safe operation connect side-by-side connectors black wires together atx uses one large keyed connector connected incorrectly new connector also provides 3.3 volt source removing need motherboards derive voltage 5 v rail motherboards particularly manufactured introduction atx lpx equipment still use support lpx atx psus using atx psu purposes powering atx motherboard power fully turned always partly operate wake-up devices shorting power-on pin atx connector pin 16 green wire black wire ground power button atx system minimum load one voltages may required varies model vendor standard specify operation without minimum load conforming psu may shut output incorrect voltages otherwise malfunction hazardous damaged atx power supply replacement current-limited bench laboratory dc power supply instead better described bulk dc power supply original atx specification called power supply located near cpu power supply fan drawing cooling air outside chassis directing onto processor thought configuration cooling processor would achievable without need active heatsink recommendation removed later specifications modern atx power supplies usually exhaust air case atx introduced late 1995 defined three types power connectors power distribution specification defined psu power provided 5 v 3.3 v rails electronic components cpu ram chipset pci agp isa cards used 5 v 3.3 v power supply 12 v rail used computer fans motors peripheral devices hdd fdd cd-rom etc designing pentium 4 platform 1999/2000 standard 20-pin atx power connector found insufficient meet increasing power-line requirements standard significantly revised atx12v 1.0 atx12v 1.x sometimes inaccurately called atx-p4 atx12v 1.x also adopted amd athlon xp athlon 64 systems however early model athlon xp mp boards including server boards later model lower-end motherboards 4-pin connector described numbering atx revisions may little confusing atx refers design goes version 2.2 2004 24 pins atx12v 2.0 atx12v describes psu instance atx 2.03 pretty commonly seen psu 2000 2001 often include p4 12v connector even norm define yet main changes additions atx12v 1.0 released february 2000 formally called +12 v power connector commonly referred p4 connector first needed support pentium 4 processor pentium 4 processors generally powered 5 v rail later processors operate much lower voltages typically around 1 v draw 100 infeasible provide power low voltages high currents standard system power supply pentium 4 established practice generating dc-to-dc converter motherboard next processor powered 4-pin 12 v connector minor revision august 2000 power 3.3 v rail slightly increased smaller changes made relatively minor revision january 2002 significant change −5 v rail longer required became optional voltage required isa bus longer present almost modern computers introduced april 2003 month 2.0 standard introduced changes mostly minor atx12v 2.x brought significant design change regarding power distribution analyzing power demands then-current pcs determined would much cheaper practical power pc components 12 v rails instead 3.3 v 5 v rails particular pci express expansion cards take much power 12 v rail 5.5 older agp graphics cards took 1 12 v 6 3.3 v. cpu also driven 12 v rail done 5 v rail older pcs pentium 4 power demands pci express incorporated atx12v 2.0 introduced february 2003 defined quite different power distribution atx12v 1.x minor revision june 2004 errant reference −5 v rail removed minor changes introduced minor revision march 2005 power slightly increased rails efficiency requirements changed also released march 2005 includes corrections specifies high current series wire terminals 24-pin atx motherboard 4-pin +12 v power connectors effective march 2007 recommended efficiency increased 80 least 70 required 12 v minimum load requirement lowered higher efficiency generally results less power consumption less waste heat 80 recommendation brings supplies line new energy star 4.0 mandates reduced load requirement allows compatibility processors draw little power startup absolute over-current limit 240 va per rail removed allowing 12 v lines provide 20 per rail revision became effective february 2008 added maximum allowed ripple/noise specification 400 millivolts pwr_on pwr_ok signals requires dc power must hold 1 millisecond pwr_ok signal drops clarified country-specific input line harmonic content electromagnetic compatibility requirements added section climate savers updated recommended power supply configuration charts updated cross-regulation graphs unofficial name given later revisions v2.31 spec current version atx12v spec published april 2013 specified revision 1.31 'design guide desktop platform form factors names atx12v version 2.4 sfx merely design small form factor sff power supply casing power specifications almost identical atx thus sfx power supply mostly pin-compatible atx power supply main difference reduced dimensions electrical difference sfx specifications require −5 v rail since −5 v required isa-bus expansion cards issue modern hardware decreases productions costs result atx pin 20 carried −5 v absent current power supplies optional atx atx12v version 1.2 deleted atx version 1.3 sfx dimensions 125 × 63.5 × 100 mm width × height × depth 60 mm fan compared standard atx dimensions 150 × 86 × 140 mm optional 80 40 mm fan replacement increases decreases height sfx unit manufacturers retailers incorrectly market sfx power supplies µatx microatx power supplies besides manufacturers make sfx-l dimensions 125 × 63.5 × 130 mm accommodate 120 mm fan thin form factor another small power supply design standard atx specification connectors generally dimensioned w × h × 85 × 64 × 175 mm 3.34 × 2.52 × 6.89 provides wtx style motherboard connector incompatible standard atx motherboard connector atx12v power supply derivative made amd power athlon mp dual processor platform used high-end athlon mp motherboards special 8-pin supplemental connector motherboard amd ges psu required motherboards motherboards work atx 12 v psus a. atx12v-ges 24-pin p1 motherboard connector pinout motherboard connector follows viewing motherboard b. atx12v-ges 8-pin p2 motherboard connector pinout motherboard connector follows viewing motherboard eps12v defined server system infrastructure ssi used primarily smp/multi-core systems core 2 core i7 opteron xeon 24-pin atx motherboard connector atx12v v2.x 8-pin secondary connector optional 4-pin tertiary connector rather include extra cable many power supply makers implement 8-pin connector two combinable 4-pin connectors ensure backwards compatibility atx12v motherboards high-performance video card power demands dramatically increased 2000s high-end graphics cards power demands exceed agp pcie slot capabilities cards supplementary power delivered standard 4-pin peripheral floppy power connector midrange high-end pcie graphics cards manufactured 2004 typically use standard 6 8-pin pcie power connector directly psu although atx power supply specifications mostly vertically compatible ways electrically physically potential issues mixing old motherboards/systems new psus vice versa main issues consider following practical guidance mix mix proprietary brand-name systems require matching proprietary power supply may also support standard interchangeable power supplies efficiency power supplies means extent power wasted converting electricity household supply regulated dc computer power supplies vary around 70 90 efficiency various initiatives exist improve efficiency computer power supplies climate savers computing initiative promotes energy saving reduction greenhouse gas emissions encouraging development use efficient power supplies 80 plus certifies variety efficiency levels power supplies encourages use via financial incentives efficient power supplies also save money wasting less power result use less electricity power computer emit less waste heat results significant energy savings central air conditioning summer gains using efficient power supply substantial computers use lot power although power supply larger needed power rating extra margin safety overloading unit often less efficient wastes electricity lower loads appropriately sized unit example 900-watt power supply 80 plus silver efficiency rating means power supply designed least 85-percent efficient loads 180 w may 73 efficient load lower 100 w typical idle power desktop computer thus 100 w load losses supply would 37 w power supply put 450 w load supply efficiency peaks 89 loss would 56 w despite supplying 4.5 times useful power comparison 500-watt power supply carrying 80 plus bronze efficiency rating means power supply designed least 82-percent efficient loads 100 w may provide 84-percent efficiency 100 w load wasting 19 w
[ 972, 6089, 2744, 3015, 5571, 6014, 4418, 6015, 1759, 4974, 6478, 7484, 2147, 6307, 8135, 5784, 7041, 4277, 3755 ]
Test
7,213
1
Oracle_Database:oracle database oracle database commonly referred oracle rdbms simply oracle proprietary multi-model database management system produced marketed oracle corporation database commonly used running online transaction processing oltp data warehousing dw mixed oltp dw database workloads latest generation oracle database 19c available on-prem on-cloud hybrid-cloud environment 19c may also deployed oracle engineered systems e.g exadata on-prem oracle public cloud private cloud customer openworld 2017 san francisco executive chairman board cto larry ellison announced next database generation oracle autonomous database larry ellison two friends former co-workers bob miner ed oates started consultancy called software development laboratories sdl 1977 sdl developed original version oracle software name oracle comes code-name cia-funded project ellison worked formerly employed ampex oracle products follow custom release-numbering -naming convention c current release oracle database 19c stands cloud previous releases e.g oracle database 10g oracle9i database used suffixes g stand grid internet respectively prior release oracle8i database suffixes featured oracle database naming conventions note v1 oracle database larry ellison knew one would want buy version 1 oracle rdbms release numbering used following codes oracle database administrators guide includes brief history key innovations introduced major release oracle database oracle corporation releases critical patch updates cpus security patch updates spus security alerts close security holes could used data theft critical patch updates cpus security alerts come quarterly tuesday closest 17th day month oracle database may licensed deployed on-premises choice platforms including oracle engineered systems on-cloud choice services running general purpose hardware exadata various editions cloud services provide different levels database functionality different use cases e.g dev/test departmental non-critical apps mission-critical workloads different levels performance availability etc service levels oracle corporation provides range database cloud services oracle cloud platform designed different database use cases test/dev deployments small medium sized workloads large mission-critical workloads oracle database cloud services available choice general purpose hardware exadata engineered systems either virtual machines environments 'bare metal infrastructure known oracle cloud infrastructure latest oracle database version 12.2.0.1 comes three editions on-premises deployments oracle corporation also makes following edition available including oracle database 12c release 12.1.0.1 oracle also offered following oracle corporation discontinued se se1 12.1.0.2 release stopped offering new licenses editions december 1 2015 oracle database 12 c supported following os architecture combinations 2008 oracle corporation announced availability oracle exadata database machine v1 first generation engineered systems specifically designed oracle database workloads 2011 oracle corporation announced availability oracle database appliance pre-built pre-tuned highly available clustered database server built using two sunfire x86 servers direct attached storage oracle enterprise edition databases running certain oracle-supplied hardware use hybrid columnar compression efficient storage oracle database offers wide range options features areas availability scalability analytics performance security management developers integration aim enhance complement existing database functionality meet customer-specific requirements database options available enterprise edition offered extra cost exception two rules oracle real application clusters option comes included oracle database 12 c standard edition 2 additional cost availability scalability analytics performance security management developers integration apart clearly defined database options oracle databases may include many semi-autonomous software sub-systems oracle corporation sometimes refers features sense subtly different normal use word example oracle data guard counts officially feature command-stack within sql*plus though usability feature appear list features oracle list features may include example oracle database provides long list supported data models used managed inside oracle database oracle corporation classifies utilities bundled software supporting data transfer data maintenance database administration utilities included oracle database distributions include oracle corporation started drive toward wizard -driven environments view enabling non-programmers produce simple data-driven applications popular application development tool ships oracle database oracle application express apex browser-based tool allows developers build responsive database-driven applications leveraging sql pl/sql skills oracle sql developer free graphical tool database development allows developers browse database objects run sql statements sql scripts edit debug pl/sql statements incorporates standard customized reporting oracle rest data services ords function java ee-based alternative oracle http server providing rest-based interface relational data users also develop applications java pl/sql optionally using tools database upgrade assistant dbua provides gui upgrading oracle database jaccelerator ncomp – native-compilation java accelerator integrates hardware-optimized java code oracle 10g database oracle opatch provides patch management oracle databases sqltxplain tool sqlt offers tuning assistance oracle sql queries oracle database accessed many programming languages environments include java based languages like scala use jdbc access oracle database pl/sql routines within oracle databases access external routines registered operating-system shared libraries dbms_scheduler package invoke external scripts operating-system level pl/sql users oracle support contracts use oracle oracle support mos web site – known metalink re-branding exercise completed october 2010 support site provides users oracle corporation products repository reported problems diagnostic scripts solutions also integrates provision support tools patches upgrades remote diagnostic agent rda operate command-line diagnostic tool executing script data captured provides overview oracle database environment intended diagnostic trouble-shooting within rda hcve health check validation engine verify isolate host system environmental issues may affect performance oracle software oracle corporation also endorses certain practices conventions enhancing use database products include oracle certification program professional certification program includes administration oracle databases one main certification paths contains three levels large number user groups oracle database administrators developers users established geographical/region industry product basis including oracle user group communities also host regular events customers/users share experiences knowledge 2016 oracle holds 1 rdbms market share worldwide based revenue share ahead four closest competitors – microsoft ibm sap teradata market relational databases oracle database competes commercial products ibm db2 udb microsoft sql server oracle ibm tend battle mid-range database market unix linux platforms microsoft dominates mid-range database market microsoft windows platforms however since share many customers oracle ibm tend support products many middleware application categories example websphere peoplesoft siebel systems crm ibm hardware divisions work closely oracle performance-optimizing server-technologies example linux z systems niche commercial competitors include teradata data warehousing business intelligence software ag adabas sybase ibm informix among many others increasingly oracle database products compete open-source software relational database systems postgresql mongodb couchbase oracle acquired innobase supplier innodb codebase mysql part compete better open source alternatives acquired sun microsystems owner mysql 2010 database products licensed open source legal terms open source definition free distribute free royalty licensing fees oracle database system—identified alphanumeric system identifier sid—comprises least one instance application along data storage instance—identified persistently instantiation number activation id sys.v_ database.activation —comprises set operating-system processes memory-structures interact storage typical processes include pmon process monitor smon system monitor oracle documentation refer active database instance shared memory realm users oracle databases refer server-side memory-structure sga system global area sga typically holds cache information data-buffers sql commands user information addition storage database consists online redo logs logs hold transactional history processes turn archive online redo logs archive logs offline redo logs provide basis data recovery physical-standby forms data replication using oracle data guard oracle rac real application clusters option uses multiple instances attached central storage array version 10 g grid computing introduced shared resources instance use cpu resources another node grid advantage oracle rac resources nodes used database node uses memory cpu information shared nodes interconnect—the virtual private network oracle dbms store execute stored procedures functions within pl/sql oracle corporation proprietary procedural extension sql object-oriented language java invoke code objects and/or provide programming structures writing oracle rdbms stores data logically form tablespaces physically form data files datafiles tablespaces contain various types memory segments data segments index segments etc segments turn comprise one extents extents comprise groups contiguous data blocks data blocks form basic units data storage dba impose maximum quotas storage per user within tablespace partitioning feature introduced oracle 8 allows partitioning tables based different set keys specific partitions added dropped help manage large data sets oracle database management tracks computer data storage help information stored codice_1 tablespace codice_1 tablespace contains data dictionary indexes clusters data dictionary consists special collection tables contains information user-objects database since version 8 oracle rdbms also supports locally managed tablespaces store space management information bitmaps headers rather codice_1 tablespace happens default dictionary-managed tablespaces version 10 g later introduced codice_4 tablespace contains tables formerly stored codice_1 tablespace along objects tools oem previously required tablespace disk files primarily represent one following structures physical level data files comprise one data blocks block size vary data files data files occupy pre-allocated space file system computer server use raw disk directly exist within asm logical volumes oracle database installations come default schema called codice_6 installation process sets sample tables user logs database username codice_7 password codice_8 name codice_6 schema originated bruce scott one first employees oracle software development laboratories cat named tiger oracle corporation de-emphasizes codice_6 schema uses features recent oracle releases examples supplied oracle corporation reference default hr oe schemas default schemas include oracle instance uses system global area sga—a shared-memory area—to store data control-information oracle instance allocates sga starts de-allocates shut-down time information sga consists following elements fixed size established instance startup every oracle database one physical datafiles contain database data data logical database structures tables indexes physically stored datafiles allocated database datafiles following characteristics data datafile read needed normal database operation stored memory cache oracle database example user wants access data table database requested information already memory cache database read appropriate datafiles stored memory modified new data necessarily written datafile immediately reduce amount disk access increase performance data pooled memory written appropriate datafiles start instance using enterprise manager sql*plus amount memory allocated sga displayed. link library cache stores shared sql caching parse tree execution plan every unique sql statement multiple applications issue sql statement application access shared sql area reduces amount memory needed reduces processing-time used parsing execution planning data dictionary comprises set tables views map structure database oracle databases store information logical physical structure database data dictionary contains information oracle instance frequently accesses data dictionary parse sql statements oracle operation depends ready access data dictionary—performance bottlenecks data dictionary affect oracle users database administrators must make sure data dictionary cache sufficient capacity cache data without enough memory data-dictionary cache users see severe performance degradation allocating sufficient memory shared pool data dictionary cache resides precludes particular performance problem program global area pga memory-area oracle instance contains data control-information oracle server-processes background process every server background process pga total pga elements called instance pga size content pga depends oracle-server options installed area consists following components dbas monitor pga usage via system view dynamic performance views also known fixed views within oracle database present information virtual tables x tables built basis database memory database users access v views named prefix synonyms obtain information database structures performance oracle rdbms typically relies group processes running simultaneously background interacting monitor expedite database operations typical operating environments might include – temporarily permanently – following individual processes shown along abbreviated nomenclature oracle database terminology distinguishes different computer-science terms describing end-users interact database session within instance session identifier – session id sid distinct oracle system-identifier sid may also associated spid operating-system process identifier oracle databases control simultaneous access data resources locks alternatively documented enqueues databases also use latches – low-level serialization mechanisms protect shared data structures system global area oracle locks fall three categories note course multiple releases oracle reduced number instances exclusive ddl lock required making changes schema objects non-blocking ddl added 11.2 non-blocking ddl added list 12.1 non-blocking ddl added list 12.2 non-blocking ddl added list 18.1 database administrators control many tunable variations oracle instance means values parameter file file ascii default form pfile normally name format codice_21 default binary equivalent server parameter file spfile dynamically reconfigurable extent defaults format codice_22 within sql-based environment views codice_23 codice_24 give access reading parameter values implementation oracle dbms kernel code depends c programming database administrators limited access oracle-internal c structures via v views underlying x tables layers modules kernel depending different releases may include following given inferred meaning scheduler dbms_scheduler package available oracle 10g onwards job subsystems dbms_job package permit automation predictable processing oracle resource manager aims allocate cpu resources users groups users resources become scarce oracle release 10.2 database resource manager operates enterprise edition oracle corporation stated product announcements manageability dbas improved oracle9i 10g lungu vătuiu 2008 assessed relative manageability performing common dba tasks measuring timings performed tests single pentium cpu 1.7 ghz 512 mb ram running windows server 2000 oracle9i 10g installation improved 36 day-to-day administration 63 backup recovery 63 performance diagnostics tuning 74 weighted total improvement 56 researchers concluded oracle10g represents giant step forward oracle9i making database easier use manage various file-system structures hold logs trace files record different aspects database activity configurable destinations records include oracle net services allow client remote applications access oracle databases via network sessions using various protocols oracle database software comes 63 language-versions including regional variations british english american english variations versions cover names days months abbreviations time-symbols a.m. a.d. sorting oracle corporation translated oracle database error-messages arabic catalan chinese czech danish dutch english finnish french german greek hebrew hungarian italian japanese korean norwegian polish portuguese romanian russian slovak spanish swedish thai turkish oracle corporation provides database developers tools mechanisms producing internationalized database applications referred internally globalization
[ 1449, 3951, 6428, 2199, 3961, 1466, 5042, 2571, 6817, 7186, 1105, 3975, 6462, 4345, 7570, 418, 7205, 5419, 1879, 64, 5425, 1891, 4014, 784, 5447, 7231, 7957, 4028, 6878, 2988, 4759, 7248, 3691, 3011, 6184, 1185, 3371, 6543, 4064, 4798, ...
Test
7,214
5
Secure_Shell:secure shell secure shell ssh cryptographic network protocol operating network services securely unsecured network typical applications include remote command-line login remote command execution network service secured ssh ssh provides secure channel unsecured network client–server architecture connecting ssh client application ssh server protocol specification distinguishes two major versions referred ssh-1 ssh-2 standard tcp port ssh 22 ssh generally used access unix-like operating systems also used microsoft windows windows 10 uses openssh default ssh client ssh designed replacement telnet unsecured remote shell protocols berkeley rlogin rsh rexec protocols protocols send information notably passwords plaintext rendering susceptible interception disclosure using packet analysis encryption used ssh intended provide confidentiality integrity data unsecured network internet although files leaked edward snowden indicate national security agency sometimes decrypt ssh allowing read contents ssh sessions ssh uses public-key cryptography authenticate remote computer allow authenticate user necessary several ways use ssh one use automatically generated public-private key pairs simply encrypt network connection use password authentication log another use manually generated public-private key pair perform authentication allowing users programs log without specify password scenario anyone produce matching pair different keys public private public key placed computers must allow access owner matching private key owner keeps private key secret authentication based private key key never transferred network authentication ssh verifies whether person offering public key also owns matching private key versions ssh important verify unknown public keys i.e associate public keys identities accepting valid accepting attacker public key without validation authorize unauthorized attacker valid user unix-like systems list authorized public keys typically stored home directory user allowed log remotely file ~/.ssh/authorized_keys file respected ssh writable anything apart owner root public key present remote end matching private key present local end typing password longer required software like message passing interface mpi stack may need password-less access run properly however additional security private key locked passphrase private key also looked standard places full path specified command line setting option -i ssh ssh-keygen utility produces public private keys always pairs ssh also supports password-based authentication encrypted automatically generated keys case attacker could imitate legitimate server side ask password obtain man-in-the-middle attack however possible two sides never authenticated ssh remembers key server side previously used ssh client raises warning accepting key new previously unknown server password authentication disabled ssh typically used log remote machine execute commands also supports tunneling forwarding tcp ports x11 connections transfer files using associated ssh file transfer sftp secure copy scp protocols ssh uses client-server model standard tcp port 22 assigned contacting ssh servers ssh client program typically used establishing connections ssh daemon accepting remote connections commonly present modern operating systems including macos distributions linux openbsd freebsd netbsd solaris openvms notably versions windows prior 1709 include ssh default proprietary freeware open source e.g putty version openssh part cygwin versions various levels complexity completeness exist file managers unix-like systems e.g konqueror use fish protocol provide split-pane gui drag-and-drop open source windows program winscp provides similar file management synchronization copy remote delete capability using putty back-end winscp putty available packaged run directly usb drive without requiring installation client machine setting ssh server windows typically involves enabling feature settings app windows 10 version 1709 official win32 port openssh available ssh important cloud computing solve connectivity problems avoiding security issues exposing cloud-based virtual machine directly internet ssh tunnel provide secure path internet firewall virtual machine 1995 tatu ylönen researcher helsinki university technology finland designed first version protocol called ssh-1 prompted password-sniffing attack university network goal ssh replace earlier rlogin telnet ftp rsh protocols provide strong authentication guarantee confidentiality ylönen released implementation freeware july 1995 tool quickly gained popularity towards end 1995 ssh user base grown 20,000 users fifty countries december 1995 ylönen founded ssh communications security market develop ssh original version ssh software used various pieces free software gnu libgmp later versions released ssh communications security evolved increasingly proprietary software estimated year 2000 number users grown 2 million secsh official internet engineering task force ietf name ietf working group responsible version 2 ssh protocol 2006 revised version protocol ssh-2 adopted standard version incompatible ssh-1 ssh-2 features security feature improvements ssh-1 better security example comes diffie–hellman key exchange strong integrity checking via message authentication codes new features ssh-2 include ability run number shell sessions single ssh connection due ssh-2 superiority popularity ssh-1 implementations libssh v0.8.0+ lsh dropbear support ssh-2 protocol january 2006 well version 2.1 established rfc 4253 specified ssh server supports 2.0 prior versions ssh identify protoversion 1.99 actual version method identify backward compatibility 1999 developers wanting free software version available went back older 1.2.12 release original ssh program last released open source license björn grönvall ossh subsequently developed codebase shortly thereafter openbsd developers forked grönvall code extensive work creating openssh shipped 2.6 release openbsd version portability branch formed port openssh operating systems openssh single popular ssh implementation coming default large number operating systems ossh meanwhile become obsolete openssh continues maintained supports ssh-2 protocol expunged ssh-1 support codebase openssh 7.6 release ssh protocol used many applications across many platforms including unix variants linux bsds including apple macos solaris well microsoft windows applications may require features available compatible specific ssh clients servers example using ssh protocol implement vpn possible presently openssh server client implementation secure shell protocols used several file transfer mechanisms ssh-2 protocol internal architecture defined rfc 4251 well-separated layers namely open architecture provides considerable flexibility allowing use ssh variety purposes beyond secure shell functionality transport layer alone comparable transport layer security tls user-authentication layer highly extensible custom authentication methods connection layer provides ability multiplex many secondary sessions single ssh connection feature comparable beep available tls intended performance enhancements ssh products 1998 vulnerability described ssh 1.5 allowed unauthorized insertion content encrypted ssh stream due insufficient data integrity protection crc-32 used version protocol fix known ssh compensation attack detector introduced implementations many updated implementations contained new integer overflow vulnerability allowed attackers execute arbitrary code privileges ssh daemon typically root january 2001 vulnerability discovered allows attackers modify last block idea-encrypted session month another vulnerability discovered allowed malicious server forward client authentication another server since ssh-1 inherent design flaws make vulnerable generally considered obsolete avoided explicitly disabling fallback ssh-1 modern servers clients support ssh-2 november 2008 theoretical vulnerability discovered versions ssh allowed recovery 32 bits plaintext block ciphertext encrypted using standard default encryption mode cbc straightforward solution use ctr counter mode instead cbc mode since renders ssh resistant attack december 28 2014 der spiegel published classified information leaked whistleblower edward snowden suggests national security agency may able decrypt ssh traffic technical details associated process disclosed analysis 2017 hacking tools bothanspy gyrfalcon suggested ssh protocol compromised following rfc publications ietf secsh working group document ssh-2 proposed internet standard later modified expanded following publications addition openssh project includes several vendor protocol specifications/extensions
[ 4655, 7148, 363, 709, 359, 366, 4296, 6414, 2187, 6795, 7886, 5373, 2193, 4676, 4677, 7168, 7170, 4683, 20, 1460, 1462, 6432, 7534, 2563, 3282, 2566, 5039, 6446, 3293, 5399, 3638, 2219, 403, 3640, 3976, 6458, 4709, 2587, 3312, 7567, 792...
Test
7,215
1
Microsoft_Query:microsoft query microsoft query visual method creating database queries using examples based text string name document list documents qbe system converts user input formal database query using structured query language sql backend allowing user perform powerful searches without explicitly compose sql without even needing know sql derived moshé m. zloof original query example qbe implemented mid-1970s ibm research centre yorktown new york context microsoft access qbe used introducing students database querying user-friendly database management system small businesses microsoft excel allows results qbe queries embedded spreadsheets
[ 5252, 2515, 2054, 7715 ]
Test
7,216
4
Capsa_(software):capsa software capsa name family packet analyzer developed colasoft network administrators monitor troubleshoot analyze wired wireless networks currently three editions available capsa enterprise edition capsa standard edition capsa free edition capsa enterprise edition flagship colasoft capsa packet analyzer family supports ethernet wlan networks performs real-time packet capturing analysis well supporting past-events analysis marketed tool enterprise network administrator help deal daily network work various kinds network problem maintain productive enterprise network capsa standard edition ethernet packet analyzer designed networking professionals small business network administrators marketed network tool network monitoring troubleshooting analyzing purposes capsa free edition freeware ethernet packet analyzer designed colasoft personal use marketed tool network geeks learn protocols packets networking related knowledge free charge personal family users network monitoring troubleshooting needs anyone download capsa free edition colasoft website legal noncommercial use
[ 6574, 7534, 726, 588, 4759, 5571, 4208 ]
Test
7,217
5
Network_Time_Protocol:network time protocol network time protocol ntp networking protocol clock synchronization computer systems packet-switched variable-latency data networks operation since 1985 ntp one oldest internet protocols current use ntp designed david l. mills university delaware ntp intended synchronize participating computers within milliseconds coordinated universal time utc uses intersection algorithm modified version marzullo algorithm select accurate time servers designed mitigate effects variable network latency ntp usually maintain time within tens milliseconds public internet achieve better one millisecond accuracy local area networks ideal conditions asymmetric routes network congestion cause errors 100 ms protocol usually described terms client-server model easily used peer-to-peer relationships peers consider potential time source implementations send receive timestamps using user datagram protocol udp port number 123 also use broadcasting multicasting clients passively listen time updates initial round-trip calibrating exchange ntp supplies warning impending leap second adjustment information local time zones daylight saving time transmitted current protocol version 4 ntpv4 proposed standard documented backward compatible version 3 specified /small 1979 network time synchronization technology used possibly first public demonstration internet services running trans-atlantic satellite network national computer conference new york technology later described 1981 internet engineering note ien 173 public protocol developed documented technology first deployed local area network part hello routing protocol implemented fuzzball router experimental operating system used network prototyping ran many years related network tools available include daytime time protocols recording time events well icmp timestamp ip timestamp option complete synchronization systems although lacking ntp data analysis clock disciplining algorithms include unix daemon timed uses election algorithm appoint server clients digital time synchronization service dtss uses hierarchy servers similar ntp stratum model 1985 ntp version 0 ntpv0 implemented fuzzball unix ntp packet header round-trip delay offset calculations persisted ntpv4 documented despite relatively slow computers networks available time accuracy better 100 milliseconds usually obtained atlantic spanning links accuracy tens milliseconds ethernet networks 1988 much complete specification ntpv1 protocol associated algorithms published drew experimental results clock filter algorithm documented first version describe client-server peer-to-peer modes 1991 ntpv1 architecture protocol algorithms brought attention wider engineering community publication article david l. mills ieee transactions communications 1989 published defining ntpv2 means state machine pseudocode describe operation introduced management protocol cryptographic authentication scheme survived ntpv4 bulk algorithms era also largely survived ntpv4 1992 defined ntpv3 rfc included analysis sources error reference clock final client enabled calculation metric helps choose best server several candidates appear disagree broadcast mode introduced subsequent years new features added algorithm improvements made became apparent new protocol version required 2010 published containing proposed specification ntpv4 protocol significantly moved since 2014 updated rfc yet published following retirement mills university delaware reference implementation currently maintained open source project led harlan stenn ntp uses hierarchical semi-layered system time sources level hierarchy termed stratum assigned number starting zero reference clock top server synchronized stratum n server runs stratum n 1 number represents distance reference clock used prevent cyclical dependencies hierarchy stratum always indication quality reliability common find stratum 3 time sources higher quality stratum 2 time sources brief description strata 0 1 2 3 provided upper limit stratum 15 stratum 16 used indicate device unsynchronized ntp algorithms computer interact construct bellman-ford shortest-path spanning tree minimize accumulated round-trip delay stratum 1 servers clients addition stratum protocol able identify synchronization source server terms reference identifier refid 64-bit timestamps used ntp consist 32-bit part seconds 32-bit part fractional second giving time scale rolls every 2 seconds 136 years theoretical resolution 2 seconds 233 picoseconds ntp uses epoch january 1 1900 therefore first rollover occurs february 7 2036 ntpv4 introduces 128-bit date format 64 bits second 64 bits fractional-second most-significant 32-bits format era number resolves rollover ambiguity cases according mills 64-bit value fraction enough resolve amount time takes photon pass electron speed light 64-bit second value enough provide unambiguous time representation universe goes dim typical ntp client regularly polls one ntp servers client must compute time offset round-trip delay time offset θ difference absolute time two clocks defined round-trip delay δ values θ δ passed filters subjected statistical analysis outliers discarded estimate time offset derived best three remaining candidates clock frequency adjusted reduce offset gradually creating feedback loop accurate synchronization achieved incoming outgoing routes client server symmetrical nominal delay routes common nominal delay systematic bias exists half difference forward backward travel times ntp reference implementation along protocol continuously developed 20 years backwards compatibility maintained new features added contains several sensitive algorithms especially discipline clock misbehave synchronized servers use different algorithms software ported almost every computing platform including personal computers runs daemon called ntpd unix service windows reference clocks supported offsets filtered analysed way remote servers although usually polled frequently implementation audited 2017 finding numerous potential security issues simple network time protocol sntp less complex implementation ntp using protocol without requiring storage state extended periods time used embedded systems applications full ntp capability required microsoft windows versions since windows 2000 include windows time service w32time ability synchronize computer clock ntp server w32time originally implemented purpose kerberos version 5 authentication protocol required time within 5 minutes correct value prevent replay attacks version windows 2000 windows xp implements sntp violates several aspects ntp version 3 standard beginning windows server 2003 windows vista compliant implementation ntp included microsoft states w32time reliably maintain time synchronization one second accuracy higher accuracy desired microsoft recommends using newer version windows different ntp implementation windows 10 windows server 2016 support 1 ms time accuracy certain operating conditions 2004 henning brauer presented openntpd ntp implementation focus security encompassing privilege separated design whilst aimed closely simpler generic needs openbsd users also includes protocol security improvements whilst still compatible existing ntp servers originally designed openbsd portable version available made available package linux package repositories new ntp client ntimed started poul-henning kamp 2014 new implementation sponsored linux foundation replacement reference implementation determined easier write new implementation scratch fix existing issues large existing code base june 2015 official release done yet ntimed synchronize clocks reliably ntimed works debian freebsd remains ported windows macos ntpsec fork reference implementation systematically security-hardened fork point june 2015 response rash compromises 2014 first production release shipped october 2017 removal unsafe features removal support obsolete hardware removal support obsolete unix variants ntpsec able pare away 75 original codebase making remainder auditable 2017 audit code showed eight security issues including two present original reference implementation ntpsec suffer eight issues remained reference implementation chrony comes default red hat distributions available ubuntu repositories chrony aimed ordinary computers unstable go sleep mode intermittent connection internet chrony also designed virtual machines much unstable environment characterized low resource consumption cost supports ptp well ntp two main components chronyd daemon executed computer starts chronyc command line interface user configuration evaluated safe incidents advantage versatility code written scratch avoid complexity code chrony written gnu general public license version 2 created richard curnow 1997 others along time currently maintained miroslav lichvar development supported red hat software day leap second event ntpd receives notification either configuration file attached reference clock remote server requirement time must appear monotonically increasing leap second inserted sequence 23:59:59 23:59:60 00:00:00 although clock actually halted event processes query system time cause increase tiny amount preserving order events negative leap second ever become necessary would deleted sequence 23:59:58 00:00:00 skipping 23:59:59 alternative implementation called leap smearing consists introducing leap second incrementally period 24 hours noon noon utc time implementation used google internally public ntp servers amazon aws security problems identified reference implementation ntp codebase ones appeared 2009 cause significant concern protocol undergoing revision review entire history january 2011 security revisions ntp specification reports cert current codebase reference implementation undergoing security audits several sources several years known high-risk vulnerabilities current released software several security concerns arose late 2014 previously researchers became aware ntp servers susceptible man-in-the-middle attacks unless packets cryptographically signed authentication computational overhead involved make impractical busy servers particularly denial service attacks ntp message spoofing used move clocks client computers allow number attacks based bypassing cryptographic key expiration services affected fake ntp messages identified tls dnssec various caching schemes dns cache bgp bitcoin number persistent login schemes 2017 security audit three ntp implementations conducted behalf linux foundation core infrastructure initiative suggested ntp ntpsec problematic chrony security standpoint ntp used distributed denial service ddos attacks small query sent ntp server return address spoofed target address similar dns amplification attack server responds much larger reply allows attacker substantially increase amount data sent target avoid participating attack servers configured ignore external queries upgraded version 4.2.7p26 later stack-based buffer overflow exploit discovered patch available december 19 2014 includes ntp version 4 releases version 4.2.8 apple concerned enough used auto-update capability first time though recent versions macos case version 10.6.8 manual fixes server version normal client users turn automatic time updating system preferences date time implementation errors basic missing return statement routine lead unlimited access systems running versions ntp root daemon systems use root daemon bsd subject flaw
[ 7148, 1068, 709, 4676, 4677, 7170, 4683, 6432, 1462, 3629, 5039, 2572, 5397, 6446, 2219, 3640, 4709, 7916, 753, 3312, 7925, 6477, 7214, 2612, 3337, 1900, 6871, 456, 6879, 4759, 2281, 6521, 106, 1543, 2644, 6531, 2650, 5125, 121, 7637, 4...
Validation
7,218
9
Measuring_programming_language_popularity:measuring programming language popularity difficult determine programming languages widely used usage means varies context one language may occupy greater number programmer hours different one lines code third may utilize cpu time languages popular particular kinds applications example cobol still strong corporate data center often large mainframes fortran computational science engineering c embedded applications operating systems languages regularly used write many different kinds applications various methods measuring language popularity subject different bias measured proposed several indices published
[ 7699, 2451, 7848, 2803, 1435 ]
Validation
7,219
9
STklos:stklos stklos scheme implementation succeeded stk interpreter based ad hoc virtual machine aims fast well light addition implementing rrs stklos supports additional libraries available package system scmpkg
[ 7032, 1253, 3915, 5571, 6886, 6888 ]
Test
7,220
4
CommView:commview commview application network monitoring packet analysis decoding two editions commview standard edition ethernet networks wireless edition 802.11 networks named commview wifi application runs microsoft windows developed tamosoft privately held new zealand company founded 1998 commview puts network adapter promiscuous mode captures network traffic also supports capturing packets dial-up virtual adapters e.g adsl 3g modems well capturing loopback traffic captured traffic analyzed application displays network statistics individual packets packets decoded using protocol decoder commview wifi puts wi-fi adapters monitor mode providing functionality user experience similar commview addition wlan-specific features displaying decoding management control frames indication signal noise level per-node per-channel statistics
[ 6574, 7534, 726, 1813, 7637, 4759, 5571, 1403, 7207, 7170 ]
Train
7,221
7
Gale_Technologies:gale technologies gale technologies formerly known lumenare networks private company headquartered santa clara ca additional offices asia backed crescendo ventures company automates companies infrastructure delivering private hybrid cloud management orchestration software also sells management solutions converged infrastructure deployments 2008 july — lumenare networks formed includes acquired intellectual property two companies quikcycle edentree technologies later renamed gale technologies 2010 2012 march — gale technologies completes acquisition virtiv technology intellectual property 2012 16 nov — dell announces acquisition gale technologies
[ 972 ]
Test
7,222
3
MOS_Technology_6509:mos technology 6509 mos technology 6509 enhanced version popular 6502 microprocessor capable addressing 1 megabyte ram via bank switching numerous 6502-based processors could bank switching via separate logic 6509 logic on-chip 6509 reputation difficult program due bank switching scheme never fared well used ill-fated commodore cbm-ii line computers
[ 7960, 7519, 468, 7531, 5296, 7730, 1670, 2237, 4532, 7668, 6662, 1237, 3918, 5087 ]
Test
7,223
9
Ghostscript:ghostscript ghostscript suite software based interpreter adobe systems postscript portable document format pdf page description languages main purposes rasterization rendering page description language files display printing document pages conversion postscript pdf files ghostscript used raster image processor rip raster computer printers—for instance input filter line printer daemon—or rip engine behind postscript pdf viewers ghostscript also used file format converter postscript pdf converter codice_1 conversion program comes ghostscript distribution described documentation work-alike nearly functionality user interface adobe acrobat distiller product converter basically thin wrapper around ghostscript codice_2 output device supports pdf/a-1 pdf/a-2 well pdf/x-3 output ghostscript also serve back-end pdf raster image png tiff jpeg etc converter often combined postscript printer driver virtual printer pdf creators takes form language interpreter ghostscript also used general purpose programming environment ghostscript ported many operating systems including unix-like systems classic mac os openvms microsoft windows plan 9 ms-dos freedos os/2 atari tos amigaos ghostscript originally written l. peter deutsch gnu project released gnu general public license 1986 later deutsch formed aladdin enterprises dual-license ghostscript also proprietary license development fork aladdin ghostscript aladdin free public license despite name free software license forbids commercial distribution gnu ghostscript distributed gnu general public license version 8.54 2006 development branches merged dual-licensed releases still provided ghostscript currently owned artifex software maintained artifex software employees worldwide user community according artifex version 9.03 commercial version ghostscript longer freely distributed commercial purposes without purchasing license though gpl variant allows commercial distribution provided code using released gpl artifex point view aggregated software challenged court mupdf february 2013 ghostscript changed license gplv3 gnu agpl version 9.07 raised license compatibility questions example debian ghostscript guis view postscript pdf files screens scroll page forward page backward zoom text print page several sets free fonts supplied ghostscript intended metrically compatible common fonts attached postscript standard include ghostscript fonts developed postscript type 1 format converted truetype format usable current software popularly used within open-source community garamond font additionally improved upon urw core 35 fonts subsequently incorporated gnu freefont tex gyre
[ 7606, 2815, 4759, 1734, 1267, 7894, 2107, 2835, 204, 4496, 822, 7356, 4780, 5571, 6015, 6016, 2214, 6822, 405, 6380, 1303, 6489, 3915, 1604, 6778, 1435 ]
Test
7,224
5
IPoE:ipoe internet protocol ethernet ipoe method delivering ip payload ethernet-based access network access network using bridged ethernet asynchronous transfer mode atm without using pppoe directly encapsulates ip datagrams ethernet frames using standard encapsulation use ipoe addresses disadvantage ppp unsuited multicast delivery multiple users typically ipoe uses dynamic host configuration protocol extensible authentication protocol provide functionality pppoe less robust manner
[ 3821, 2119 ]
Test
7,225
3
TIM-100:tim-100 tim-100 ptt teller microcomputer developed mihajlo pupin institute serbia 1985 ref.lit 1 based intel microprocessors types 80x86 vlsi circuitry ram capacity max.8mb external memory floppy disks 5.25 3.50 inch ref.literature 2 3 4 multiuser multitasking operating system real-time nrt also tranos developed ptt office fig.4 tim designers m.p.institute-belgrade wikimedia
[ 6693, 4803, 7423, 5571, 5347 ]
Test
7,226
3
Macintosh_Classic_II:macintosh classic ii macintosh classic ii also sold performa 200 personal computer designed manufactured sold apple computer inc. october 1991 september 1993 like macintosh se/30 replaces classic ii powered 16 mhz motorola 68030 cpu 40 80 mb hard disk contrast predecessor limited 16-bit data bus se/30 32-bit data bus 10 mb memory ceiling slower data bus resulted classic ii 30 slower se/30 classic ii shares case earlier classic architecturally similar macintosh lc use custom ics identical used lc enabled classic ii lower component count older macs unlike lc se/30 classic ii internal processor direct slot making first slotless desktop macintosh since macintosh plus classic ii one three machines apple repackaged macintosh performa brand introduced september 1992 called performa 200 sold specifications original classic ii addition speaker grille left side enhanced sound number changes packaged software included ease desktop alternative aimed provide simpler user interface standard macintosh finder exact software included tended vary one retailer next initially offered retail price 1,250 usd classic ii last black-and-white compact macintosh last desktop macintosh include external floppy disk drive port apple discontinued support classic ii january 1 2001 processor 16 mhz 15.6672 mhz motorola 68030 32-bit internally 16-bit bus optional motorola 68882 fpu ram 2 mb expandable 10 mb using two 100 ns 30-pin simms display 9 b w screen 512 x 342 pixels audio 8-bit mono 22khz hard drive 40 80 mb floppy 1.4 mb double sided addressing 24-bit 32-bit battery 3.6 v lithium expansion connectors rear panel include adb port keyboard mouse two mini-din-8 rs-422 serial ports db-25 scsi db-19 external floppy drive two 3.5 mm minijack audio sockets audio headphone classic ii 50-pin internal expansion slot intended either fpu co-processor additional rom socket designed used purpose suitable use general expansion slot apple never produced expansion card kind slot although least one third-party fpu available fastmath classic ii applied engineering sonnet offered synchronous 16mhz asynchronous 50mhz 68882 fpu 2016 group hobbyists 68k mac liberation army forums produced expansion card sockets fpu bootable rewriteable rom
[ 7890, 5732, 722, 1094, 2926, 5037, 5752, 2954, 7572, 6482, 6142, 4373, 2978, 7601, 4749, 5097, 3346, 6165, 4389, 5463, 102, 5469, 4768, 3008, 5477, 6200, 6202, 3387, 3390, 1216, 2331, 4820, 4453, 1234, 1237, 7311, 889, 550, 552, 5916, 3...
Test
7,227
4
Data_architect:data architect data architect practitioner data architecture data management discipline concerned designing creating deploying managing organization data architecture data architects define data stored consumed integrated managed different data entities systems well applications using processing data way closely allied business architecture considered one four domains enterprise architecture according data management body knowledge data architect “ provides standard common business vocabulary expresses strategic data requirements outlines high level integrated designs meet requirements aligns enterprise strategy related business architecture. ” according open group architecture framework togaf data architect expected set data architecture principles create models data enable implementation intended business architecture create diagrams showing key data entities create inventory data needed implement architecture vision bob lambert describes necessary skills data architect follows
[ 5252 ]
Test
7,228
3
Sound_Blaster_Live!:sound blaster live sound blaster live pci add-on sound card creative technology limited pcs moving isa pci allowed card dispense onboard memory storing digital samples computer main memory accessing real time bus allowed much wider selection longer playing samples also included higher quality sound output levels quadrophonic output new midi synthesizer 64 sampled voices live introduced august 1998 variations design remained creative primary sound card line 2000s sound blaster live august 1998 saw introduction emu10k1 audio processor manufactured 0.35µm 3-metal-layer cmos process 2.44 million transistor asic rated 1000 mips emu10k1 featured hardware acceleration directsound eax 1.0 2.0 environmental audio extensions along high-quality 64-voice midi sample-based synthesizer integrated fx8010 dsp chip real-time digital audio effects major design change predecessor emu8000 emu10k1 used system memory accessed pci bus wavetable samples rather using expensive on-board memory possible point systems equipped far ram previously pci offered far faster efficient data transfer old isa bus integrated fx8010 32-bit programmable processor 1 kilobyte instruction memory provided real-time postprocessing effects reverb flanging chorus capability let users select pre-defined listening environment control-panel application concert hall theater headphones etc also provided hardware-acceleration eax creative environmental audio technology effect algorithms created development system integrated microsoft developer studio effects written language similar c compiled native fx8010 object code compiler fxasm sound blaster live featured higher audio quality previous sound blasters processed sound digitally every stage greater chip integration reduced analog signal losses older larger cards unfortunately digital processing brought limitations dsp internal fixed sample rate 48 khz standard ac'97 clock meaning emu10k1 always captured external audio-sources 48 khz performed sample-rate conversion 48 khz waveform output requested target rate 44.1 khz 32 khz rate-conversion step introduced intermodulation distortion downsampled output however rate-conversion applied audio signal passed effects engine sb/live great difficulty resampling audio-cd source material 44.1 khz without introducing audible distortion creative addressed concern recommending audio-recording performed exclusively 48 khz use third-party software handle desired sample-rate conversion avoid using emu10k1 sample-rate conversion sound blaster live supported multi-speaker output initially 4-speaker setup software referred 4.1 setup meaning 4 satellites subwoofer case subwoofer separate output 5.1 higher audio instead low-pass filter crossover within speaker system removes high midrange frequencies sound card output subwoofer games see 4.1 speaker system quadraphonic directsound offers subwoofer output configuration limited creative sound cards aureal ensoniq philips manufacturers made cards use four-speaker output fashion later versions live usually called live 5.1 offered 5.1-channel support adds center-channel speaker lfe subwoofer output useful movie watching dolby digital 5.1 decoded live implemented dos legacy support via ensoniq audiopci dos tsr program creative acquired ensoniq 1998 part deal made use highly-compatible isa sound card emulator newer cards fact live uses .ecw ensoniq concert wavetable files wavetable emulation dos program enables support many standards sound blaster 16 general midi adlib opl3 among others sound blaster live first sound card creative u hear recording input channel supported windows drivers additional software needed utilize analog stereo audio signal came main line directed input way one could mix available inputs midi synth one stereo signal using u hear 5.1 sound sound would downmixed stereo first creative recorder utility included sound card specifically designed take advantage u hear feature making simple matter capture streaming sound source even programs deliberately avoid providing means saving digital sounds thus freeing non-technical users complexities patching inputs outputs various software modules original sb live low noise floor time however critical design flaw limited application quadraphonic audio two s/p-dif channels provided stereo pair differed digital analog reconstruction since ac'97 chip provided internal 48 khz dac creative chose implement two identical dac pipelines front-speaker audio pair subjected different reconstruction amplification regime rear channel evidenced differently valued pull-up resistors filter-capacitors area forward ac'97 chip specifications ac'97 use different amplifier op-amps rear channel serviced separate arguably better philips uda1334 dac yet op-amp used boost signal output levels noticeably different frequency response envelope normalized front channel leaving thin quiet rear channel make matters worse rear channel op-amp inverting variety without treated leaving rear speakers phase front requiring switchover problems encountered using gold editions daughterboard 4-speaker digital-output tendency ac'97 chip fail used input source medium-impedance musical instruments removed use front channels altogether although chip could sourced cheaper ac'97 compatible products soldered place nevertheless simply redirecting front signal rear output sb live long time favorite trick computer audio enthusiasts want better sound minimum money despite problems original sb live still used well s/p-dif input/output midi input/output device network-connected digital audio workstation environments live live value original releases live family live value also known live 1024 identical full live exception color-coded plastic connectors instead gold include extended digital i/o card one version live value ct4830 deleted digital audio input edge card marked cd_spdif interface chip used digital audio original sound blaster live proprietary 9-pin mini-din connector digital output creative referred mini din connector allowed use microphone digital speakers time done value base models subsequent creative sound cards share single port s/pdif digital in/output microphone connectivity mini-din connection included subsequent sound blaster product however owners speaker systems use digital input may buy adapter creative card supported windows vista unless running 5.1 surround sound setting outside party released free drivers sound card http //kxproject.com/ drivers offer control dsp details original live including gold edition marketing strategy design faults see sound blaster live original released 1999 includes live drive ir released 2000 live added outputs center channel speaker lfe subwoofer channel card marketed sound blaster live full capabilities retail versions live used different audio chip emu10k1 emu10k1x noticeably smaller fewer pins chip accelerate directsound hardware eax sale board dell created controversy obviously marketed inferior cheaper product card identified part number sb0200/0203 later improved model emu10k1 chip restored hardware eax/directsound/directsound3d acceleration currently windows drivers available download creative website filename dell driver install pack 2_10 languages recommended recording done 48 khz sampling rate issue hardware down-sampling sound blaster live 24-bit sb0410 actually member sound blaster live family lacked emu10k1/10k2 processor stripped version audigy value snr 100 db software based eax advanced resolution dvd-audio playback dolby digital 5.1 dolby digital ex 6.1 playback proof linux operating systems using alsa sound system module used sound blaster live 24-bit snd-ca0106 module used sound blaster live snd-emu10k1 professional version made e-mu owned creative developed emu10k1 chip featured creative live products professional features included effects higher quality front-mounted drive bay panel headphone output dual mic/line inputs physical level control knobs digital coax in/out pci card drive bay mixer db precision phantom power microphones 12v asio mixer presets internal mixer rerouting 64 midi channels 32mb system ram usage sf2 gigabyte expandable winxp future expandability extra multi-out card also featured line line analogue inputs outputs balanced ¼ /6.3mm trs jacks
[ 1659, 4879, 5694, 6830, 4277, 5970, 6237, 578, 3319, 1435 ]
Test
7,229
1
Economic_and_Social_Data_Service:economic social data service economic social data service esds national data archiving dissemination service founded january 2003 funded jointly economic social research council esrc jisc july 2012 esrc announced become partner uk data service established october 1 2012 esds provides access support wide range key economic social data uk collection covers quantitative qualitative data span many different disciplines themes esds service distributed service based collaboration four key centres expertise uk data archive institute social economic research iser based university essex manchester information associated services mimas cathie marsh centre census survey research ccsr located university manchester centres work collaboration acquire process preserve disseminate wide range data across social sciences esds also provides enhanced user support training secondary use data research learning teaching communities uk data archive responsible overall direction management esds within esds four specialist data services provide value-added support follows study descriptions online documentation including questionnaires datasets accessed online free charge without registering access data requires registration uses federated access management shibboleth user authentication registered users also download explore/analyse online large growing number datasets
[]
Test
7,230
4
Principal_(computer_security):principal computer security principal computer security entity authenticated computer system network referred security principal java microsoft literature principals individual people computers services computational entities processes threads group things need identified authenticated assigned rights privileges resources network principal typically associated identifier security identifier allows referenced identification assignment properties permissions
[ 644, 2631, 5637, 3293, 5449, 1805 ]
Test
7,231
1
Tablespace:tablespace tablespace storage location actual data underlying database objects kept provides layer abstraction physical logical data serves allocate storage dbms managed segments database segment database object occupies physical space table data indexes created tablespace referred name creating database segments tablespaces specify database storage locations logical database structure database schema instance different objects schema may different underlying tablespaces similarly tablespace may service segments one schema sometimes used specify schema form bond logical physical data using tablespaces administrator also control disk layout installation common use tablespaces optimize performance example heavily used index placed fast ssd hand database table contains archived data rarely accessed could stored less expensive slower magnetic hard drive common tablespaces store data filesystem file single file must part single tablespace database management systems allow tablespaces configured directly operating-system device entries called raw devices providing better performance avoiding os filesystem overheads oracle stores data logically tablespaces physically datafiles associated corresponding tablespace
[ 7213, 6279, 2054, 1730, 5956 ]
Test
7,232
7
Content_delivery_network:content delivery network content delivery network content distribution network cdn geographically distributed network proxy servers data centers goal provide high availability high performance distributing service spatially relative end-users cdns serve large portion internet content today including web objects text graphics scripts downloadable objects media files software documents applications e-commerce portals live streaming media on-demand streaming media social media sites cdns layer internet ecosystem content owners media companies e-commerce vendors pay cdn operators deliver content end users turn cdn pays isps carriers network operators hosting servers data centers cdn umbrella term spanning different types content delivery services video streaming software downloads web mobile content acceleration licensed/managed cdn transparent caching services measure cdn performance load balancing multi cdn switching analytics cloud intelligence cdn vendors may cross industries like security ddos protection web application firewalls waf wan optimization cdn nodes usually deployed multiple locations often multiple backbones benefits include reducing bandwidth costs improving page load times increasing global availability content number nodes servers making cdn varies depending architecture reaching thousands nodes tens thousands servers many remote points presence pops others build global network small number geographical pops requests content typically algorithmically directed nodes optimal way optimizing performance locations best serving content user may chosen may measured choosing locations fewest hops lowest number network seconds away requesting client highest availability terms server performance current historical optimize delivery across local networks optimizing cost locations least expensive may chosen instead optimal scenario two goals tend align edge servers close end-user edge network may advantage performance cost cdn providers provide services varying defined set pops depending coverage desired united states international global asia-pacific etc sets pops called edges edge nodes edge networks would closest edge cdn assets end user cdn edge network grows outward origins acquisitions via purchase peering exchange co-locations facilities bandwidth servers cdn providers profit either direct fees paid content providers using network profit user analytics tracking data collected scripts loaded onto customer websites inside browser origin services pointed potential privacy intrusion purpose behavioral targeting solutions created restore single-origin serving caching resources cdn networks serving javascript also targeted way inject malicious content pages using sub-resource integrity mechanism created response ensure page loads script whose content known constrained hash referenced website author internet designed according end-to-end principle principle keeps core network relatively simple moves intelligence much possible network end-points hosts clients result core network specialized simplified optimized forward data packets content delivery networks augment end-to-end transport network distributing variety intelligent applications employing techniques designed optimize content delivery resulting tightly integrated overlay uses web caching server-load balancing request routing content services techniques briefly described web caches store popular content servers greatest demand content requested shared network appliances reduce bandwidth requirements reduce server load improve client response times content stored cache web caches populated based requests users pull caching based preloaded content disseminated content servers push caching server-load balancing uses one techniques including service-based global load balancing hardware-based i.e layer 4–7 switches also known web switch content switch multilayer switch share traffic among number servers web caches switch assigned single virtual ip address traffic arriving switch directed one real web servers attached switch advantage balancing load increasing total capacity improving scalability providing increased reliability redistributing load failed web server providing server health checks content cluster service node formed using layer 4–7 switch balance load across number servers number web caches within network request routing directs client requests content source best able serve request may involve directing client request service node closest client one capacity variety algorithms used route request include global server load balancing dns-based request routing dynamic metafile generation html rewriting anycasting proximity—choosing closest service node—is estimated using variety techniques including reactive probing proactive probing connection monitoring cdns use variety methods content delivery including limited manual asset copying active web caches global hardware load balancers several protocol suites designed provide access wide variety content services distributed throughout content network internet content adaptation protocol icap developed late 1990s provide open standard connecting application servers recently defined robust solution provided open pluggable edge services opes protocol architecture defines opes service applications reside opes processor executed remotely callout server edge side includes esi small markup language edge level dynamic web content assembly fairly common websites generated content could changing content like catalogs forums personalization creates problem caching systems overcome problem group companies created esi peer-to-peer p2p content-delivery networks clients provide resources well use means unlike client-server systems content centric networks actually perform better users begin access content especially protocols bittorrent require users share property one major advantages using p2p networks makes setup running costs small original content distributor content owners satisfied options costs commercial cdn service create cdn called private cdn private cdn consists pops points presence serving content owner pops caching servers reverse proxies application delivery controllers simple two caching servers large enough serve petabytes content large content distribution networks may even build set private network distribute copies content across cache locations private networks usually used conjunction public networks backup option case capacity private network enough failure leads capacity reduction since content distributed across many locations variety multicasting techniques may used reduce bandwidth consumption private networks also proposed select multicast trees according network load conditions efficiently utilize available network capacity rapid growth streaming video traffic uses large capital expenditures broadband providers order meet demand retain subscribers delivering sufficiently good quality experience address telecommunications service providers tsps begun launch content delivery networks means lessen demands network backbone reduce infrastructure investments networks video content transmitted telco cdns advantages traditional cdns last mile deliver content closer end user cached deep networks deep caching minimizes distance video data travels general internet delivers quickly reliably telco cdns also built-in cost advantage since traditional cdns must lease bandwidth build operator margin cost model addition operating content delivery infrastructure telco operators better control utilization resources content management operations performed cdns usually applied without limited information network e.g. topology utilization etc telco-operators interact business relationships pose number challenges telco-operators limited sphere actions face impact operations utilization resources contrast deployment telco-cdns allow operators implement content management operations enables better control utilization resources provide better quality service experience end users june 2011 streamingmedia.com reported group tsps founded operator carrier exchange ocx interconnect networks compete directly large traditional cdns like akamai limelight networks extensive pops worldwide way telcos building federated cdn offering interesting content provider willing deliver content aggregated audience federation likely near future telco cdn federations created grow enrollment new telcos joining federation bringing network presence internet subscriber bases existing ones august 2011 global consortium leading internet service providers led google announced official implementation edns-client-subnet ietf internet-draft intended accurately localize dns resolution responses initiative involves limited number leading dns cdn service providers edns-client-subnet edns0 option recursive dns servers cdns utilize ip address requesting client subnet resolving dns requests cdn relies ip address dns resolver instead client resolving dns requests incorrectly geo-locate client client using google anycast addresses dns resolver create latency problems initially google 8.8.8.8 dns addresses geo-located california potentially far location requesting client google public dns servers available worldwide generally speaking internet service providers provide content delivery network
[ 181, 6330, 6689, 5099, 6516, 7619, 108, 7343, 1175, 6348, 7169, 6001, 4495, 6621, 3861, 4408, 5386, 6440, 320, 6025, 746, 6550, 3211, 841, 2043, 230, 3559, 2233, 52, 330, 1302, 4718, 602, 163, 6312, 6054, 2258, 4911, 3338, 8040, 5447 ]
Validation
7,233
8
GoAccess:goaccess goaccess open-source web analytics application unix-like operating systems text-based web application user interface provide real-time analytics continuously monitoring web server logs https //geekflare.com/monitor-analyze-access-logs-goaccess/
[ 578, 5571, 4600, 84, 1435 ]
Test
7,234
4
Robert_Slade:robert slade robert michael slade also known robert m. slade rob slade canadian information security consultant researcher instructor author robert slade guide computer viruses software forensics dictionary information security co-author viruses revealed slade author thousands technical book reviews today published techbooks mailing list risks digest archived internet review project expert computer viruses malware also mr. slade mr. slade lists slade married gloria j. slade edits much work editor slade book reviews grandchildren appear field every review 2008 rob grandpa ryan trevor devon hannah holds bachelor degree university british columbia master computer information science education university oregon diploma christian studies regent college slade became one small number researchers called world experts malware fred cohen named slade early work organizing computer viruses software bbses book reviews mr. slade lists slade one fewer thirty people worldwide credited contributions final version virus-l faq usenet group comp.virus virus-l mailing list public group record computer virus issues 1988 1995 1996 maintained antiviral software evaluation faq quick reference users seeking antivirus software vendor contacts list contributor well least three group computer virus faqs web came prominence written two books viruses sole author robert slade guide computer viruses first published 1994 2nd edition 1996 co-wrote viruses revealed david harley urs gattiker 2001 slade advanced field computer forensics antivirus research found intentions identity virus authors discovered program code created first course ever offered forensic programming book software forensics published 2004 chapter subject print information security management handbook fifth edition today slade consultant businesses government—among client list fortune 500 companies government canada—as well educational institutions created curricula taught courses simon fraser university macdonald dettwiler university phoenix slade creates seminars local federal international training groups senior instructor isc ² develops courses information security quality assurance qa seek certification slade one world approximately 60,000 cissps certification used private industry well least united states government defense slade moved online security glossary 2006 book dictionary information security virus bulletin remarked unusual collection five forewords many acknowledged experts willing contribute says something author standing field —the forewords written fred cohen jack holleran peter g. neumann harold tipton gene spafford dictionary considered dependable baseline definitions citable common source slade surveyed literature field shared knowledge internet review project published book reviews perhaps widely known reviews works gave first priority information security reviews often critical—to project faq question n't like books slade replied may cruel fair
[ 6303, 6460, 7192, 6004, 5688, 6488, 5401 ]
Validation
7,235
2
OpenCable_Application_Platform:opencable application platform opencable application platform ocap operating system layer designed consumer electronics connect cable television system java-based middleware portion platform unlike operating systems personal computer cable company controls ocap programs run consumer machine designed cablelabs cable networks north america ocap programs intended interactive services ecommerce online banking electronic program guides digital video recording cable companies required ocap part cablecard 2.0 specification proposal controversial approved federal communications commission cable companies stated two-way communications third party devices networks require support ocap consumer electronics association groups argue ocap intended block features compete cable company provided services consumers entitled add delete otherwise control programs personal computers january 8 2008 cablelabs announced tru2way brand opencable platform including ocap application platform ocap java based software/middleware portion opencable initiative ocap based globally executable mhp gem -standard defined cablelabs ocap based gem lot common multimedia home platform mhp -standard defined dvb project present two versions ocap standard exist
[ 2520, 5571, 6190, 5666 ]
Test
7,236
1
REAL_Server:real server real server relational database management system rdbms built top sqlite database engine real server evolved sqliteserver originally developed sqlabs 2004 may 2005 real software inc. creator realbasic purchased source code copyrights sqliteserver invested development 2007/2008 first version real sql server released new version released april 2009 renamed real server september 2010 sqlabs repurchased server intellectual properties new major release development sqlabs team real server used following
[ 6029, 4759, 578 ]
Validation
7,237
2
Sunwah_Linux:sunwah linux rays linux previously sun wah linux chinese debian-based linux distribution sunwah linux debian-based distribution first chinese linux distribution receive linux standard base lsb certification system architecture designed hong kong programming developed nanjing distribution sponsored sunwah group hong kong jiangsu provincial government china sunwah pearl linux abbreviated swp technology training entity group providing research assistance testing training support distribution swp joint establishment hong kong polytechnic university sunwah group 2005 sunwah linux installed 140,000 pcs primary secondary schools china april 2006 sunwah linux best linux desktop application award linuxworld conference expo boston according albert chung presented distribution judges competition fierce proud chinese linux desktop distribution recognized industry experts judges
[ 3751, 1806, 578 ]
Validation
7,238
7
Apache_Mahout:apache mahout apache mahout project apache software foundation produce free implementations distributed otherwise scalable machine learning algorithms focused primarily areas collaborative filtering clustering classification many implementations use apache hadoop platform mahout also provides java libraries common maths operations focused linear algebra statistics primitive java collections mahout work progress number implemented algorithms grown quickly various algorithms still missing mahout core algorithms clustering classification batch based collaborative filtering implemented top apache hadoop using map/reduce paradigm restrict contributions hadoop-based implementations contributions run single node non-hadoop cluster also welcomed example 'taste collaborative-filtering recommender component mahout originally separate project run stand-alone without hadoop starting release 0.10.0 project shifted focus building backend-independent programming environment code named samsara environment consists algebraic backend-independent optimizer algebraic scala dsl unifying in-memory distributed algebraic operators supported algebraic platforms apache spark h2o apache flink support mapreduce algorithms started gradually phased 2014
[ 894, 4303, 8062, 1333, 5728, 7805, 2741, 7444, 7896, 917, 5571, 3463, 3542, 3204, 1286, 6821, 5054, 840, 1392, 3031, 5408, 3558, 5677, 7924, 3479, 5447, 5863, 6387, 5075, 6137, 7488, 7857, 5874, 3915, 1511, 4742, 5007, 2619, 702 ]
Test
7,239
4
Trusted_path:trusted path trusted path trusted channel mechanism provides confidence user communicating user intended communicate ensuring attackers ca n't intercept modify whatever information communicated term initially introduced orange book security architecture concept implemented technical safeguards suitable particular environment risk profile common criteria european union electronic signature standards trusted path trusted channel describe techniques prevent interception tampering sensitive data passes various system components one popular techniques password stealing microsoft windows login spoofing based programs simulated operating system login prompt users try log fake login program capture user passwords later use safeguard windows nt introduced ctrl-alt-del sequence secure attention key escape third party programs invoke system login prompt similar problem arises case websites requiring authentication user expected enter credentials without actually knowing website spoofed https mitigates attack first authenticating server user using trust anchor certification path validation algorithm displaying login form
[ 1710, 5869, 2944, 2879, 6208, 4759, 6256, 3112, 1037 ]
Test
7,240
4
Dave_the_Resurrector:dave resurrector dave resurrector so-called resurrector bot responded attempts canceling message usenet newsgroup news.admin.net-abuse re-posting message written chris lewis bot notable one first escalations spam arms race
[]
Test
7,241
4
Amplitude-shift_keying:amplitude-shift keying amplitude-shift keying ask form amplitude modulation represents digital data variations amplitude carrier wave ask system binary symbol 1 represented transmitting fixed-amplitude carrier wave fixed frequency bit duration seconds signal value 1 carrier signal transmitted otherwise signal value 0 transmitted digital modulation scheme uses finite number distinct signals represent digital data ask uses finite number amplitudes assigned unique pattern binary digits usually amplitude encodes equal number bits pattern bits forms symbol represented particular amplitude demodulator designed specifically symbol-set used modulator determines amplitude received signal maps back symbol represents thus recovering original data frequency phase carrier kept constant like ask also linear sensitive atmospheric noise distortions propagation conditions different routes pstn etc ask modulation demodulation processes relatively inexpensive ask technique also commonly used transmit digital data optical fiber led transmitters binary 1 represented short pulse light binary 0 absence light laser transmitters normally fixed bias current causes device emit low light level low level represents binary 0 higher-amplitude lightwave represents binary 1 simplest common form ask operates switch using presence carrier wave indicate binary one absence indicate binary zero type modulation called on-off keying ook used radio frequencies transmit morse code referred continuous wave operation sophisticated encoding schemes developed represent data groups using additional amplitude levels instance four-level encoding scheme represent two bits shift amplitude eight-level scheme represent three bits forms amplitude-shift keying require high signal-to-noise ratio recovery nature much signal transmitted reduced power ask system divided three blocks first one represents transmitter second one linear model effects channel third one shows structure receiver following notation used different symbols represented different voltages maximum allowed value voltage possible values range −a given difference one voltage considering picture symbols v n generated randomly source impulse generator creates impulses area v n impulses sent filter ht sent channel words symbol different carrier wave sent relative amplitude transmitter signal expressed form receiver filtering hr signal use notation indicates convolution two signals a/d conversion signal z k expressed form relationship second term represents symbol extracted others unwanted first one effect noise third one due intersymbol interference filters chosen g satisfy nyquist isi criterion intersymbol interference value sum zero transmission affected noise probability density function error given size modelled gaussian function mean value relative sent value variance given formula_9 spectral density noise within band hr f continuous fourier transform impulse response filter hr f probability making error given example formula_11 conditional probability making error given symbol v0 sent formula_12 probability sending symbol v0 probability sending symbol represent probability density functions plot possible value voltage transmitted get picture like particular case formula_14 shown probability making error single symbol sent area gaussian function falling functions symbols shown cyan one call formula_15 area one side gaussian sum areas formula_16 total probability making error expressed form calculate value formula_15 order move origin reference wherever want area function change situation like one shown following picture matter gaussian function considering area want calculate value looking given following integral formula_20 complementary error function putting results together probability make error formula_21 formula easily understand probability make error decreases maximum amplitude transmitted signal amplification system becomes greater hand increases number levels power noise becomes greater relationship valid intersymbol interference i.e formula_22 nyquist function
[ 2149, 768, 3956, 4970, 5693, 8184, 5175, 2117, 2099 ]
Test
7,242
2
Dm-cache:dm-cache dm-cache component specifically target linux kernel device mapper framework mapping block devices onto higher-level virtual block devices allows one fast storage devices flash-based solid-state drives ssds act cache one slower storage devices hard disk drives hdds effectively creates hybrid volumes provides secondary storage performance improvements design dm-cache requires three physical storage devices creation single hybrid volume dm-cache uses storage devices separately store actual data cache data required metadata configurable operating modes cache policies latter form separate modules determine way data caching actually performed dm-cache licensed terms gnu general public license gpl joe thornber heinz mauelshagen mike snitzer primary developers dm-cache uses solid-state drives ssds additional level indirection accessing hard disk drives hdds improving overall performance using fast flash-based ssds caches slower mechanical hdds based rotational magnetic media result costly speed ssds becomes combined storage capacity offered slower less expensive hdds moreover case storage area networks sans used cloud environments shared storage systems virtual machines dm-cache also improve overall performance reduce load sans providing data caching using client-side local storage dm-cache implemented component linux kernel device mapper volume management framework allows various mappings created physical virtual block devices way mapping devices created determines virtual blocks translated underlying physical blocks specific translation types referred targets acting mapping target dm-cache makes possible ssd-based caching part created virtual block device configurable operating modes cache policies determine dm-cache works internally operating mode selects way data kept sync hdd ssd cache policy selectable separate modules implement policies provides algorithm determining blocks promoted moved hdd ssd demoted moved ssd hdd cleaned etc configured use multiqueue mq stochastic multiqueue smq cache policy latter default dm-cache uses ssds store data associated performed random reads writes capitalizing near-zero seek times ssds avoiding i/o operations typical hdd performance bottlenecks data associated sequential reads writes cached ssds avoiding undesirable cache invalidation operations performance-wise beneficial sequential i/o operations suitable hdds due mechanical nature caching sequential i/o also helps extending lifetime ssds used caches another dm-cache project similar goals announced eric van hensbergen ming zhao 2006 result internship work ibm later joe thornber heinz mauelshagen mike snitzer provided implementation concept resulted inclusion dm-cache linux kernel dm-cache merged linux kernel mainline kernel version 3.9 released april 28 2013 dm-cache creating mapped virtual block device acts hybrid volume requires three physical storage devices internally dm-cache references origin devices number fixed-size blocks size blocks equaling size caching extent configurable creation hybrid volume size caching extent must range 32 kb 1 gb must multiple 32 kb typically size caching extent 256 1024 kb choice caching extents bigger disk sectors acts compromise size metadata possibility wasting cache space small caching extents increases size metadata metadata device kernel memory large caching extents increases amount wasted cache space due caching whole extents even case high hit rates parts operating modes supported dm-cache write-back default write-through pass-through write-back operating mode writes cached blocks go cache device blocks origin device marked dirty metadata write-through operating mode write requests returned completed data reaches origin cache devices clean blocks becoming marked dirty pass-through operating mode reads performed directly origin device avoiding cache writes go directly origin device cache write hits also cause invalidation cached blocks pass-through mode allows hybrid volume activated state cache device known consistent origin device rate data migration dm-cache performs directions i.e. data promotions demotions throttled configured speed regular i/o origin cache devices preserved decommissioning hybrid volume shrinking cache device requires use cleaner policy effectively flushes blocks marked metadata dirty cache device origin device version 4.2 linux kernel following three cache policies distributed linux kernel mainline dm-cache default uses stochastic multiqueue policy
[ 3256, 2182, 3613, 4670, 5021, 13, 7528, 3271, 7171, 7532, 2559, 3626, 5041, 5744, 6443, 7550, 7552, 405, 2942, 7555, 6117, 4341, 5762, 412, 415, 65, 2961, 3666, 5783, 2970, 5088, 6500, 785, 2266, 788, 7956, 1522, 5453, 7605, 5803, 5805,...
Test
7,243
8
FDM_Group:fdm group fdm group international professional services company headquartered london united kingdom offices leeds glasgow brighton new york city toronto reston frankfurt hong kong singapore australia china composed mostly university graduates returners work ex-military personnel 'trained fdm group academies working consultants one fdm group ’ clients primarily financial institutions banks around world listed london stock exchange constituent ftse 250 index company founded brighton rod flavell julian jacqueline divett 1991 company focused recruitment acquiring mountfield software 1995 1998 name changed fdm group reflect acquisition company began hiring training placing consultants on-site clients april 2005 fdm group floated alternative investment market raising £3m net company 2010 company completed management buyout bring company private june 2014 fdm flotation time valued £308m london stock exchange fdm group remains publicly traded london stock exchange today 2015 company opened new offices city centres leeds glasgow fdm group ’ model involves recruiting recent university graduates returners work ex-forces turn consultants clients individuals go 6–14 weeks paid training one fdm group ’ academy facilities signing two-year contract company work consultant consultants employees work site clients include mostly banking finance industry fdm group women initiative focused hiring inspiring women pursue jobs stem fields part efforts sponsored 2013 2014 2015 2016 everywoman technology awards london fdm group also ex-forces initiative began new york academy veterans initiative partnered british forces resettlement services signed ministry defence armed forces corporate covenant well us army memorandum agreement army pays programme new york fdm group sponsored wall street rocks charity concert marched veterans day parade support cause helping veterans find jobs fdm group two academies located united states one academy new york opened 2011 located 14 wall street new york new york 10005 2016 fdm group opened training center virginia located 1805 library street reston va 20190 february 2016 class action lawsuit filed united states district court southern new york grace park fdm group holdings plc fdm group inc. alleging state wage violations us fair labor standards act flsa march 2017 united states district court southern new york found favor fdm group motion dismissal finding fdm group correctly classified academy trainees non-employees therefore entitled compensation court also found termination fee stipulated training agreement signed park 30,000 constitute kickback park failed provide sufficient details regarding unpaid work april 2017 park filed appeal 2nd circuit court appeals park v. fdm group inc. case number 17-1030
[ 6305 ]
Test
7,244
4
Lumension_Security:lumension security lumension security inc. part software company ivanti lumension products include endpoint management security software providing endpoint protection vulnerability management data protection application whitelisting encryption usb security risk management lumension largely focused providing security organizations businesses 2017 lumension part merger landesk heat software create new software company called ivanti lumension founded high tech software 1991 company rebranded patchlink corporation 1999 adopted lumension name 2007 2015 frontrange lumension combined create heat software 2017 heat landesk combined create ivanti lumension products traditionally competed endpoint management security industry sophos mcafee kaspersky lab symantec trend micro among others
[ 496, 5452, 6353, 2566, 6305, 1805, 88 ]
Test
7,245
9
Ike_Nassi:ike nassi isaac robert ike nassi born 1949 brooklyn new york currently ceo tidalscale inc. campbell ca adjunct professor computer science university california santa cruz formerly executive vice president chief scientist sap ag practice lead sap research technology infrastructure practice focused guiding sap technology infrastructure vision direction execution group also responsible sap sponsored academic research program probably best known creating ben shneiderman highly influential nassi–shneiderman diagram notation also helped design ada programming language prior work tidalscale sap nassi helped start three companies firetide infogear technology encore computer co-founded wireless mesh company firetide served executive vice president chief technology officer cto chairman board nassi cto head product operations infogear prior acquisition cisco systems helped start encore computer pioneer symmetric multiprocessors forerunner today multicore processors addition start-up experience nassi held executive position cisco systems following acquisition infogear technology joined apple inc. run new advanced technology group research lab cambridge near mit work dylan programming language intended apple newton become vp development tools california become senior vice president software launch mklinux become corporate officer served boards taligent opendoc foundation also held executive senior management roles visual technology tewkesbury digital equipment corporation softech nassi serves active member board trustees computer history museum mountain view california formerly served board anita borg institute women technology member industry advisory board ieee computer society member advisory boards northwestern university stony brook university peking university visiting scholar stanford university u.c berkeley recently visiting scientist mit nassi holds several patents certificate distinguished service department defense work design ada programming language member defense advanced research projects agency information systems technology group testified congress emerging telecommunications act 1991 nassi holds memberships ieee acm earned bachelor degree mathematics master degree doctorate computer science stony brook university new york
[ 4355, 1599, 2156, 304, 961, 6971, 8192, 4783, 6814, 3001 ]
Test
7,246
9
Shell_script:shell script shell script computer program designed run unix shell command-line interpreter various dialects shell scripts considered scripting languages typical operations performed shell scripts include file manipulation program execution printing text script sets environment runs program necessary cleanup logging etc called wrapper term also used generally mean automated mode running operating system shell specific operating systems called things batch files msdos-win95 stream os/2 command procedures vms shell scripts windows nt stream third-party derivatives like 4nt—article cmd.exe mainframe operating systems associated number terms typical unix/linux/posix-compliant installation includes kornshell codice_1 several possible versions ksh88 korn shell '93 others oldest shell still common use bourne shell codice_2 unix systems invariably also include c shell codice_3 bash codice_4 remote shell codice_5 secure shell codice_6 ssl telnet connections shell main component tcl/tk installation usually called codice_7 wish gui-based tcl/tk shell c tcl shells syntax quite similar said programming languages korn shells bash developments bourne shell based algol language elements number others added well hand various shells plus tools like awk sed grep basic lisp c forth contributed perl programming language shells available machine available download and/or purchase include almquist shell codice_8 powershell codice_9 z shell codice_10 particularly common enhanced kornshell tenex c shell codice_11 perl-like shell codice_12 related programs shells based python ruby c java perl pascal rexx c various forms also widely available another somewhat common shell osh whose manual page states enhanced backward-compatible port standard command interpreter sixth edition unix windows-unix interoperability software mks toolkit cygwin uwin interix others make shells unix programming available windows systems providing functionality way signals inter-process communication system calls apis hamilton c shell windows shell similar unix c shell microsoft distributes windows services unix use nt-based operating systems particular posix environmental subsystem shell script provide convenient variation system command special environment settings command options post-processing apply automatically way allows new script still act fully normal unix command one example would create version ls command list files giving shorter command name l would normally saved user bin directory /home/ username /bin/l default set command options pre-supplied first line shebang indicates interpreter execute rest script second line makes listing options file format indicators columns files none omitted size blocks lc_collate=c sets default collation order fold upper lower case together intermix dotfiles normal filenames side effect ignoring punctuation names dotfiles usually shown option like -a used causes parameters given l pass parameters ls normal options syntax known ls still used user could simply use l commonly used short listing another example shell script could used shortcut would print list files directories within given directory case shell script would start normal starting line /bin/sh following script executes command clear clears terminal text going next line following line provides main function script ls -al command lists files directories directory script run ls command attributes could changed reflect needs user note implementation clear command try using clr command instead shell scripts allow several commands would entered manually command-line interface executed automatically without wait user trigger stage sequence example directory three c source code files rather manually running four commands required build final program one could instead create c shell script named build kept directory would compile automatically script would allow user save file edited pause editor run ./build create updated program test return editor since 1980s however scripts type replaced utilities like make specialized building programs simple batch jobs unusual isolated tasks using shell loops tests variables provides much flexibility users bash unix shell script convert jpeg images png images image names provided command-line—possibly via wildcards—instead listed within script created file typically saved file like /home/ username /bin/jpg2png jpg2png command run entire directory full jpeg images /home/ username /bin/jpg2png *.jpg key feature shell scripts invocation interpreters handled core operating system feature rather user shell able execute scripts shell language script interpreter directive handled correctly run shell limitations early bourne shell handling scripts shell scripts set executed os modern shell script footing system commands rather many system commands actually shell scripts generally scripts since interpreted shell instead perl python language extends returning exit codes like system utilities indicate success failure allows called components larger programs regardless larger tools implemented like standard system commands shell scripts classically omit kind filename extension unless intended read running shell special mechanism purpose sh ’ codice_13 csh ’ source many modern shells also supply various features usually found sophisticated general-purpose programming languages control-flow constructs variables comments arrays subroutines sorts features available possible write reasonably sophisticated applications shell scripts however still limited fact shell languages little support data typing systems classes threading complex math common full language features also generally much slower compiled code interpreted languages written speed performance goal standard unix tools sed awk provide extra capabilities shell programming perl also embedded shell scripts scripting languages like tcl perl tcl come graphics toolkits well many powerful scripting languages introduced tasks large complex comfortably handled ordinary shell scripts advantages script desirable development overhead full-blown compiled programming language would disadvantageous specifics separates scripting languages high-level programming languages frequent source debate generally speaking scripting language one requires interpreter shell scripts often serve initial stage software development often subject conversion later different underlying implementation commonly converted perl python c. interpreter directive allows implementation detail fully hidden inside script rather exposed filename extension provides seamless reimplementation different languages impact end users files .sh file extension usually shell script kind shell scripts filename extension perhaps biggest advantage writing shell script commands syntax exactly directly entered command-line programmer switch totally different syntax would script written different language compiled language used often writing shell script much quicker writing equivalent code programming languages many advantages include easy program file selection quick start interactive debugging shell script used provide sequencing decision-making linkage around existing programs moderately sized scripts absence compilation step advantage interpretive running makes easy write debugging code script re-run detect fix bugs non-expert users use scripting tailor behavior programs shell scripting provides limited scope multiprocessing hand shell scripting prone costly errors inadvertent typing errors rm -rf instead intended rm -rf */ folklore unix community single extra space converts command one deletes everything sub-directories one deletes everything—and also tries delete everything root directory similar problems transform cp mv dangerous weapons misuse redirect delete contents file made problematic fact many unix commands differ name one letter cp cd dd df etc another significant disadvantage slow execution speed need launch new process almost every shell command executed script job accomplished setting pipeline efficient filter commands perform work slowdown mitigated complex script typically several orders magnitude slower conventional compiled program performs equivalent task also compatibility problems different platforms larry wall creator perl famously wrote easier port shell shell script similarly complex scripts run limitations shell scripting language limits make difficult write quality code extensions various shells ameliorate problems original shell language make problems worse many disadvantages using script languages caused design flaws within language syntax implementation necessarily imposed use text-based command-line number shells use shell programming languages even full-fledged languages like scsh uses scheme interoperability software cygwin mks toolkit interix available microsoft windows services unix hamilton c shell uwin unix windows others allow unix shell programs run machines running windows nt successors loss functionality ms-dos-windows 95 branch well earlier mks toolkit versions os/2 least three dcl implementations windows type operating systems—in addition xlnt multiple-use scripting language package used command shell windows script host cgi programming—are available systems well mac os x subsequent unix-like well addition aforementioned tools posix os/2 functionality used corresponding environmental subsystems windows nt operating system series windows 2000 well third 16-bit subsystem often called ms-dos subsystem uses command.com provided operating systems run aforementioned ms-dos batch files console alternatives 4dos 4os2 freedos peter norton ndos 4nt take command add functionality windows nt-style cmd.exe ms-dos/windows 95 batch files run command.com os/2 cmd.exe 4nt respectively similar shells enhance integrated windows script host comes three pre-installed engines vbscript jscript vba numerous third-party engines added rexx perl python ruby tcl pre-defined functions 4nt related programs pc dos quite similar ms-dos whilst dr dos different earlier versions windows nt able run contemporary versions 4os2 os/2 subsystem scripting languages definition able extended example ms-dos/windows 95/98 windows nt type systems allows shell/batch programs call tools like kixtart qbasic various basic rexx perl python implementations windows script host installed engines unix posix-compliant systems awk sed used extend string numeric processing ability shell scripts tcl perl rexx python graphics toolkits used code functions procedures shell scripts pose speed bottleneck c fortran assembly language c much faster still add functionality available shell language sockets connectivity functions heavy-duty text processing working numbers calling script abilities self-writing self-modifying code techniques like recursion direct memory access various types sorting difficult impossible main script visual basic applications vbscript used control communicate things spreadsheets databases scriptable programs types telecommunications software development tools graphics tools software accessed component object model
[ 6789, 6428, 4705, 422, 3998, 7214, 775, 6497, 2619, 5091, 6507, 1910, 6882, 1537, 5109, 6892, 5117, 3366, 5480, 3368, 7635, 5486, 831, 486, 3021, 4425, 4070, 3394, 5506, 5162, 4814, 160, 7687, 8037, 6952, 875, 8055, 3431, 6256, 1630, 52...
Validation
7,247
2
Universal_Windows_Platform_apps:universal windows platform apps universal windows platforms uwp apps formerly windows store apps metro-style apps applications used across compatible microsoft windows devices including personal computers pcs tablets smartphones xbox one microsoft hololens internet things uwp software primarily purchased downloaded via microsoft store starting windows 10 windows uses windows app refer uwp apps app installed microsoft store formerly windows store trusted windows store app computer programs running desktop computer desktop apps terms universal windows platform uwp uwp app appear microsoft documentation developers microsoft started retrospectively use windows runtime app refer precursors uwp app unambiguous name windows software first became available name metro-style apps windows store opened 2012 marketed windows 8 windows 8.x metro-style apps run window instead either occupy entire screen snapped one side case occupy entire height screen part width title bar system menu window borders control buttons command interfaces like scroll bars usually hidden first menus located settings charm metro-style apps use ui controls windows 8.x typically follow windows 8.x ui guidelines horizontal scrolling inclusion edge-uis like app bar response criticism customers windows 8.1 title bar present hidden unless users move mouse cursor top screen hamburger menu button title bar gives access charms users point entry metro-style apps windows store enterprises operating windows domain infrastructure may enter contract microsoft allows sideload line-of-business metro-style apps circumventing windows store also major web browser vendors google mozilla foundation selectively exempted rule allowed circumvent microsoft guidelines windows store run metro-style version user chooses make product default web browser metro-style apps third-party apps run windows rt traditional third-party apps run operating system windows 8 computer programs identified static computer icons windows taskbar responsible representing every app window run metro-style apps however identified tiles show icon also dynamic contents addition windows 8 windows 8.1 rtm shown windows taskbar run dedicated app switcher left side screen windows 8.1 update restored taskbar icons metro-style apps set limit many copies desktop apps run simultaneously example one user may run many copies programs notepad paint firefox system resources support desktop apps windows media player designed allow single instance enforced operating system however windows 8 one copy metro-style apps may run given time invoking app brings running instance front true multi-instancing apps available windows 10 version 1803 released may 2018 windows 10 brings significant changes uwp apps look work uwp apps look depends app uwp apps built specifically windows 10 typically distinct look feel use new ui controls look different previous versions windows exception apps use custom ui especially case video games apps designed windows 8.x look significantly different designed windows 10 uwp apps also look almost identical traditional desktop apps using legacy ui controls windows versions dating back windows 95 legacy desktop apps converted uwp apps distributed using appx file format windows 10 uwp apps even designed windows 8.x run floating windows users use windows taskbar task view switch uwp apps desktop apps windows 10 also introduced continuum tablet mode mode default disabled desktop computers enabled tablet computers desktop users switch manually tablet mode apps may resizable windows visible title bars tablet mode enabled resizable apps use windowing system similar metro-style apps windows 8.x forced either occupy whole screen snapped one side uwp apps windows 10 open multiple windows microsoft edge calculator photos examples apps allow windows 10 v1803 released may 2018 added true multi-instancing capabilities multiple independent copies uwp app run uwp apps downloaded windows store sideloaded another device sideloading requirements reduced significantly windows 8.x 10 app must still signed trusted digital certificate chains root certificate metro-style apps suspended closed suspended apps terminated automatically needed windows app manager dynamic tiles background components contracts interfaces interacting apps may require app activated user starts six years invoking arbitrary metro-style app uwp app command line supported feature first introduced insider build 16226 windows 10 released 21 june 2017 traditionally windows software developed using windows api software access api arbitrary restrictions developers free choose programming language development tools metro-style apps however developed using windows runtime winrt calling forbidden api disqualifies app appearing windows store every app using winrt metro-style app limited subset winrt available desktop apps metro-style apps developed using microsoft development tools according allen bauer chief scientist embarcadero technologies apis every computer program must call microsoft forbidden except call comes microsoft visual c++ runtime apps developed work intrinsically smartphones personal computers video game consoles hololens called universal apps accomplished using universal app api first introduced windows 8.1 windows phone 8.1 visual studio 2013 update 2 could used develop apps windows 10 introduced universal windows platform uwp 10 developing universal apps apps take advantage platform developed visual studio 2015 later older metro-style apps windows 8.1 windows phone 8.1 universal 8.1 need modifications migrate platform uwp distinct windows runtime rather extension universal apps longer indicate written specific os manifest instead target one device families e.g desktop mobile xbox internet things iot react capabilities become available device universal app may run small mobile phone tablet provide suitable experience universal app running mobile phone may start behaving way would tablet phone connected monitor suitable docking station appx file format used distribute install apps windows 8.x 10 windows phone 8.1 windows 10 mobile xbox one hololens windows 10 iot core unlike legacy desktop apps appx installation system allowed uwp apps replaces xap file format windows phone 8.1 attempt unify distribution apps windows phone windows 8 appx files compatible windows phone 8.1 later versions windows 8 later versions windows phone 8.x marketplace allows users download appx files sd card install manually contrast sideloading prohibited windows 8.x unless user developers license business domain traditionally windows software power use change ecosystem however wanted windows user account rights user account control antivirus software attempt keep ability check notify user app tries use malicious purposes metro-style apps however sandboxed permanently change windows ecosystem need permission access hardware devices webcam microphone file system access restricted user folders documents microsoft moderates programs may remove windows store discovered security privacy issues
[ 4759, 3263, 7619, 8073, 8076, 2198, 5213, 8085, 4500, 306, 4697, 740, 4156, 5781, 6580, 7682, 257, 3495, 5442, 2530, 4017, 359, 8049 ]
Test
7,248
1
Comparison_of_relational_database_management_systems:comparison relational database management systems following tables compare general technical information number relational database management systems please see individual products articles information unless otherwise specified footnotes comparisons based stable versions without add-ons extensions external programs style= width:16em maintainer first public release date latest stable version latest release date license public issues list style= text-align left 4d 4th dimension style= text-align left adabas style= text-align left adaptive server enterprise style= text-align left advantage database server ads style= text-align left altibase style= text-align left apache derby style= text-align left clustrixdb style= text-align left cubrid style= text-align left datacom style= text-align left db2 style= text-align left empress embedded database style= text-align left exasolution style= text-align left filemaker style= text-align left firebird style= text-align left gpudb style= text-align left hsqldb style= text-align left h2 style= text-align left informix dynamic server style= text-align left ingres style= text-align left interbase style= text-align left linter sql rdbms style= text-align left luciddb style= text-align left mariadb style= text-align left maxdb style= text-align left microsoft access jet style= text-align left microsoft visual foxpro style= text-align left microsoft sql server style= text-align left microsoft sql server compact embedded database style= text-align left mimer sql style= text-align left monetdb style= text-align left msql style= text-align left mysql style= text-align left memsql style= text-align left nexusdb style= text-align left hp nonstop sql style= text-align left nuodb style= text-align left omnis studio style= text-align left openbase sql style= text-align left openedge style= text-align left openlink virtuoso style= text-align left oracle db style= text-align left oracle rdb style= text-align left paradox style= text-align left percona server mysql style= text-align left pervasive psql style= text-align left polyhedra dbms style= text-align left postgresql style= text-align left style= text-align left raima database manager style= text-align left rdm server style= text-align left sap hana style= text-align left soliddb style= text-align left sql anywhere style= text-align left sqlbase style= text-align left sqlite style= text-align left sqream db style= text-align left superbase style= text-align left teradata style= text-align left tibero style= text-align left tidb
[ 2906, 4298, 1449, 3951, 2199, 6430, 1096, 4697, 6462, 1861, 6128, 7205, 5419, 1132, 4004, 5780, 6144, 7213, 1891, 4739, 784, 4747, 2265, 4759, 7248, 7618, 7978, 3005, 3011, 6538, 4781, 6543, 838, 4798, 517, 7303, 4457, 3752, 4104, 3764, ...
Test
7,249
8
Bitly:bitly bitly url shortening service link management platform company bitly inc. established 2008 privately held based new york city bitly shortens 600 million links per month use social networking sms email bitly makes money charging access aggregate data created result many people using shortened urls 2017 spectrum equity acquired majority stake bitly 64 million august 2018 bitly shortened 37.5 billion urls bitly url shortening service became popular twitter became default url shortening service website may 6 2009 subsequently replaced twitter t.co service company behind bitly launched similar service online videos determine videos popular web company offers paid solution called bitly enterprise provides advanced branding features audience intel omnichannel campaign tracking companies use custom domains generate shortened links example new york times uses codice_1 pepsi uses codice_2 allows company push brand awareness services twitter use bitly engine generate shortened urls track marketing metrics bitly enterprise also advanced analytics features uses bitly data provide advanced social insight tools companies brands company uses http 301 redirects links shortcuts intended permanent changed created urls shortened bitly service use codice_3 domain generic domain service offers information short bitly url codice_4 available codice_5 url plus sign appended example codice_6 allows users see check long url visiting starting october 12 2010 users could automatically generate qr codes scanned mobile qr code reader automatically directed users shortened links later removed may 29 2012 bitly announced bitmarks new search feature enhanced public profiles iphone app codice_7 country code top-level domain cctld libya 2011 bit.ly address set redirect bitly.com .ly tld controlled libyan government previously removed one domain deemed incompatible muslim law shortened url generated bitly also accessed replacing domain one following
[ 5151, 1137, 6297, 518 ]
Test
7,250
9
Little_Implementation_Language:little implementation language lil little implementation language system programming language early days unix history pdp-11 machines written p. j. plauger bell labs lil attempted fill gap assemblers machine-independent system implementation languages c programming language basically adding structured programming pdp-11 assembly language lil resembled pl360 c-like flow control syntax lil compiler lc part fifth edition unix 1974 dropped sixth edition unix 1975 plauger left bell labs year plauger explains lil abandoned bell labs favor c
[]
Test
7,251
2
GoboLinux:gobolinux gobolinux open source operating system whose prominent feature reorganization traditional linux file system rather following filesystem hierarchy standard like unix-like systems program gobolinux system subdirectory tree files including settings specific program may found thus program foo specific files libraries codice_1 corresponding version program hand example commonly known gcc compiler suite version 8.1.0 would reside directory codice_2 according gobolinux developers results cleaner system gobolinux hierarchy represents radical departure filesystem hierarchy traditionally employed unix-like operating systems specific types files stored together common standard subdirectories codice_3 executables codice_4 configuration files package managers used keep track file belongs program gobolinux files program placed respective program dedicated subdirectory makers gobolinux said filesystem package manager gobolinux package system uses filesystem package database said produce straightforward less cluttered directory tree gobolinux uses symlinks optional kernel module called gobohide achieve maintaining full compatibility traditional linux filesystem hierarchy creators gobolinux stated design modernisms removal distinctions similar traditional directories locations executables codice_3 codice_6 codice_7 gobolinux designers claimed results shell scripts breaking less often linux distributions change introduced gobolinux 2003 adopted distributions much later fedora merged /bin /usr/bin 2012 debian enabled /usr merge default 2016 gobolinux also allows user different versions program installed concurrently even run concurrently furthermore claimed package management index could never become unsynchronized filesystem references nonexistent files simply become broken links thus become inactive gobolinux filesystem changes also allow innovations entirely new boot system use system v bsd style init systems design gobolinux influenced earlier systems nextstep atheos beos adopted original filesystem structures still maintaining considerable degree compatibility unix root gobolinux tree six directories programs users system files mount depot contents described compile program downloads unpacks compiles source code tarballs installs resulting executable code single command codice_25 using simple compilation scripts known recipes compile system somewhat similar gentoo portage system based freebsd ports collection however portage made traditional filesystem hierarchy compatible filesystem hierarchy standard compile extends capability gobolinux distinctive filesystem hierarchy area package management thus gobolinux filesystem serves naturally kind package manager database compile program introduced gobolinux version 011 discussions porting gentoo portage system gobolinux developing port sourceforge.net project name goboportage compile features included gobolinux hierarchy files grouped functional categories index-like structure using symbolic links rooted codice_12 executables accessible codice_27 libraries accessible codice_28 eliminates many traditional distinctions filesystem hierarchy standard distinction made non-essential files stored codice_29 essential emergency files stored directly subdirectories root directory gobolinux developers maintained although distinctions useful longer necessary gobolinux schema symbolic links relating usual unix directories gobolinux tree therefore one find directories codice_4 codice_31 codice_6 expected places symbolic links point functional equivalent codice_12 tree thus traditionally crucial path names codice_34 codice_35 resolved correctly compatibility directories concealed view using custom kernel modification called gobohide implements support hidden files linux used aesthetic reasons thus optional feature gobolinux uses initialization procedure unlike linux distributions use bsd system v procedure codice_36 files command entire boot procedure codice_37 codice_38 run system boot shutdown respectively additionally possible define runlevel scripts specify different ways system may initialized example codice_39 single-user codice_40 multi-user codice_41 boot graphic mode controlled boot loader menu codice_42 file separates site-specific settings rest scripts application-specific tasks found codice_43 called boot scripts releases numbered using octal base system according authors scheme chosen keeps typical leading zero present many free software version numbers since leading zero often indicates number octal play version numbers race happened among linux distributions around 1999 read decimal numbers using octal numbers causes deterministic version bump eight releases version 013 gobolinux made point releases order avoid implication releases stable others tradition broken version 014.01 update 014 focused bug fixes gobolinux currently developed x86-64 officially made i686 release 015 one point incomplete port i386 made ports also made embedded architectures arm superh tasks achieved bootstrap tool developed especially automate making ports lwn.net reviewed gobolinux 010 2004 linux.com wrote review gobolinux 013 jesse smith distrowatch weekly reviewed gobolinux 015 smith also reviewed gobolinux 016
[ 2179, 2187, 2909, 5724, 5726, 6086, 7894, 2935, 6453, 2585, 2228, 1487, 2594, 58, 3996, 7587, 4008, 1893, 7954, 5092, 788, 1909, 6884, 7969, 7619, 6175, 4400, 7253, 3696, 474, 1179, 3366, 5480, 7635, 6902, 4778, 2297, 1941, 3023, 4059, ...
Train
7,252
8
WS-MetadataExchange:ws-metadataexchange ws-metadataexchange web services protocol specification published bea systems ibm microsoft sap ws-metadataexchange part ws-federation roadmap designed work conjunction ws-addressing wsdl ws-policy allow retrieval metadata web services endpoint uses soap message request metadata goes beyond basic technique appending wsdl service name url
[ 6986, 5500, 5631, 7565 ]
Test
7,253
2
Libranet:libranet libranet operating system based debian gnu/linux last version april 25 2005 released libranet 3.0 cost 90 us dollars new users 65 existing libranet users previous version libranet 2.8.1 became free download development libranet discontinued name comes libra computer systems company owned founder fact libra.com taken first release libranet 1999 linux distributions time difficult install considered either programmers wanted low cost server libranet attempted put sell distribution easy install meant desktop use corel likewise attempted corel linux abandoned refocused software windows mac os x operating systems libranet however continued developed recognition linux distribution good desktop users corel sold rights linux operating system xandros later released offering linux desktop 1999 2003 linux distributions comparable desktop usability libranet also priced similarly began change however 2004 linux whole advanced many distributions reasonably easy install relatively user-friendly desktop distributions mepis competitive far less expensive others knoppix offered cost libranet attempted carve niche user-friendly linux distro extensive support termed running support desktop distros compatible debian release time woody support offered truly extensive jon danzig founder would often personally answer people inquiries helped make people chosen libranet even loyal however release debian sarge 2005 along emergence ubuntu debian based distro offered cost option purchase support libranet received less attention debian revamped installer making easier use good reason use debian-based distribution debian installer user friendly libranet released version 3.0 received good reviews market changed desktop distributions various commercial vendors released free versions distributions suse released opensuse red hat released fedora whereas libranet sold distribution gave free extensive support many distributors chose give away distribution sell support and/or sell proprietary software enhancements jon danzig founder libranet died june 1 2005 son tal taken leadership development team stated would stop maintaining libranet daniel de kok remaining employee went become developer centos many users interested seeing libranet libranet adminmenu software continued available operating system setup configuration tool unique also contained user-friendly kernel compiling tool team including daniel de kok proposed opensource libranet release openlibranet 3.1 failing obtain definitive permission plan tal danzig owner plan dropped
[ 1909, 5200, 4759, 1629, 3444, 7251, 474, 7075, 5571, 1941, 578, 314, 2758, 1663, 2864, 6209, 2680, 3996, 6761, 2063, 343, 4824, 5523, 7587, 5259, 1893, 5530, 5704, 6317, 3751, 6586, 7954, 6244 ]
Test
7,254
7
Cannon's_algorithm:cannon algorithm computer science cannon algorithm distributed algorithm matrix multiplication two-dimensional meshes first described 1969 lynn elliot cannon especially suitable computers laid n × n mesh cannon algorithm works well homogeneous 2d grids extending heterogeneous 2d grids shown difficult main advantage algorithm storage requirements remain constant independent number processors scalable universal matrix multiplication algorithm summa practical algorithm requires less workspace overcomes need square 2d grid used scalapack plapack elemental libraries multiplying two n×n matrices b need n ×n processing nodes p arranged 2d grid initially p responsible b need select k every iteration every processor element pe processors n't access data computing formula_1 therefore processors row column must begin summation different indexes example pe 0,0 calculates formula_2 first step pe 0,1 chooses formula_3 first selection k j mod n pe j satisfies constraint first step first step distribute input matrices processors based previous rule next iterations choose new k k 1 mod n every processor way every processor continue accessing different values matrices needed data always neighbour processors pe j needs formula_4 pe j 1 mod n formula_5 pe 1 mod n j next step means formula_4 passed cyclically left also formula_5 cyclically upwards results multiplications summed usual n steps processor calculated formula_1 sum thus searched formula_9 initial distribution processor data next step stored intermediate result previous sum formula_10 formula_11 means three matrices need stored memory evenly distributed across processors practice much fewer processors matrix elements replace matrix elements submatrices every processor processes values scalar multiplication addition become sequential matrix multiplication addition width height submatrices formula_12 runtime algorithm formula_13 formula_14 time initial distribution matrices first step formula_15 calculation intermediate results formula_16 formula_17 stands time takes establish connection transmission byte respectively disadvantage algorithm many connection setups small message sizes would better able transmit data message
[ 7499, 6987, 5117 ]
Test
7,255
9
Dartmouth_ALGOL_30:dartmouth algol 30 dartmouth algol 30 1960s-era implementation firstly algol 58 programming language algol 60 lgp-30 dartmouth college hence name since limited size lgp-30 precluded full implementation algol 60 certain features arrays called value arrays strings variable array bounds recursion omitted implementers include parameters called name using thunks integer labels dubbed work algol 30 since lgp-30 project emerged small group undergraduate students well equipped perform work development computer languages instance one student stephen j. garland discovered compound statements blocks could included samelson bauer scanning algorithm simple fact published years later algol 30 system suffered one defect hindered wide use student-oriented language two-pass system intermediate code similar relocatable binary punched onto paper tape compilations could batched delays presenting source code tape final execution great allow widespread student use clear load-and-go system needed thus born scalp self contained algol processor
[ 1114, 6723, 4837 ]
Validation
7,256
9
SECD_machine:secd machine secd machine highly influential see landin contribution virtual machine abstract machine intended target functional programming language compilers letters stand stack environment control dump internal registers machine registers stack control dump point realisations stacks environment points realisation associative array machine first specifically designed evaluate lambda calculus expressions originally described peter j. landin mechanical evaluation expressions 1964 description published landin fairly abstract left many implementation choices open like operational semantics hence secd machine often presented detailed form peter henderson lispkit lisp compiler distributed since 1980 since used target several experimental compilers 1989 researchers university calgary worked hardware implementation machine d. a. turner 2012 points revised report algol 60 naur 1963 specifies procedure call copying rule avoids variable capture systematic change identifiers method works algol 60 implementation functional programming language functions first-class citizens free variable call stack might dereferenced error turner notes landin solved secd machine function represented closure heap instead evaluation expression begins expression loaded element control codice_1 environment codice_2 stack codice_3 dump codice_4 begin empty evaluation codice_1 converted reverse polish notation rpn codice_6 apply operator example expression codice_7 single list element changed list codice_8 evaluation codice_1 proceeds similarly rpn expressions first item codice_1 value pushed onto stack codice_3 exactly item identifier value pushed onto stack binding identifier current environment codice_2 item abstraction closure constructed preserve bindings free variables codice_2 closure pushed onto stack item codice_6 two values popped stack application done first applied second result application value pushed onto stack application abstraction value however result lambda calculus expression may application rather value pushed onto stack case current contents codice_3 codice_2 codice_1 pushed onto dump codice_4 stack triples codice_3 reinitialised empty codice_1 reinitialised application result codice_2 containing environment free variables expression augmented binding resulted application evaluation proceeds completed evaluation indicated codice_1 empty case result stack codice_3 last saved evaluation state codice_4 popped result completed evaluation pushed onto stack contents restored codice_4 evaluation restored state continues codice_1 codice_4 empty overall evaluation completed result stack codice_3 secd machine stack-based functions take arguments stack arguments built-in instructions encoded immediately instruction stream like internal data-structures stack list codice_3 register pointing list head beginning due list structure stack need continuous block memory stack space available long single free memory cell even cells used garbage collection may yield additional free memory obviously specific implementations secd structure implement stack canonical stack structure improving overall efficiency virtual machine provided strict bound put dimension stack codice_1 register points head code instruction list evaluated instruction executed codice_1 pointed next instruction list—it similar instruction pointer program counter conventional machines except subsequent instructions always specified execution default contained subsequent memory locations case conventional machines current variable environment managed codice_2 register points list lists individual list represents one environment level parameters current function head list variables free current function bound surrounding function elements codice_2 dump whose head codice_4 register points used temporary storage values registers example function calls likened return stack machines memory organization secd machine similar model used functional language interpreters number memory cells hold either atom simple value example 13 represent empty non-empty list latter case cell holds two pointers cells one representing first element representing list except first element two pointers traditionally named car cdr respectively—but modern terms head tail often used instead different types values cell hold distinguished tag often different types atoms integers strings etc distinguished well list holding numbers 1 2 3 usually written codice_35 might represented follows memory cells 3 5 belong list cells distributed randomly memory cell 2 head list points cell 1 holds first element value list containing 2 3 beginning cell 6 cell 6 points cell holding 2 cell 7 represents list containing 3 pointing cell 8 containing value 3 pointing empty list nil cdr secd machine cell 0 always implicitly represents empty list special tag value needed signal empty list everything needing simply point cell 0 principle cdr list cell must point another list convention car cdr point atoms yield pair usually written like codice_36 number additional instructions basic functions like car cdr list construction integer addition i/o etc exist take necessary parameters stack
[ 1616, 769, 5171, 3895, 920, 7391, 3836, 3737 ]
Validation
7,257
1
Canadian_Police_Information_Centre:canadian police information centre canadian police information centre cpic cipc central police database canada law enforcement agencies access information number matters canada national law enforcement networking computer system ensuring officers across country access information approximately 3 million files generated year responsibility originating agency ensure data integrity file cpic approved use treasury board canada became operational 1972 maintained royal canadian mounted police rcmp central registry located rcmp headquarters ottawa ontario canada cpic interfaced united states national crime information center national law enforcement telecommunications system information shared example wandering persons registry information shared across border order government agency access cpic must agree abide rules set cpic reference manual approved cpic advisory committee composed 26 senior police officers municipal provincial police forces ontario police commission rcmp non-policing agencies must also enter memorandum understanding rcmp may audited time time compliance cpic broken four data banks investigative identification intelligence ancillary contain information local municipal provincial police services canada well federal law enforcement agencies canada border services agency military police maintain local records addition cpic records local records maintained contact police variety reasons may may contain information would entered cpic system cpic agencies subject audit 4-year cycle records added cpic system must satisfy stringent entry criteria every record must valid accurate complete nature compliant input rules province british columbia mandated law police forces share platform known prime-bc ontario local records kept systems known either niche versadex depending municipalities choice implementation quebec system used called crpq centre de reseignement des policiers du québec rcmp runs similar system called pros police reporting occurrence system provinces providing contract policing well federal policing 2011 toronto-based psychiatric patient advocate office announced received numerous complaints people denied entry united states names american department homeland security watchlist names provided canadian police information centre available american law enforcement authorities according wikileaks
[ 2054 ]
Test
7,258
6
EncFS:encfs encfs free lgpl fuse-based cryptographic filesystem transparently encrypts files using arbitrary directory storage encrypted files two directories involved mounting encfs filesystem source directory mountpoint file mountpoint specific file source directory corresponds file mountpoint provides unencrypted view one source directory filenames encrypted source directory files encrypted using volume key stored either within outside encrypted source directory password used decrypt key encfs offers several advantages disk encryption software simply file stored individually encrypted file elsewhere host directory tree encfs available multiple platforms whereas ecryptfs tied linux kernel encfs implements bitrot detection top underlying filesystem encfs volumes occupy fixed size — encrypted directories grow shrink files added removed mountpoint encfs encrypted directory located normal file server via nfs sshfs etc mirrored backed efficiently normal file-system tools rsync possible directories mountpoint exist different physical devices filesystem mounted one sub-directories source directory backup utilities back files changed source directory file synchronisation cloud storage corruption data isolated corruption filedata local single file data corruption filesystem corrected reliable filesystem repair utility like fsck whole-disk encryption systems lack one attributes since file modifications shine underlying file system various optimizations operating system still possible unlike full-disk encryption example passing information released space trim improve performance ssd drives also supported dm-crypt files accessed random example skip middle large encrypted video without decrypting whole file drawbacks using encfs mounted encfs directories share features restrictions filesystem containing source directory due encryption filenames encrypted files produced encfs longer original filenames therefore filenames whose length close maximum supported filesystem stored encfs since exceed length limit encryption filesystems limit filenames 255 bytes case encfs supports filenames 190 bytes anyone access source directory able see many files encrypted filesystem permissions approximate size last time accessed modified though file names file data encrypted paid security audit conducted february 2014 revealed several potential vulnerabilities concludes announcement encfs 1.8 included several underlying design changes acknowledging security concerns raised previous audit however certain concerns still remain regarding vulnerabilities creating new encfs volume several different options available customize filesystem suit various needs encfs uses whatever ciphers able locate various encryption libraries system blowfish aes typically available cipher key length keysize selected ciphers support variable key lengths file encrypted blocks option controls size blocks time single byte read entire block contained must decrypted likewise write block must decrypted altered re-encrypted default block size 1024 sufficient purposes filenames source directory plain encrypted block stream mode block mode obscures filename length somewhat stream mode keeps short possible might save space source directory filesystem depending filesystem manages directory tree enabled initialization vector filename encryption derived file parent directories causing two files name — different directories — different encrypted filenames directory renamed files directories contained therein need encrypted filenames re-encrypted expensive operation option disabled heavily populated directories renamed often enabled file encrypted random 8-byte initialization vector stored within encrypted file source directory option disabled file encrypted initialization vector make volume key easier break enabling option makes filesystem secure cost additional 8 bytes per file causes file data initialization vector derived filename initialization vector chain data encrypted differently given different filename directory consequently renaming file mode enabled requires either file random initialization vector offset change filename initialization vector chain data re-encoded authors encfs chosen former route considerably faster especially large files makes encoding depend full pathname renaming moving means reencoding hardlinks supported stores checksum encrypted block causing corruption modification encrypted files detected encfs checksum blockmacbytes 8 bytes optionally 8 additional bytes random data blockmacrandbytes added block prevent two blocks unencrypted data checksum option creates large amount cpu overhead block checksum must calculated data read verify integrity written update checksum encfs supports somewhat primitive form secondary volumes single source directory offering different files given different passwords encfs unable decrypt file volume key ignored encfs forced ignore invalid password entry volume key decode differently hence files encrypted decrypted different key present two different encrypted volumes given different passwords however possible two filenames two different secondary volumes encrypted filename case file overwritten new file created note refers encrypted filenames unencrypted filenames danger averted creating one directory per secondary volume storing files visible directory secondary volume mounted also password changed volume key re-encoded new password cause secondary filesystems vanish volume key longer incorrectly decode key given secondary password primary password changed back secondary filesystems become available encfs author support technique
[ 3599, 2547, 7161, 4672, 6431, 3626, 2566, 5049, 6458, 6117, 759, 5773, 6854, 5437, 5440, 4014, 4375, 6500, 6505, 4386, 3350, 5457, 5808, 460, 1534, 7976, 4406, 821, 5130, 1561, 836, 5843, 2313, 6558, 2683, 5859, 5865, 4444, 5518, 6231, ...
Validation
7,259
2
Interface_Builder:interface builder interface builder software development application apple macos operating system part xcode formerly project builder apple developer developer toolset interface builder allows cocoa carbon developers create interfaces applications using graphical user interface resulting interface stored .nib file short next interface builder recently .xib file interface builder descended nextstep development software name version interface builder also used development openstep software similar tool called gorm exists gnustep march 27 2008 specialized iphone version interface builder allowing interface construction iphone applications released iphone sdk beta 2 interface builder intentionally developed separate application allow interaction designers design interfaces without use code-oriented ide xcode 4 apple integrated functionality directly xcode interface builder first made appearance 1986 written lisp experlisp product expertelligence invented developed jean-marie hullot using object-oriented features experlisp deeply integrated macintosh toolbox denison bollay took jean-marie hullot next later year demonstrate steve jobs jobs immediately recognized value started incorporating nextstep 1988 part nextstep 0.8 first commercial application allowed interface objects buttons menus windows placed interface using mouse one notable early use interface builder development first worldwideweb web browser tim berners-lee cern made using next workstation interface builder provides palettes collections user interface objects objective-c swift developer user interface objects contain items like text fields data tables sliders pop-up menus interface builder palettes completely extensible meaning developer develop new objects add palettes interface builder build interface developer simply drags interface objects palette onto window menu actions messages objects emit connected targets application code outlets pointers declared application code connected specific objects way initialization done runtime improving performance streamlining development process interface builder standalone application interface designers could ship nib files developers would drop projects interface builder saves application interface bundle contains interface objects relationships used application objects archived process also known serialization marshalling contexts either xml file next-style property list file .nib extension upon running application proper nib objects unarchived connected binary owning application awakened unlike almost gui designer systems generate code construct ui notable exceptions glade embarcadero technologies delphi c++builder stream ui objects similarly nibs often referred freeze dried contain archived objects ready run interface builder version 3 new file format extension .xib added functionally identical .nib except stored flat file making suitable storage revision control systems processing tools diff
[ 6788, 4214, 5101, 7517, 3779, 4320, 5571, 1654, 1287, 1656, 1657, 405, 3649, 2327, 1123, 5331, 4355, 246, 4543, 1599, 2609, 2794, 3412, 5450, 5786, 5787, 7308, 3920, 4376, 5091, 4653 ]
Test
7,260
3
Dup_(system_call):dup system call unix-like operating systems dup short duplicate dup2 system calls create copy given file descriptor new descriptor actually behave like copy like alias old one dup dup2 calls standardized posix specification former allocates first available descriptor like open behaves alternative way duplicate file descriptor unspecified place fcntl system call codice_1 command latter places copy newfd newfd open closed first unix shells use dup2 input/output redirection along codice_2 tool unix pipes rely following example uses codice_2 codice_4 order connect two separate processes program1 program2 using unix pipes
[ 6984, 4539, 3493, 5537, 3843, 578, 5931, 4128, 4771 ]
Test
7,261
2
Nokia_E52/E55:nokia e52/e55 nokia e52 nokia e55 smartphones nokia business-oriented eseries range run symbian os v9.3 s60 3rd edition fp1 e55 announced 16 february 2009 whilst e52 announced later 6 may 2009 physically functionally identical except e55 'half-qwerty keyboard whereas e52 revision traditional t9 keypad available black black aluminum metal grey aluminium white aluminium gold came 1gb microsd memory card supports microsd cards 32gb memory also 60 mb free user memory e52 successor nokia successful e51 model latest firmware version v091.004 released june 2 2012 e52 e55 9.9 mm thickness slim time feature mostly metallic bodies nokia called e55 world thinnest smartphone 0.1 mm thinner nokia e71 e55 model unique 'compact qwerty keyboard featuring two letters qwerty order single key observed 5.5 watt-hour 1500 mah 3.7 v battery easily last 27 days practical use considerably higher phones class made nokia manufacturers wifi bluetooth used built-in voip client active battery last 24 hours
[ 1066, 5979, 2271, 2451, 6517, 372, 1724, 463, 7521, 3615, 1453, 4935, 3694, 3524, 3952, 472, 5909, 7169, 8072, 2922, 4407, 118, 23, 5826, 2564, 3703, 7261, 6440, 484, 7545, 5044, 5493, 740, 1202, 5315, 3029, 5499, 7012, 139, 6465, 5062,...
Test
7,262
4
Dynamic_Application_Security_Testing:dynamic application security testing dynamic application security testing dast tool program communicates web application web front-end order identify potential security vulnerabilities web application architectural weaknesses performs black-box test unlike static application security testing tools dast tools access source code therefore detect vulnerabilities actually performing attacks dast tools allow sophisticated scans detecting vulnerabilities minimal user interactions configured host name crawling parameters authentication credentials tools attempt detect vulnerabilities query strings headers fragments verbs get/post/put dom injection customers benefit convenience applications tacitly taking risk private information stored web applications compromised hacker attacks insider leaks according privacy rights clearinghouse 18 million customer records compromised 2012 due insufficient security controls corporate data web applications dast tools facilitate automated review web application expressed purpose discovering security vulnerabilities required comply various regulatory requirements web application scanners look wide variety vulnerabilities input/output validation e.g cross-site scripting sql injection specific application problems server configuration mistakes copyrighted report published march 2012 security vendor cenzic common application vulnerabilities recently tested applications include commercial scanners category web-assessment tools need bought specific price usually quite high scanners include free features need bought full access tool power open-source scanners another class free nature best category since source code open user gets know happening unlike commercial scanners security researcher shay chen previously compiled exhaustive list commercial open-source web application security scanners list also highlights scanners performed benchmarking tests wavsep wavsep platform publicly available used evaluate various aspects web application scanners technology support performance accuracy coverage result consistency tools detect vulnerabilities finalized release candidate versions prior shipping scanners simulate malicious user attacking probing identifying results part expected result set dynamic testing tool web scanners language dependent web application scanner able scan engine-driven web applications attackers use tools tools find vulnerability attackers scanning dast tool data may overwritten malicious payloads injected subject site sites scanned production like non-production environment ensure accurate results protecting data production environment tool implementing dynamic testing method cover 100 source code application application penetration tester look coverage web application attack surface know tool configured correctly able understand web application tool implement variants attacks given vulnerability tools generally predefined list attacks generate attack payloads depending tested web application tools also quite limited understanding behavior applications dynamic content javascript flash report 2012 found top application technologies overlooked web application scanners includes json jquery rest google webtoolkit ajax applications flash remoting amf html5 well mobile apps web services using json rest xml-rpc soap technologies used web services complex workflows shopping cart xsrf/csrf tokens also listed
[ 1019, 623, 860, 3932, 2451, 1691, 4663, 230, 3967, 6567, 7319 ]
Validation
7,263
2
Windows_Image_Acquisition:windows image acquisition windows image acquisition wia sometimes also called windows imaging architecture proprietary microsoft driver model application programming interface api microsoft windows later windows operating systems enables graphics software communicate imaging hardware scanners digital cameras digital video equipment first introduced 2000 part windows continues standard imaging device api model successive windows versions implemented on-demand service windows xp later windows operating systems wia significant superset support digital still imaging drivers provided still image architecture sti windows 98 whereas sti provided low-level interface basic transfers data device well invocation image scan process windows machine external device wia provides framework device present unique capabilities operating system applications invoke features according microsoft wia drivers made user interface ui component driver core component loaded two different process spaces ui application space driver core wia service space certain scanners support wia 2002 microsoft released windows image acquisition automation library tool provides access wia functionality programming languages scripting environments support ole automation windows xp wia runs localsystem context security ramifications running service localsystem whereby buggy driver malicious person would unrestricted access system wia service windows server 2003 windows vista operates localservice context result compatibility issues using driver designed windows xp windows xp support added automatic document feeder scanners scroll-feed scanners without preview capabilities multi-page tiff generation wia video snapshot filter driver introduced allows still frames captured video stream windows vista introduced windows image acquisition 2.0 windows vista also wia automation library built-in wia2 supports push scanning multi-image scanning push scanning allows initiating scans adjusting scanning parameters directly scanner control panel multi-image scanning allows one scan several images save directly separate files however video content support removed wia windows vista
[ 7149, 7159, 6420, 714, 720, 1460, 2928, 7907, 5747, 2953, 6840, 422, 4017, 6504, 4022, 4026, 7607, 1526, 3687, 4759, 2283, 5479, 5850, 150, 6933, 519, 3052, 4448, 3407, 1232, 2702, 7687, 1989, 4848, 4129, 8073, 2018, 8085, 6989, 6991, 8...
Validation
7,264
2
Queued_Telecommunications_Access_Method:queued telecommunications access method queued telecommunications access method qtam ibm system/360 communications access method incorporating built-in queuing qtam alternative lower level basic telecommunications access method btam access method qtam announced ibm 1965 part os/360 dos/360 aimed inquiry data collection announced also supported remote job entry rje applications called job processing dropped 1968 originally qtam supported ibm 1030 data collection system ibm 1050 data communications system ibm 1060 data communications system 83b2 selective calling stations western union plan 115a outstations teletype model 33 35 teletypewriters 1968 terminal support expanded include ibm 2260 display complex ibm 2740 communications terminal qtam devices attached system/360 multiplexor channel ibm 2701 data adapter ibm 2702 transmission control 1968 support ibm 2703 transmission control unit added qtam succeeded tcam provided roughly similar facilities supported dos qtam consists message control program mcp zero message processing programs mpp mcp handles communications terminals identifies input messages starts mpps process required similar concept much later internet service daemon inetd unix systems mcp assembled user installation set macros supplied ibm macros define lines terminals comprising system datasets required procedures used process received transmitted messages mpps incorporating logic process various messages supplied installation use standard os/360 data management macros codice_1 codice_2 codice_3 codice_4 pl/i includes codice_5 file declaration attribute allow mpps written high-level language
[ 839, 607, 7783, 5081, 5852, 3233, 7331, 7040, 7661, 4145, 7003, 2596, 5932, 1851, 1994 ]
Test
7,265
4
Network_Based_Application_Recognition:network based application recognition network based application recognition nbar mechanism used cisco routers switches recognize dataflow inspecting packets sent networking equipment uses nbar deep packet inspection packets dataflow determine traffic category flow belongs used conjunction features may program internal application-specific integrated circuits asics handle flow appropriately categorization may done open systems interconnection osi layer 4 info packet content signaling new applications made difficult purpose cling kind tagging nbar approach useful dealing malicious software using known ports fake priority traffic well non-standard applications using dynamic ports nbar also known osi layer 7 categorization cisco routers nbar mainly used quality service security purposes
[]
Test
7,266
2
Prevayler:prevayler prevayler open-source bsd system-prevalence layer java transparently persists plain old java objects in-ram database backed snapshots system via object serialization loaded system crash restore state changes data happen via transaction operations objects made serializable classes prevayler development started klaus wuestefeld read operations three four orders magnitude faster prevayler compared traditional database systems since objects always ram in-process prevayler requires enough ram keep entire system state
[]
Validation
7,267
2
Network_block_device:network block device operating systems network block device device node whose content provided remote machine typically network block devices used access storage device physically reside local machine remote one example local machine access hard disk drive attached another computer technically network block device realized three components server part client part network client machine device node kernel driver controls device whenever program tries access device kernel driver forwards request client part fully implemented kernel done help userspace program server machine data resides physically server machine requests client handled userspace program network block device servers typically implemented userspace program running general-purpose computer function specific network block device servers reside userspace process process communicates client via conventional sockets accesses storage via conventional file system interface network block device client module available unix-like operating systems including linux bitrig since server userspace program potentially run every unix-like platform example nbd server part ported solaris
[ 6984, 1624, 7639, 5571, 4806, 6952, 1703, 578, 738, 7848, 5996, 976 ]
Validation
7,268
9
Frederica_Darema:frederica darema frederica darema greek american physicist proposed spmd programming model 1984 dynamic data driven application systems dddas 2000 elected ieee fellow 2004 darema received bs degree school physics mathematics university athens greece ms ph d. degrees theoretical nuclear physics illinois institute technology university california davis respectively attended fulbright scholar distinguished scholar physics research associate positions university pittsburgh brookhaven national laboratory received aps industrial fellowship became technical staff member nuclear sciences department schlumberger doll research subsequently 1982 joined ibm thomas j. watson research center research staff member computer sciences department later-on established became manager research group ibm research parallel applications dr. darema national science foundation since 1994 managed new generation software dynamic data driven application systems programs 1996-1998 completed two-year assignment darpa air force office scientific research
[]
Test
7,269
3
Chuck_Yeager's_Advanced_Flight_Trainer:chuck yeager advanced flight trainer chuck yeager advanced flight trainer 1987 computer aircraft simulation game produced electronic arts originally released chuck yeager advanced flight simulator due legal dispute microsoft usage flight simulator name title pulled shelves later re-released chuck yeager advanced flight trainer many copies original title sold pulled shelves chuck yeager served technical consultant game likeness voice prominently used game allows player test pilot 14 different airplanes including bell x-1 yeager piloted become first man exceed mach 1 game embellished yeager laconic commentary user crashes one plane yeager remarks really screwed pooch one asides chuck yeager advanced flight trainer includes 11 real aircraft three experimental aircraft designed developers fictional experimental aircraft named people worked game game big hit ea selling 100,000 copies december 1987 sales surpassed 250,000 copies november 1989 game reviewers hartley patricia lesser complimented game role computers column dragon 126 1987 stating much game going quite time another flight simulator offer much performance buck reviewers gave pc/ms-dos version game 4 5 stars lessers reviewed macintosh version game 1988 dragon 140 role computers column giving version 4 stars well compute criticized blocky graphics sound noted simple graphics resulted high frame rate concluded chuck yeager differed games simulating flying high-performance experimental aircraft 1994 survey wargames computer gaming world gave title one-plus stars five stating replaced chuck yeager air combat game followed 1989 chuck yeager advanced flight trainer 2.0 1991 chuck yeager air combat
[ 3346, 6380, 3459, 1508 ]
Train
7,270
4
Parkerian_Hexad:parkerian hexad parkerian hexad set six elements information security proposed donn b. parker 1998 parkerian hexad adds three additional attributes three classic security attributes cia triad confidentiality integrity availability parkerian hexad attributes following attributes information atomic broken constituents non-overlapping refer unique aspects information information security breach described affecting one fundamental attributes information confidentiality refers limits get kind information example executives concerned protecting enterprise strategic plans competitors individuals concerned unauthorized access financial records integrity refers correct consistent intended state information unauthorized modification data whether deliberate accidental breach data integrity example data stored disk expected stable – supposed changed random problems disk controller similarly application programs supposed record information correctly introduce deviations intended values donn parker definition information integrity comes dictionaries integrity means information whole sound unimpared necessarily correct means nothing missing information complete intended good order author statement comes close saying information correct ... state information may incorrect authentic integrity correct authentic lacking integrity availability means timely access information example disk crash denial-of-service attacks cause breach availability delay exceeds expected service levels system described breach availability authenticity refers veracity claim origin authorship information example one method verifying authorship hand written document compare handwriting characteristics document sampling others already verified electronic information digital signature could used verify authorship digital document using public-key cryptography could also used verify integrity document possession control suppose thief steal sealed envelope containing bank debit card personal identification number even thief open envelope reasonable victim concerned thief could time situation illustrates loss control possession information involve breach confidentiality utility means usefulness example suppose someone encrypted data disk prevent unauthorized access undetected modifications – lost decryption key would breach utility data would confidential controlled integral authentic available – would n't useful form similarly conversion salary data one currency inappropriate currency would breach utility would storage data format inappropriate specific computer architecture e.g. ebcdic instead ascii 9-track magnetic tape instead dvd-rom tabular representation data substituted graph could described breach utility substitution made difficult interpret data utility often confused availability breaches described examples may also require time work around change data format presentation however concept usefulness distinct availability
[ 6049, 2438 ]
Test
7,271
7
PagerDuty:pagerduty pagerduty cloud computing company produces saas incident response platform departments 2018 company raised 170 million venture funding recognized forbes cloud 100 well usa today list top small mid-sized companies diversity 2018 pagerduty headquartered san francisco operations toronto ontario atlanta united kingdom australia platform designed alert clients disruptions outages machine learning automation software operates standalone service integrated existing systems company works 10,000 clients including airbnb ibm instacart lululemon uber william hill australia company founded 2009 toronto ontario university waterloo graduates alex solomon andrew miklas baskar puvanathasan company incubated combinator pagerduty raised seed funding round 1.9 million 2010 followed series round raised 10.7 million january 2013 july 2016 former ceo keynote systems jennifer tejada named ceo pagerduty later year company held first pagerduty summit industry conference encourage digital innovation pagerduty summit held san francisco 2017 2018 2016 pagerduty received silver stevie award female executive year computer services computer software category following year company gold new product service year award software service management solution silver award customer service department year computer services pagerduty announced funding round april 2017 led accel 43.8 million round included existing investors andreessen horowitz bessemer venture partners baseline ventures harrison metal september 2018 pagerduty raised 90 million round led t. rowe price associates wellington management june 2018 pagerduty launched event intelligence product designed analyze incoming digital signals human responses communicate incident response suggestions operators new incidents occur industry conference september 2018 company also launched pagerduty visibility pagerduty analytics march 2019 pagerduty filed s-1 sec anticipation ipo april 2019 pagerduty went public new york stock exchange
[ 2961, 330 ]
Test
7,272
2
Windows_Terminal:windows terminal windows terminal terminal emulator windows 10 written microsoft includes support command prompt powershell wsl ssh initial source code release github preview release first published microsoft store june 21 2019
[ 1812, 3937, 3263, 6088, 378, 2198, 6096, 1475, 7553, 5410, 7564, 422, 6844, 2245, 435, 1140, 5442, 5090, 3340, 7602, 6164, 4759, 1534, 6885, 7619, 2999, 6528, 2290, 4774, 1181, 5480, 3711, 5138, 140, 6558, 1213, 8024, 1975, 6575, 3407, ...
Test
7,273
9
Steelman_language_requirements:steelman language requirements steelman language requirements set requirements high-level general-purpose programming language meet created united states department defense department defense common high order language program 1978 predecessors document called order strawman woodenman tinman ironman requirements focused needs embedded computer applications emphasised reliability maintainability efficiency notably included exception handling facilities run-time checking parallel computing concluded existing language met criteria sufficient extent contest called create language would closer fulfilling design contest became ada programming language resulting language followed steelman requirements closely though exactly ada 95 revision language went beyond steelman requirements targeting general-purpose systems addition embedded ones adding features supporting object-oriented programming
[ 7036, 304, 5948 ]
Validation
7,274
2
Monaco_(typeface):monaco typeface monaco monospaced sans-serif typeface designed susan kare kris holmes ships os x already present previous versions mac operating system characters distinct difficult confuse 0 figure zero uppercase 1 figure one vertical bar uppercase l lowercase l unique feature font high curvature parentheses well width square brackets result empty pair parentheses square brackets strongly resemble circle square respectively monaco released least three forms original bitmap monospace font still appears roms even new world macs still available recent macos releases size 9 disabled antialiasing second outline form loosely similar lucida mono created truetype font system 6 7 standard font used sizes briefly third known mpw since designed used macintosh programmer workshop ide essentially straight conversion bitmap font outline font addition disambiguation features added truetype monaco original monaco 9 point bitmap font designed compact macintosh window displayed full screen terminal emulator program would result standard text user interface display 80 columns 25 lines august 2009 release mac os x 10.6 snow leopard menlo introduced default monospaced font instead monaco terminal xcode however monaco remains part os x. monaco default font current python idle used mac running os x el capitan
[ 2107, 5011, 117, 822, 2927, 7308, 149, 6909, 4355, 993, 2357, 6067 ]
Test
7,275
4
IPFire:ipfire ipfire hardened open source linux distribution primarily performs router firewall standalone firewall system web-based management console configuration ipfire originally started fork ipcop rewritten basis linux scratch since version 2 supports installation add-ons add server services extended soho server april 2015 project became member open invention network basic requirements least 1ghz cpu 1gb ram 4gb hard drive two network cards needed connect ethernet network dsl lte wi-fi wlan supported according hardware required computing power run ipfire depends area application commonly x86 systems used arm devices raspberry pi banana pi supported ipfire used virtual environments kvm vmware xen qemu etc. basic setup ipfire happens guided dialogue console administration takes place web-based management interface add-ons additional features project regularly updated development team maintain security developed stateful packet inspection spi firewall ipfire separates network different segments based security risk organised colours normal clients connected lan represented green internet represented red optional dmz represented orange optional wireless network represented blue traffic flow segments unless specifically permitted firewall rule ipfire package management system called pakfire allows install system updates keep security date additional software packages customisation different usage scenarios needs linux system customised concrete purpose firewall design modular making functionalities extensible plugins base comes following features
[ 1809, 385, 7536, 6107, 3637, 6456, 7189, 6149, 3338, 4014, 7597, 3680, 4759, 806, 2644, 2296, 1559, 6918, 3394, 6560, 7289, 4091, 7683, 6235, 3751, 6951, 5884, 875, 6962, 1249, 2001, 1261, 4492, 1640, 4138, 7351, 2746, 5571, 578, 1284, ...
Test
7,276
4
Chung_Kwei_(algorithm):chung kwei algorithm chung kwei spam filtering algorithm based teiresias algorithm finding coding genes within bulk dna
[ 5733, 3031 ]
Train
7,277
9
Syntactic_sugar:syntactic sugar computer science syntactic sugar syntax within programming language designed make things easier read express makes language sweeter human use things expressed clearly concisely alternative style may prefer example many programming languages provide special syntax referencing updating array elements abstractly array reference procedure two arguments array subscript vector could expressed codice_1 instead many languages provide syntax codice_2 similarly array element update procedure three arguments example codice_3 many languages provide syntax codice_4 construct language called syntactic sugar removed language without effect language functionality expressive power remain language processors including compilers static analyzers often expand sugared constructs fundamental constructs processing process sometimes called desugaring term syntactic sugar coined peter j. landin 1964 describe surface syntax simple algol-like programming language defined semantically terms applicative expressions lambda calculus centered lexically replacing λ later programming languages clu ml scheme extended term refer syntax within language could defined terms language core essential constructs convenient higher-level features could desugared decomposed subset fact usual mathematical practice building primitives building landin distinction essential language constructs syntactic sugar 1991 matthias felleisen proposed codification expressive power align widely held beliefs literature defined expressive mean without language constructs question program would completely reorganized programmers feel syntax usability features either unimportant outright frivolous notably special syntactic forms make language less uniform specification complex may cause problems programs become large complex view particularly widespread lisp community lisp simple regular syntax surface syntax easily modified example alan perlis quipped epigrams programming reference bracket-delimited languages syntactic sugar causes cancer semi-colons metaphor extended coining term syntactic salt indicates feature designed make harder write bad code specifically syntactic salt hoop programmers must jump prove know going rather express program action example java pascal assigning float value variable declared int without additional syntax explicitly stating intention result compile error c c++ automatically truncate floats assigned int however syntax semantics c hiding inherited class member compiler warning issued unless codice_29 keyword used specify hiding intentional avoid potential bugs owing similarity switch statement syntax c c++ c requires codice_30 non-empty codice_31 label codice_32 unless codice_33 codice_34 codice_35 used even though allow implicit fall-through using codice_33 specifying subsequent label produces c/c++-like fall-through syntactic salt may defeat purpose making code unreadable thus worsen quality – extreme cases essential part code may shorter overhead introduced satisfy language requirements alternative syntactic salt generating compiler warnings high probability code result mistake – practice common modern c/c++ compilers extensions syntactic saccharin syntactic syrup meaning gratuitous syntax make programming easier
[ 361, 3169, 5983, 1345, 6882, 4302, 109, 1084, 1361, 2740, 3368, 920, 7370, 7460, 5846, 4070, 5948, 4074, 7844, 233, 1308, 7032, 4543, 5965, 2156, 6319, 4105, 5091, 1435 ]
Train
7,278
5
IBM_Advanced_Program-to-Program_Communication:ibm advanced program-to-program communication computing advanced program program communication appc protocol computer programs use communicate network appc application layer osi model enables communications programs different computers portables workstations midrange host computers appc defined vtam lu 6.2 logical unit type 6.2 appc developed 1982 component ibm systems network architecture sna several apis developed programming languages cobol pl/i c rexx appc software available many different ibm non-ibm operating systems either part operating system separate software package appc serves translator application programs network application computer passes information appc software appc translates information passes network interface lan adapter card information travels across network another computer appc software receives information network interface appc translates information back original format passes corresponding partner application appc mainly used ibm installations running operating systems z/os formerly mvs os/390 z/vm formerly vm/cms z/tpf ibm formerly os/400 os/2 aix z/vse formerly dos/vse microsoft also includes sna support microsoft host integration server major ibm software products also include support appc including cics db2 cim websphere mq unlike tcp/ip communication partners always possess clear role one always server others always client appc peer-to-peer protocol communication partners appc equal every application server client equally role number parallel sessions partners negotiated cnos sessions change number session special log mode e.g ibm 'snasvcmg transmission data made 'data sessions log modes determined detail vtam administrator e.g length data blocks coding etc.. also apparent architects appc could used provide operating system services remote computers separate architecture group formed use appc enable programs one computer transparently use data management services remote computers use appc session created used client-server fashion conversational communications manager distributed data management architecture ddm message formats protocols defined accessing managing record-oriented files stream-oriented files relational databases base architecture distributed relational database architecture drda services variety ddm drda products implemented ibm vendors increasing prevalence tcp/ip appc declined although many ibm systems translators enterprise extender rfc 2353 allow sending appc-formatted traffic ip networks appc confused similarly named appn advanced peer-to-peer networking appc manages communication programs operating application presentation layers contrast appn manages communication machines including routing operates transport network layers
[ 6025, 3209, 1554, 5396, 5932, 1435 ]
Test
7,279
7
Data_diffusion_machine:data diffusion machine data diffusion machine historical virtual shared memory architecture data free migrate machine shared memory machines convenient programming scale beyond tens processors data diffusion machine ddm overcomes problem providing virtual memory abstraction top distributed memory machine ddm appears user conventional shared memory machine implemented using distributed memory architecture data diffusion machines active research late 1980s early 1990s research ceased since
[ 1295, 8066 ]
Test
7,280
3
CPU_core_voltage:cpu core voltage cpu core voltage v power supply voltage supplied cpu digital circuit gpu device containing processing core amount power cpu uses thus amount heat dissipates product voltage current draws modern cpus cmos circuits current almost proportional clock speed cpu drawing almost current clock cycles see however subthreshold leakage order help conserve power manage heat many laptop desktop processors power management feature allows software usually operating system adjust clock speed core voltage dynamically often voltage regulator module converts 5v 12 v voltage whatever cpu core voltage required cpu trend towards lower core voltages conserve power presents cmos designer challenge cmos voltages go ground supply voltage source gate drain terminals fets supply voltage zero voltage across mosfet formula formula_1 says current formula_2 supplied fet proportional gate-source voltage reduced threshold voltage formula_3 dependent geometrical shape fet channel gate physical properties especially capacitance order reduce formula_3 necessary order reduce supply voltage increase current one must increase capacitance load driven fact another fet gate current needed drive proportional capacitance thus requires designer keep low trend towards lower supply voltage therefore works goal high clock speed improvements photolithography reduction threshold voltage allow improve another note formula shown long channel mosfets area mosfets halving every 18-24 months moore law distance two terminals mosfet switch called channel length becoming smaller smaller changes nature relationship terminal voltages current processor overclocked clock speed increased cost system stability withstand higher clocks core voltage often needs increased cost power consumption heat dissipation known overvolting overvolting generally involves running processor specifications may damage shorten cpu life dual-voltage cpu uses split-rail design allow lower voltages used processor core external input/output i/o voltages remain 3.3 volts backwards compatibility single-voltage cpu uses single power voltage throughout chip supplying i/o power internal power 2002 microprocessor market statistics cpus single-voltage cpus cpus pentium mmx single-voltage cpus dual-voltage cpus introduced performance gain increasing clock speeds finer semiconductor fabrication processes resulted excess heat generation power supply concerns especially regarding laptop computers using voltage regulator external i/o voltage levels would transformed lower voltages order reduce power usage resulting less heat produced ability operate higher frequencies vrt feature older intel p5 pentium processors typically intended use mobile environment refers splitting core voltage supply i/o voltage vrt processor 3.3 v i/o 2.9 v core voltage save power compared typical pentium processor i/o core voltage 3.3v pentium mmx later processors adopted so-called split rail power supply
[ 1592, 7442, 3803, 7280, 1162, 3063, 5571, 1237, 3942, 6170, 7666, 1284, 2263 ]
Test
7,281
1
Driver_and_Vehicle_Licensing_Agency:driver vehicle licensing agency driver vehicle licensing agency dvla organisation uk government responsible maintaining database drivers great britain database vehicles entire united kingdom counterpart drivers northern ireland driver vehicle agency dva agency issues driving licences organises collection vehicle excise duty also known road tax road fund licence sells personalised registrations dvla executive agency department transport dft current chief executive agency julie lennard dvla based swansea wales prominent 16-storey building clase offices swansea vale previously known driver vehicle licensing centre dvlc agency previously network 39 offices around great britain known local office network users could attend apply licences transact business throughout course 2013 local offices gradually closed closed december 2013 agency work consequently fully centralised swansea majority users transact remotely post transactions phone dvla introduced electronic vehicle licensing evl 2004 allowing customers pay vehicle excise duty online telephone however customers still option tax vehicles via post office seven-year contract enabling post office continue process car tax applications agreed november 2012 option three-year extension originally vehicle registration responsibility borough county councils throughout great britain system created motor car act 1903 licensing system centralised 1965 administered driver vehicle licensing centre dvlc swansea 1990 dvlc renamed driver vehicle licensing agency dvla becoming executive agency department transport civilian vehicles used germany members british forces germany families registered dvla behalf ministry defence official diplomatic consular vehicles registered dvla behalf foreign commonwealth office vehicle register held dvla used many ways example dvla identify untaxed vehicles outside agencies identify keepers cars entering central london paid congestion charge exceed speed limits road speed cameras matching cars keepers utilising dvla database current dvla vehicle register built eds £5 million contract signed 1996 planned implementation date october 1998 though actual implementation delayed year uses client–server architecture uses vehicle identification number rather registration plate primary key track vehicles eliminating possibility multiple registrations single vehicle vehicle identity check vic introduced help reduce vehicle crime intended deter criminals disguising stolen cars identity written scrapped vehicles however scheme later scrapped october 2014 insurance company writes car registration document v5 logbook surrendered destroyed insurance company notify dvla vehicle written notification set vic marker vehicle record dvla database dvla database records used commercial vehicle check companies offer comprehensive individual car check prospective purchasers however accuracy data held remains continuing problem anyone request information database purport cause need fee £2.50 database drivers developed late 1980s holds details 42 million driving licence holders uk used produce driving licences assist bodies driving standards agency police courts enforcement legislation concerning driving entitlements road safety dvla revealed december 2012 temporarily banned 294 public bodies including local councils police forces using access database correctly 2006 2012 38 bodies banned permanently period 2002 2015 estimated dvla spent £500 million information technology ibm staff dvla predominantly female whereas parts department transport predominantly male starting salaries £12,500 november 2007 public accounts committee report criticised amazingly high levels sick leave among staff dvla employees took average three weeks per year sick leave report said overall sickness leave dft seven agencies averaged 10.4 working days per full-time employee 2005 calculated costing taxpayers £24 million sick leave rates department four agencies average—at dvla dsa together employ 50 dft staff—they significantly higher committee chairman edward leigh said surprising agencies could function adequately 2008 dvla staff went one-day strike pay inequality arguing receive similar salaries employees department transport recent level sickness absence 2012/13 6.7 days 2006 120,000 130,000 vehicle registration certificates went missing bbc investigation 2010 found vehicles worth £13 million stolen using documents 18 months preceding investigation around ten cars found week forged log books police said would decades recovered 7 february 2007 letter bomb sent dvla swansea injured four people suspected part group letter bombs sent organisations deal administration motoring charges offences capita central london targeted days earlier miles cooper aged 27 school caretaker arrested 19 february 2007 charged 22 february dvla since installed x-ray machines post opening areas reduce effectiveness attacks december 2007 revealed sending surveys 1,215 drivers dvla sent confidential details wrong owners error occurred sending routine surveys discovered members public contacted dvla notify error 2009 bbc watchdog reported entitlements specifically entitlement drive motorcycle lost reissued driving licences 2005 programme highlighted drivers lost entitlements drive heavy goods vehicles similar way 2010 revealed dvla sold drivers details database certain private parking enforcement companies run individuals criminal records dvla sells details companies £2.50 found agency sold business fined weeks unfair business practices dvla uses advertising warn drivers pay road tax cars may crushed despite bill rights 1689 section 12 states 'all fines forfeitures conviction illegal void uk legal persons equality law dvla therefore stands equal private citizens court law seeking civil penalty sorn 'fine so-called dvla right sue car owners civil court practice dvla illegally usurps judicial procedure bypasses presumption innocence levies fine £40 £80 without regard extenuating circumstances illness documents lost post etc sorn scheme never debated parliament also 'daft pointless legislation motorists ... asked confirm dvla already know acknowledgment lost post might need proof 've confirmed 've confirmed already know ... dvla makes mistake claims car owners responsible clamping vehicles explicitly outlawed scotland may english law constitute common law offence 'holding property ransom according peter oborne fines levied dvla grossly disproportionate represent justice part unofficial supplementary tax-gathering system dvla handled 12,775 complaints year 2015/16 failed resolve 14.9 first contact overall complaints year 6.5 dvla 'customer service excellence standard retained details provided measured customer satisfaction levels varied 76 97 four categories surveyed vehicle registration driver licence renewal vehicle taxation driver medical transactions data provided respect complaints sorn scheme fines levied dvlc swansea regularly referred british political sitcom yes minister bernard woolley regularly threatened reassignment episode big brother jim hacker scheduled give address
[ 7281 ]
Test
7,282
4
Security_through_obscurity:security obscurity security obscurity security obscurity reliance security engineering design implementation secrecy main method providing security system component security experts rejected view far back 1851 advise obscurity never security mechanism early opponent security obscurity locksmith alfred charles hobbs 1851 demonstrated public state-of-the-art locks could picked response concerns exposing security flaws design locks could make vulnerable criminals said rogues keen profession know already much teach scant formal literature issue security obscurity books security engineering cite kerckhoffs doctrine 1883 cite anything example discussion secrecy openness nuclear command control benefits reducing likelihood accidental war considered outweigh possible benefits secrecy modern reincarnation kerckhoffs doctrine first put forward nineteenth century security system depend key design remaining obscure field legal academia peter swire written trade-off notion security obscurity illusion military notion loose lips sink ships well competition affects incentives disclose principle security obscurity generally accepted cryptographic work days essentially well-informed cryptographers employed national intelligence agencies national security agency cryptographers often work universities researchers publish many even results publicly test others designs private industry results often controlled patents copyrights secrecy argument lost former popularity example pgp whose source code publicly available anyone generally regarded military-grade cryptosystem conflicting stories origin term fans mit incompatible timesharing system say coined opposition multics users hall security far issue within culture term referred self-mockingly poor coverage documentation obscurity many commands attitude time tourist figured make trouble 'd generally got urge make felt part community one instance deliberate security obscurity noted command allow patching running system altmode altmode control-r echoed ^d typing alt alt control-d set flag would prevent patching system even user later got right security obscurity alone discouraged recommended standards bodies national institute standards technology nist united states sometimes recommends practice system security depend secrecy implementation components technique stands contrast security design open security although many real-world projects include elements strategies knowledge system built differs concealment camouflage efficacy obscurity operations security depends whether obscurity lives top good security practices used alone used independent layer obscurity considered valid security tool recent years security obscurity gained support methodology cybersecurity moving target defense cyber deception nist cyber resiliency framework 800-160 volume 2 recommends usage security obscurity complementary part resilient secure computing environment research firm forrester recommends usage environment concealment protect messages advanced persistent threats
[ 3766, 6078, 6515, 1168, 1631, 2912, 2105, 907, 6112, 753, 5765, 5773, 4814, 7300, 2791, 1987, 2616, 4834, 6062, 785, 4111 ]
Test
7,283
2
RTXC_Quadros:rtxc quadros rtxc quadros real time operating system rtos written mainly c programming language mainly intended use embedded systems rtxc rtos originally developed barrett associates 1970s currently maintained quadros systems inc. houston texas rtxc quadros comes tracing tool give insight runtime dynamics timing rtxcview
[ 1522, 1435, 4336 ]
Test
7,284
5
Text_over_IP:text ip text ip toip means providing real-time text rtt service operates ip-based networks complements voice ip voip video ip real-time text streaming text transmitted produced allowing text used conversationally real-time text defined itu-t multimedia recommendation f.700 2.1.2.1 real-time text designed conversational use people interactively converse achieve particular user requirements specified delay character character loss rate see f.700 annex a.3 real-time text ip used toip designed around itu-t t.140 real-time text presentation layer protocol defined h.32x multimedia services t.140 allows real-time editing text e.g using 'backspace retyping t.140 based iso 10646-1 character set used ip text specifications uses utf-8 format transport toip uses real-time transport protocol rtp voip video-over-ip text encoded according ietf rfc 4103 rtp payload text conversation rfc 4103 supports optional forward error correction scheme based redundant transmission using rfc 2198 results low end-to-end packet loss across ip transmission links moderately high packet loss improve efficiency text buffered 0.3 – 0.5 seconds sent whilst still meeting delay requirements rtp usually transported user datagram protocol udp however 2.5g mobile networks supported transmission control protocol tcp consistently support udp implementations toip mobile networks use tcp internally 3g mobile networks support udp protocol stack toip medium fast typing 30 characters per second results two kilobit per second traffic load including overheads rfc4103 maximum level redundancy rtp udp ip control toip sessions defined using standard session initiation protocol sip rfc 3261 session description protocol sdp rfc 4566 protocols see ietf rfc 5194 framework real-time text ip using session initiation protocol sip ietf rfc 4504 sip telephony device requirements configuration section 2.9 information next generation networking ngns concept developed telecommunication service providers suppliers aims create true multi-service network based ip technology toip specified inclusion 3gpp ip multimedia subsystem ims 3gpp ts 26.114 v2.0.0 ims multimedia telephony media handling interaction ims used implement ngns many fixed mobile networks support toip considered multimedia emergency public-safety answering point psaps europe usa ecrit ietf working group defines toip one form access emergency services toip provide 'low impact solution meeting national regulatory requirements provide 'equivalent service telephone service people hearing speech impairments typical terminal fixed line access home computer supports multimedia communications voice video real-time text ip see external links information toip equipment software telecommunications device deaf tdd ttys also called textphone minicoms designed transport real-time text pstn tdds use range modem technologies text-over-ip designed replacement tdds using ip-based networks also use mainstream voice call users less service restrictions compared tdds designed used mainstream service used standard computers mobile terminals proper alerting systems incoming calls need included well user interfaces hardware software meet needs deaf people people hearing speech impairments best achieved input end-users development stages interworking tdds toip implemented using gateways t-meeting omnitor trace r rnid center voiceriver annies rfc 5194 framework real-time text ip using session initiation protocol sip provides overview interworking issues work proposed ietf sipping work group detailed interworking based range call scenarios
[ 7637, 7170 ]
Test