node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4 values |
|---|---|---|---|---|
7,285 | 2 | Find_My_Device:find device find device application service provided google remotely trace locate android devices phones tablets watches using map find device uses map locate trace exert location android device located location available allow users remotely locate android device linked google account | [
3507,
4116,
5455,
3850,
5372,
7431,
6176,
993,
7346,
2107,
2475,
5571,
831,
5141,
136,
2317,
2673,
8107,
3309,
7924,
2591,
2683,
855,
4636,
168,
6776,
6950,
6153,
2712
] | Test |
7,286 | 4 | Internet_Watch_Foundation:internet watch foundation internet watch foundation iwf registered charity based cambridgeshire england states remit minimise availability online sexual abuse content specifically child sexual abuse images videos hosted anywhere world non-photographic child sexual abuse images hosted uk content inciting racial hatred removed iwf remit police website set purpose april 2011 iwf used also take reports criminally obscene adult content hosted uk removed iwf ’ remit 2017 part function iwf says supply partners accurate current url list enable blocking child sexual abuse content excellent responsive national hotline reporting service receiving reports public addition receiving referrals public agents also proactively search open web deep web identify child sexual abuse images videos ask service providers take websites containing images block fall outside uk jurisdiction found open web traces content hosted geographically either directly issues notice hosting company remove imagery hosted uk works network hotlines police around world follow country ’ process removing imagery 99 child sexual abuse images found iwf hosted outside uk instance whilst work remove imagery takes place iwf places web address url list partners block content 2010 office government commerce ogc required procurement specifications provision internet-related services government agencies public bodies require internet service provider isp block access sites iwf list iwf operates informal partnerships police government public internet companies across world originally formed police suspected child pornography online iwf remit later expanded cover criminally obscene material iwf takes strong stance term ‘ child pornography ’ website cites “ use term child sexual abuse reflect gravity images videos deal child pornography child porn kiddie porn acceptable descriptions child consent abuse ” iwf incorporated charity limited guarantee largely funded voluntary contributions uk communications service providers including isps mobile phone operators internet trade associations search engines hardware manufacturers software providers also currently receives funding european union comprising one third uk safer internet centre iwf governed board trustees consists independent chair six non-industry representatives three industry representatives plus one co-opted independent representative specialism human rights board monitors reviews iwf remit strategy policy budget enable iwf achieve objectives iwf operate offices vision park near cambridge criticized ineffective quango deserve charity status producing excessive numbers false positives secrecy proceedings poor technical implementations policies degraded response time whole uk internet iwf succeeded reducing child sexual abuse imagery hosted uk 18 1996 0.04 2018 1996 metropolitan police told internet service providers association ispa content carried newsgroups made available illegal considered isps involved publishers material therefore breaking law august 1996 chief inspector stephen french metropolitan police clubs vice unit sent open letter ispa requesting ban access list 132 newsgroups many deemed contain pornographic images explicit text list arranged first section consisted unambiguously titled paedophile newsgroups continued kinds groups police wanted restrict access including alt.binaries.pictures.erotica.cheerleaders alt.binaries.pictures.erotic.centerfolds although action taken place without prior debate parliament elsewhere police appeared best create simply enforce law acting entirely initiative alan travis home affairs editor newspaper guardian explained book bound gagged ian taylor conservative science industry minister time underlined explicit threat isps stop carrying newsgroups question police would act company provided users pornographic violent material taylor went make clear would calls legislation regulate aspects internet unless service providers seen wholeheartedly embrace responsible self-regulation isp demon internet regarded police request unacceptable censorship however attitude annoyed ispa chairman shez hamill said following tabloid-style exposé demon internet appeared observer newspaper alleged clive feather director demon provides paedophiles access thousands photographs children sexually abused summer autumn 1996 uk police made known planning raid isp aim launching test case regarding publication obscene material internet direct result campaign threats pressure establishment internet watch foundation initially known safety net foundation september 1996 facilitated department trade industry dti discussions held certain isps metropolitan police home office body called safety net foundation formed dawe charitable trust resulted r3 safety net agreement r3 referred triple approach rating reporting responsibility september 1996 agreement made ispa linx safety net foundation subsequently renamed internet watch foundation agreement set requirements associated isps regarding identifiability traceability internet users isps cooperate iwf identify providers illegal content facilitate easier traceability demon internet driving force behind iwf creation one employees clive feather became iwf first chair funding board solicitor mark stephens first chair iwf policy board policy board developed codes guidance operational oversight hotline reporting content funding board made industry representatives chair policy board provided wherewithal iwf day day activities set required policy board 3 years operation iwf reviewed dti home office consultants kpmg denton hall report delivered october 1999 resulted number changes made role structure organisation relaunched early 2000 endorsed government dti played facilitating role creation according dti spokesman time patricia hewitt minister e-commerce said internet watch foundation plays vital role combating criminal material net counter accusations iwf biased favour isps new independent chairman appointed roger darlington former head research communication workers union iwf website offers web-based government-endorsed method reporting suspect online content remains operation united kingdom acts relevant authority accordance memorandum understanding mou concerning section 46 sexual offences act 2003 meaning analysts prosecuted looking illegal content course duties reports submitted anonymously according iwf mou potentially illegal content hosted uk iwf work relevant service provider british police agency content ‘ taken ’ assist necessary offender responsible distributing offending content detected potentially illegal content includes however almost whole iwf site concerned suspected images child sexual abuse little mention criminally obscene material also within remit images judged iwf using uk law images child sexual abuse blocked government claimed would also handling images adult extreme pornography became illegal people uk possess 26 january 2009 longer part iwf ’ remit since 2017 iwf includes extreme pornography example criminally obscene content meaning report material hosted uk uploaded someone uk regarding blocking sites categories remit go far refer sites hosted uk appropriate authorities iwf states works partnership uk government departments home office dcms influence initiatives programmes developed combat online abuse funded european union online industry includes internet service providers mobile operators manufacturers content service providers telecommunications filtering companies search providers financial sector well blue-chip organisations support iwf corporate social responsibility reasons hotline reporting system organisation helps isps combat abuse services notice take service alerting potentially illegal content within remit systems simultaneously invites police investigate publisher iwf connections virtual global taskforce serious organised crime agency child exploitation online protection centre susie hargreaves appointed ceo september 2011 andrew puddephatt appointed chair january 2018 senior leadership team iwf comprises iwf passes notifications suspected child sexual abuse images videos inhope network hotlines across world whenever content traced inhope country inhope hotline iwf works relevant police body country previously iwf passed notifications suspected child pornography hosted non-uk servers uk national criminal intelligence service turn forwards interpol relevant foreign police authority works serious organised crime agency instead iwf however pass notifications types potentially illegal content hosted outside uk iwf compiles maintains list urls individual webpages child sexual abuse content called iwf url list previously referred child abuse image content list caic list whole website included list whole domain dedicated distribution child sexual abuse images says every url list depicts indecent images children advertisements links content publicly available website list typically contains 500 800 urls one time updated twice day ensure entries still live since iwf began proactively searching child sexual abuse imagery since introduction crawler technology list typically contains 5,000 12,000 urls every day daily ‘ churn ’ content added list removed list appropriate offending uk urls listed taken quickly urls elsewhere listed removed list applied isps 95 commercial internet customers uk according iwf website blocking applies potentially criminal urls related child sexual abuse content publicly available websites distribution images channels peer-to-peer matter police partners iwf plans extend type content included list staff 13 trained analysts responsible work iwf ’ 2018 annual report says average 376 new urls added list daily 2004 2006 bt group introduced cleanfeed technology used 80 internet service providers bt spokesman jon carter described cleanfeed function block access illegal web sites listed internet watch foundation described essentially server hosting filter checked requested urls web sites iwf list returning error message web site found positive matches 2006 home office minister alan campbell pledged isps would block access child abuse websites end 2007 middle 2006 government reported 90 domestic broadband connections either currently blocking plans end year target 100 coverage set end 2007 however middle 2008 stood 95 february 2009 government said looking ways cover final 5 interview march 2009 home office spokesperson mistakenly thought iwf deleted illegal content n't look content rate although iwf blacklist causes content censored even content found illegal court law iwf director communications sarah robertson claimed 8 december 2008 iwf opposed censorship legal content case iwf blacklisting cover art hosted wikipedia days prior claimed “ iwf found image illegal ” despite body legal jurisdiction march 2009 home office spokesperson said isps pressured sign iwf blacklist order block child pornography websites said alternative using iwf blacklist zen internet previously refused use iwf blacklist citing concerns effectiveness however quietly joined foundation september 2009 still maintaining concerns 2009 blacklist said contain 450 urls 2009 study researcher richard clayton university cambridge found quarter specific pages otherwise legitimate free file hosting services among rapidshare megaupload sendspace zshare listing pages confidential blacklist pages would cause accesses sites hosting referred iwf potentially causing unintended interference discussed 2018 iwf url list contained 100,682 unique urls r v walker sometimes called girls scream aloud obscenity trial first prosecution written material section 2 1 obscene publications act nearly two decades involved prosecution darryn walker posting story entitled girls scream aloud internet erotic story site 2008 story fictional written account describing kidnap rape murder pop group girls aloud reported iwf passed information scotland yard ’ obscene publications unit trial prosecution claimed story could easily accessed young fans girls aloud however defence demonstrated could located specifically searching material result case abandoned defendant cleared charges 5 december 2008 iwf system started blacklisting wikipedia article covering scorpions 1976 album virgin killer appeared article users major isps including bt vodafone virgin media/tesco.net be/o2 easynet/uk online/sky broadband plusnet demon talktalk opal telecom unable access filtered content although controversial album image still available internet shopping sites physical shops image reported iwf reader iwf determined could seen potentially illegal iwf estimated block affected 95 british residential users iwf since rescinded block issuing following statement additionally many uk internet users unable edit wikipedia pages unless registered logged wikipedia reported due single blacklisted article causing wikipedia traffic isps using system routed transparent proxy server wikipedia distinguishes unlogged-in users ip address interpreted unlogged-in users particular isp single user editing massively proxy address triggered wikipedia anti-abuse mechanism blocking 14 january 2009 uk users reported 85 billion pages internet archive wayback machine blocked although iwf policy block individual offending webpages whole domains according iwf chief executive peter robbins due technical hitch internet archive web site contained urls iwf blacklist requests sent demon internet carried particular header clashed internet archive internal mechanism convert web links serving archived versions web pages actual blocked url caused incident never became publicly known many isps implement iwf filtering using transparent proxy server unconnected iwf quoting plusnet ip address matches server used host one websites iwf list request diverted proxy server hosting server blacklisted problem due requesting page server also hosts listed page iwf lists internet companies voluntarily committed block access child sexual abuse web pages companies may use transparent proxies techniques using transparent proxy unintended side effect quite independent iwf filtering appearing websites connected originating proxy ip instead user real ip sites detect user ip adjust behaviour accordingly example trying download files file distribution website restricts free-of-charge usage enforcing delay typically 30 minutes downloads attempt download interpreted originating isp proxy rather user consequence user isp downloaded file site last half-hour likely large isp download allowed unintended consequence isp use proxy servers iwf filtering file sharing sites distribute files types example linux distribution files large use proxy servers also reported caused problem editing wikipedia blocking actual offending web page reported iwf filtering criticised interfering legitimate internet activity ineffective anyone intending access objectionable content one carefully argued discussion opposing things child pornography terrorism points filtering side effects discussed section would stop access material images child sexual abuse would stop email ftp https p2p usenet irc many ways access content simple encryption systems never stop best drives underground harder assess track february 2009 yorkshire-based software developer lodged formal complaint regarding iwf status charity charity commission pointed regulating worst internet really charitable purpose iwf existed mainly serve interests isps subscribing rather public iwf spokesperson said iwf attained charitable status 2004 order subject robust governance requirements higher levels scrutiny accountability charity law alongside company law brings iwf listed fakecharities.org directory so-called charities receive substantial funding either uk eu governments also termed quango critics implying poor management lack accountability iwf publishes details inspections audits website includes hotline audit every two years independent experts quality assurance inspections inhope hotline umbrella body iso27001 compliance human rights audit organisation carried lord ken macdonald 2014 following iwf blacklisting wikipedia article organisation operating habits came scrutiny j.r. raphael pc world stated incident raised serious free-speech issues alarming one non-governmental organisation ultimately acting morality police 95 uk internet users frank fisher guardian criticized iwf secretiveness lack legal authority among things noted blacklist could contain anything visitor blocked address may know browsing censored government believes self-regulatory system best solution metropolitan police also believe working isps rather trying force via legislation way forward iwf list urls considered host objectionable material distinct actual confidential blacklist pages available isps isps obliged subscribe self-appointed self-regulated internet watchdog views user-submitted content compiles list websites deems contain illegal images questions raised regarding legality viewing content would normally constitute criminal offence iwf memorandum understanding crown prosecution service association chief police officers – npcc “ clarify position professionally involved management operation use electronic communications networks services may face jeopardy criminal offences reassured protection acting combat creation distribution images child abuse ” iwf criticized blacklisting legal content telling websites blocked circumstances owner blocked webpage might even know offending content site means content would still readily available anyone outside uk internet companies deploy services across world implement iwf url list help prevent people stumbling across child sexual abuse imagery blocking methodology implemented company taking list iwf ’ good practice blocking guide recommends companies use splash page people know page blocked view rather simply delivering “ page found ” message lord ken macdonald carried human rights audit addressing iwf ’ members agm 26 november 2013 lord macdonald said “ deeply impressed ” quality staff “ commitment attention freedom expression privacy rights ” historically blacklisting sites may concealed generic http 404 page found message rather explanation content censored exact method censorship determined implementing isp bt example return http 404 pages whereas demon return message stating page censored time wikipedia blocking performance issues accessing site uk reported october 2014 users sky broadband reported slow intermittent performance image host imgur clicking image would typically result site appearing accessing via https causes images load normally bypasses proxy used sites blacklisted content aside iwf url list iwf developed many services may taken internet companies help stop spread child sexual abuse imagery online | [
2086,
6769,
4196,
7363,
578
] | Test |
7,287 | 4 | Sony_BMG_copy_protection_rootkit_scandal:sony bmg copy protection rootkit scandal scandal erupted 2005 regarding sony bmg implementation deceptive illegal harmful copy protection measures 22 million cds inserted computer cds installed one two pieces software provided form digital rights management drm modifying operating system interfere cd copying neither program could easily uninstalled created vulnerabilities exploited unrelated malware sony claims unintentional one programs installed even user refused end-user license agreement eula would still phone home reports user private listening habits mentioned eula contained code several pieces copylefted free software apparent infringement copyright configured operating system hide software existence leading programs classified rootkits sony bmg initially denied rootkits harmful released one programs uninstaller un-hid program installed additional software could easily removed collected email address user introduced security vulnerabilities following public outcry government investigations class-action lawsuits 2005 2006 sony bmg partially addressed scandal consumer settlements recall 10 affected cds suspension cd copy protection efforts early 2007 august 2000 statements sony pictures entertainment us senior vp steve heckler foreshadowed events late 2005 heckler told attendees americas conference information systems industry take whatever steps needs protect protect revenue streams ... lose revenue stream matter ... sony going take aggressive steps stop develop technology transcends individual user firewall napster source – block cable company block phone company block isp firewall pc ... strategies aggressively pursued simply much stake europe bmg created minor scandal 2001 released natalie imbruglia second album white lilies island without warning labels stating cd copy protection cds eventually replaced bmg sony released copy-protected versions certain releases certain markets late 2001 late 2002 report indicated bmg cds sold europe would form copy protection two pieces copy-protection software issue 2005–2007 scandal included 22 million cds marketed sony bmg record company formed 2004 merger sony bmg recorded music divisions two million cds spanning 52 titles contained first 4 internet f4i extended copy protection xcp installed microsoft windows systems user accepted eula made mention software remaining 20 million cds spanning 50 titles contained sunncomm mediamax cd-3 installed either microsoft windows mac os x systems user presented eula regardless whether user accepted however mac os x prompted user confirmation software attempted modify os whereas computers running windows scandal erupted october 31 2005 winternals later acquired microsoft corporation researcher mark russinovich posted blog detailed description technical analysis f4i xcp software ascertained recently installed computer sony bmg music cd russinovich compared software rootkit due surreptitious installation efforts hide existence noted eula mention software asserted emphatically software illegitimate digital rights management gone far anti-virus firm f-secure concurred although software n't directly malicious used rootkit hiding techniques exactly used malicious software hide drm software cause many similar false alarms av software detect rootkits ... thus inappropriate commercial software use techniques public pressure symantec anti-virus vendors included detection rootkit products well microsoft announced would include detection removal capabilities security patches russinovich discovered numerous problems xcp soon russinovich first post several trojans worms exploiting xcp security holes people even used vulnerabilities cheat online games sony bmg quickly released software remove rootkit component xcp affected microsoft windows computers russinovich analyzed utility reported blog exacerbated security problems raised concerns privacy russinovich noted removal program merely unmasked hidden files installed rootkit actually remove rootkit also reported installed additional software could uninstalled order download uninstaller found necessary provide e-mail address sony bmg privacy policy implied added various bulk e-mail lists install activex control containing backdoor methods marked safe scripting thus prone exploits november 18 2005 sony bmg provided new improved removal tool remove rootkit component xcp affected microsoft windows computers november 15 2005 vnunet.com announced sony bmg backing copy-protection software recalling unsold cds stores offering consumers exchange cds versions lacking software electronic frontier foundation compiled partial list cds xcp sony bmg quoted maintaining security risks associated anti-piracy technology despite numerous virus malware reports november 16 2005 us-cert part united states department homeland security issued advisory xcp drm said xcp uses rootkit technology hide certain files computer user technique security threat computer users also said one uninstallation options provided sony bmg introduces vulnerabilities system us-cert advised install software sources expect contain software audio cd sony bmg announced instructed retailers remove unsold music discs containing software shelves estimated internet security expert dan kaminsky xcp use 500,000 networks cds xcp technology identified letters xcp printed back cover jewel case cd according sonybmg xcp faq november 18 2005 reuters reported sony bmg would exchange affected insecure cds new unprotected disks well unprotected mp3 files information swap found sony bmg swap program website part swap program consumers mail xcp-protected cds sony bmg sent unprotected disc via return mail november 29 new york attorney general eliot spitzer found investigators despite recall november 15 sony bmg cds xcp still sale new york city music retail outlets spitzer said unacceptable three weeks serious vulnerability revealed cds still shelves busiest shopping days year strongly urge retailers heed warnings issued products pull distribution immediately ship back sony next day massachusetts attorney general tom reilly issued statement saying sony bmg cds xcp still available boston despite sony bmg recall november 15 attorney general reilly advised consumers purchase sony bmg cds xcp said conducting investigation sony bmg may 11 2006 sony bmg website offered consumers link class action settlement information regarding xcp mediamax content protection online claim filing links software updates/uninstallers deadline submitting claim june 30 2007 april 2 2008 sony bmg website finally offered consumers explanation list affected cds november 21 2005 texas attorney general greg abbott sued sony bmg texas first state united states bring legal action sony bmg response rootkit suit also first filed state ’ 2005 spyware law alleged company surreptitiously installed spyware millions compact music discs cds consumers inserted computers play cds compromise systems december 21 2005 abbott added new allegations lawsuit sony-bmg regarding mediamax new allegations claimed mediamax violated state spyware deceptive trade practices laws mediamax software would installed computer even user declined license agreement would authorize installation abbott stated keep discovering additional methods sony used deceive texas consumers thought simply buying music thousands texans potential victims deceptive game sony played consumers purposes addition violations consumer protection computer spyware act 2005 allowed civil penalties 100,000 violation law alleged violations added updated lawsuit december 21 2005 carried maximum penalties 20,000 per violation sony lost battle abbott pay 750,000 legal fees texas accept customer returns affected cds place conspicuous detailed notice homepage make keyword buys alert consumers advertising google yahoo msn pay 150 per damaged computer much sony bmg also agree would make claim legal settlement way constitutes approval court class action suits filed sony bmg new york california december 30 2005 new york times reported sony bmg reached tentative settlement lawsuits proposing two ways compensating consumers purchased affected recordings according proposed settlement purchased xcp cd paid 7.50 per purchased recording given opportunity download free album able download three additional albums limited list recordings give cash incentive district judge naomi reice buchwald entered order tentatively approving settlement january 6 2006 settlement designed compensate whose computers infected otherwise damaged damages addressed class action able opt settlement pursue litigation fairness hearing held may 22 2006 9:15 daniel patrick moynihan united states courthouse southern district new york claims submitted december 31 2006 class members wished excluded settlement must filed may 1 2006 remained settlement could attend fairness hearing expense speak behalf represented attorney italy alcei association similar eff also reported rootkit financial police asking investigation various computer crime allegations along technical analysis rootkit us department justice doj made comment whether would take criminal action sony however stewart baker department homeland security publicly admonished sony stating intellectual property—it computer november 21 eff announced also pursuing lawsuit xcp sunncomm mediamax drm technology eff lawsuit also involves issues concerning sony bmg end user license agreement reported december 24 2005 then-florida attorney general charlie crist investigating sony bmg spyware january 30 2007 u.s. federal trade commission ftc announced settlement sony bmg charges cd copy protection violated federal law—section 5 federal trade commission act 15 usc 45 —by engaging unfair deceptive business practices settlement requires sony bmg reimburse consumers 150 repair damage resulted directly attempts remove software installed without consent settlement also requires provide clear prominent disclosure packaging future cds limits copying restrictions use playback devices ban company installing content protection software without obtaining consumers ’ authorization ftc chairwoman deborah platt majoras added installations secret software create security risks intrusive unlawful consumers computers belong companies must adequately disclose unexpected limitations customer use products consumers make informed decisions regarding whether purchase install content researchers found sony bmg makers xcp also apparently infringed copyright failing adhere licensing requirements various pieces free open-source software whose code used program including lame mp3 encoder mpglib faac id3lib mpg123 vlc media player january 2006 developers lame posted open letter stating expected appropriate action sony bmg developers plans investigate take action apparent violation lame source code license russinovich report discussed popular blogs almost immediately following release npr one first major news outlets report scandal november 4 2005 thomas hesse sony bmg global digital business president told reporter neda ulaby people think n't even know rootkit care november 7 2005 article vnunet.com summarised russinovich findings urged consumers avoid buying sony bmg music cds time following day boston globe classified software spyware computer associates etrust security management unit vp steve curry confirmed communicates personal information consumers computers sony bmg namely cd played user ip address methods used software avoid detection likened used data thieves november 8 2005 computer associates decided classify sony bmg software spyware provide tools removal speaking sony bmg suspending use xcp independent researcher mark russinovich said step taken immediately first virus made use sony bmg stealth technology make malicious files invisible user anti-virus programs surfaced november 10 2005 one day later yahoo news announced sony bmg suspended distribution controversial technology according zdnet news latest risk uninstaller program distributed sunncomm technologies company provides copy protection sony bmg releases uninstall program obeys commands sent allowing others take control pcs uninstaller used december 6 2005 sony bmg said 5.7 million cds spanning 27 titles shipped mediamax 5 software company announced availability new software patch prevent potential security breach consumers computers sony bmg australia released press release indicating sony bmg titles manufactured australia copy protection | [
1620,
4759,
716,
2733,
6991,
5401,
6823,
6644,
2491,
587,
2241,
6135,
2891
] | Test |
7,288 | 3 | Wizardry_II:_The_Knight_of_Diamonds:wizardry ii knight diamonds wizardry ii knight diamonds originally known wizardry knight diamonds second scenario second game wizardry series role-playing video games published 1982 sir-tech game begins city llylgamyn siege llylgamyn rulers killed city hope recovery staff gnilda obtainable trading mystic knight diamonds armor legendary knight diamonds fend invaders game functions virtually identically first scenario player guiding party six adventurers 6 level dungeon original version required players import characters first game whilst later versions include pregenerated party ability create new characters game intended played successfully completed first game difficulty level intended characters least level 13 training area means lower level characters go baptism fire mechanical differences include ability save game dungeon rather forcing characters exit dungeon return training grounds spells increasing power noted message dungeon unlike first scenario half levels purpose plot-wise could skipped player wished exploration levels knight diamonds necessary complete game six levels piece knight armor somewhere level pieces must collected order finish game furthermore unlike first scenario elevators used skip levels teleportation spells fail party attempts use teleport level yet reached via stairs softline 1982 praised knight diamonds variety monsters liked level dungeon quests magazine concluded one wonder amazing duo greenberg woodhead next scenario computer gaming world 1991 1993 called wizardry ii disappointingly weak follow-up criticizing small size noting first game necessary play magazine concluded best hard-core fan philip l. wing reviewed knight diamonds space gamer 76 wing commented recommend scenario interesting challenging adventure higher-level wizardry characters knight diamonds named best adventure game home computer 1982 origins game fair defeating ultima ii among nominees also received certificate merit category 1984 best computer adventure 5th annual arkie awards | [
6578,
3199,
6380
] | Test |
7,289 | 2 | List_of_router_firmware_projects:list router firmware projects list software created maintained people manufacturer product extent support testing particular hardware varies project project notable custom-firmware projects wireless routers many run various brands linksys asus netgear etc software distributions routers 5 gb storage 1 gb ram | [
1249,
3165,
1522,
2001,
4759,
806,
1261,
994,
3185,
4492,
4138,
385,
7536,
4951,
2746,
5571,
6107,
6278,
578,
3637,
8100,
6456,
3551,
1291,
7189,
7275,
7744,
4162,
6918,
3559,
3394,
6560,
4977,
7752,
7478,
3223,
4177,
4091,
2790,
6235,
... | Test |
7,290 | 8 | Semantic_Web:semantic web semantic web extension world wide web standards world wide web consortium w3c standards promote common data formats exchange protocols web fundamentally resource description framework rdf according w3c semantic web provides common framework allows data shared reused across application enterprise community boundaries semantic web therefore regarded integrator across different content information applications systems term coined tim berners-lee web data data web processed machines—that one much meaning machine-readable critics questioned feasibility proponents argue applications library information science industry biology human sciences research already proven validity original concept berners-lee originally expressed vision semantic web follows 2001 scientific american article berners-lee hendler lassila described expected evolution existing web semantic web 2006 berners-lee colleagues stated simple idea…remains largely unrealized 2013 four million web domains contained semantic web markup following example text 'paul schuster born dresden website annotated connecting person place birth following html-fragment shows small graph described rdfa-syntax using schema.org vocabulary wikidata id div vocab= http //schema.org/ typeof= person /div example defines following five triples shown turtle syntax triple represents one edge resulting graph first element triple subject name node edge starts second element predicate type edge last third element object either name node edge ends literal value e.g text number etc. triples result graph shown given figure one advantages using uniform resource identifiers uris dereferenced using http protocol according so-called linked open data principles dereferenced uri result document offers data given uri example uris edges nodes e.g nowiki http //schema.org/person /nowiki nowiki http //schema.org/birthplace /nowiki nowiki http //www.wikidata.org/entity/q1731 /nowiki dereferenced result rdf graphs describing uri e.g dresden city germany person sense uri fictional second graph shows previous example enriched triples documents result dereferencing nowiki http //schema.org/person /nowiki green edge nowiki http //www.wikidata.org/entity/q1731 /nowiki blue edges additionally edges given involved documents explicitly edges automatically inferred triple original rdfa fragment triple document nowiki http //schema.org/person /nowiki green edge figure allow infer following triple given owl semantics red dashed line second figure concept semantic network model formed early 1960s researchers cognitive scientist allan m. collins linguist m. ross quillian psychologist elizabeth f. loftus form represent semantically structured knowledge applied context modern internet extends network hyperlinked human-readable web pages inserting machine-readable metadata pages related enables automated agents access web intelligently perform tasks behalf users term semantic web coined tim berners-lee inventor world wide web director world wide web consortium w3c oversees development proposed semantic web standards defines semantic web web data processed directly indirectly machines many technologies proposed w3c already existed positioned w3c umbrella used various contexts particularly dealing information encompasses limited defined domain sharing data common necessity scientific research data exchange among businesses addition technologies similar goals emerged microformats many files typical computer also loosely divided human-readable documents machine-readable data documents like mail messages reports brochures read humans data calendars addressbooks playlists spreadsheets presented using application program lets viewed searched combined currently world wide web based mainly documents written hypertext markup language html markup convention used coding body text interspersed multimedia objects images interactive forms metadata tags provide method computers categorize content web pages examples field names keywords description author assigned values computing cheap widgets sale john doe metadata tagging categorization computer systems want access share data easily identify relevant values html tool render perhaps web browser software perhaps another user agent one create present page lists items sale html catalog page make simple document-level assertions document title 'widget superstore capability within html assert unambiguously example item number x586172 acme gizmo retail price €199 consumer product rather html say span text x586172 something positioned near acme gizmo €199 etc way say catalog even establish acme gizmo kind title €199 price also way express pieces information bound together describing discrete item distinct items perhaps listed page semantic html refers traditional html practice markup following intention rather specifying layout details directly example use denoting emphasis rather specifies italics layout details left browser combination cascading style sheets practice falls short specifying semantics objects items sale prices microformats extend html syntax create machine-readable semantic markup objects including people organisations events products similar initiatives include rdfa microdata schema.org semantic web takes solution involves publishing languages specifically designed data resource description framework rdf web ontology language owl extensible markup language xml html describes documents links rdf owl xml contrast describe arbitrary things people meetings airplane parts technologies combined order provide descriptions supplement replace content web documents thus content may manifest descriptive data stored web-accessible databases markup within documents particularly extensible html xhtml interspersed xml often purely xml layout rendering cues stored separately machine-readable descriptions enable content managers add meaning content i.e. describe structure knowledge content way machine process knowledge instead text using processes similar human deductive reasoning inference thereby obtaining meaningful results helping computers perform automated information gathering research example tag would used non-semantic web page encoding similar information semantic web page might look like tim berners-lee calls resulting network linked data giant global graph contrast html-based world wide web berners-lee posits past document sharing future data sharing answer question provides three points instruction one url point data two anyone accessing url get data back three relationships data point additional urls data tim berners-lee described semantic web component web 3.0 semantic web sometimes used synonym web 3.0 though definition term varies web 3.0 started emerge movement away centralisation services like search social media chat applications dependent single organisation function guardian journalist john harris reviewed concept favorably early2019 particular work bernerslee project called 'solid based around personal data stores 'pods individuals retain control bernerslee formed startup inrupt advance idea attract volunteer developers challenges semantic web include vastness vagueness uncertainty inconsistency deceit automated reasoning systems deal issues order deliver promise semantic web list challenges illustrative rather exhaustive focuses challenges unifying logic proof layers semantic web world wide web consortium w3c incubator group uncertainty reasoning world wide web urw3-xg final report lumps problems together single heading uncertainty many techniques mentioned require extensions web ontology language owl example annotate conditional probabilities area active research standardization semantic web context web 3.0 care w3c term semantic web often used specifically refer formats technologies enable collection structuring recovery linked data enabled technologies provide formal description concepts terms relationships within given knowledge domain technologies specified w3c standards include semantic web stack illustrates architecture semantic web functions relationships components summarized follows well-established standards yet fully realized intent enhance usability usefulness web interconnected resources creating semantic web services services could useful public search engines could used knowledge management within organization business applications include corporation closed group users management able enforce company guidelines like adoption specific ontologies use semantic annotation compared public semantic web lesser requirements scalability information circulating within company trusted general privacy less issue outside handling customer data critics question basic feasibility complete even partial fulfillment semantic web pointing difficulties setting lack general-purpose usefulness prevents required effort invested 2003 paper marshall shipman point cognitive overhead inherent formalizing knowledge compared authoring traditional web hypertext according marshall shipman tacit changing nature much knowledge adds knowledge engineering problem limits semantic web applicability specific domains issue point domain- organisation-specific ways express knowledge must solved community agreement rather technical means turns specialized communities organizations intra-company projects tended adopt semantic web technologies greater peripheral less-specialized communities practical constraints toward adoption appeared less challenging domain scope limited general public world-wide web finally marshall shipman see pragmatic problems idea knowledge navigator-style intelligent agents working largely manually curated semantic web cory doctorow critique metacrap perspective human behavior personal preferences example people may include spurious metadata web pages attempt mislead semantic web engines naively assume metadata veracity phenomenon well-known metatags fooled altavista ranking algorithm elevating ranking certain web pages google indexing engine specifically looks attempts manipulation peter gärdenfors timo honkela point logic-based semantic web technologies cover fraction relevant phenomena related semantics enthusiasm semantic web could tempered concerns regarding censorship privacy instance text-analyzing techniques easily bypassed using words metaphors instance using images place words advanced implementation semantic web would make much easier governments control viewing creation online information information would much easier automated content-blocking machine understand addition issue also raised use foaf files geolocation meta-data would little anonymity associated authorship articles things personal blog concerns addressed policy aware web project active research development topic another criticism semantic web would much time-consuming create publish content would need two formats one piece data one human viewing one machines however many web applications development addressing issue creating machine-readable format upon publishing data request machine data development microformats one reaction kind criticism another argument defense feasibility semantic web likely falling price human intelligence tasks digital labor markets amazon mechanical turk specifications erdf rdfa allow arbitrary rdf data embedded html pages grddl gleaning resource descriptions dialects language mechanism allows existing material including microformats automatically interpreted rdf publishers need use single format html first research group explicitly focusing corporate semantic web acacia team inria-sophia-antipolis founded 2002 results work include rdf based corese search engine application semantic web technology realm e-learning since 2008 corporate semantic web research group located free university berlin focuses building blocks corporate semantic search corporate semantic collaboration corporate ontology engineering ontology engineering research includes question involve non-expert users creating ontologies semantically annotated content extracting explicit knowledge interaction users within enterprises tim o'reilly coined term web 2.0 proposed long-term vision semantic web web data sophisticated applications manipulate data web data web transforms web distributed file system distributed database system | [
4288,
2087,
3935,
8161,
6080,
4760,
3263,
8065,
6975,
375,
808,
8174,
1927,
1269,
6430,
7649,
2405,
3383,
2312,
7372,
5939,
3723,
6462,
1024,
1209,
5008,
6122,
7389,
2054,
6931,
4724,
175,
6221,
1592,
2603,
2695,
5778,
4635,
6144,
3330,
... | Test |
7,291 | 1 | EXist:exist exist-db exist short open source software project nosql databases built xml technology classified nosql document-oriented database system native xml database provides support xml json html binary documents unlike relational database management systems rdbms nosql databases exist-db provides xquery xslt query application programming languages exist-db released version 2.1 gnu lgpl exist-db created 2000 wolfgang meier major versions released 1.0 september 2006 2.0 february 2013 3.0 february 2017 4.0 february 2018 5.0.0-rc1 june 2018. exist-db awarded best xml database year infoworld 2006 company called exist solutions gmbh germany promotes software.. o'reilly book exist-db co-authored adam retter erik siegel exist-db allows software developers persist xml/json/binary documents without writing extensive middleware exist-db follows extends many w3c xml standards xquery exist-db also supports rest interfaces interfacing ajax-type web forms applications xforms may save data using lines code webdav interface exist-db allows users drag drop xml files directly exist-db database exist-db automatically indexes documents using keyword indexing system exist-db support following standards technologies | [
5571,
2054,
4743,
1609,
87
] | Validation |
7,292 | 7 | Introhive:introhive introhive customer relationship management crm automation relationship intelligence platform designed help companies drive user adoption crm increase sales business development efficiency introhive platform works connect contact account data email systems crm improve team productivity data accuracy completeness information crm introhive established fredericton new brunswick canada offices chicago miami london u.k. chennai india headquartered washington d.c.. introhive founded january 2012 fredericton jody glidden stewart walchli entrepreneurs previously founded content delivery application company chalk media sold research motion 2009 introhive raised substantial venture funding first year canadian us-based investors early 2013 three former executives salesforce.com joined leadership team today introhive numbers 120+ staff across company 6 global offices introhive developed cloud-based software platform utilizes relationships organization ’ employees customers colleagues friends – including social media email electronic calendars contacts introhive platform assesses well person knows someone else assigning relationship score contact designed particularly large organisations hard quantify mine existing connections among employees platform core enterprise relationship management erm solution integrates crm business systems provide sales force automation relationship intelligence crm relationship analytics solutions platform built sales marketing organisations looking increase user adoption crm increase data quality decrease manual data entry crm increase insights business relationships platform provides organizations holistic view knows across company employees customer relationships data gathered crm distributed users platform via pre-meeting digests include company news meeting attendee profiles meeting notes crm information marketing automation information relationship intelligence stock quotes platform designed create enterprise relationship graph enable introhive refers 'warm introductions rather relying sales marketing cold calls | [
2961,
330,
7037
] | Test |
7,293 | 0 | Margaret_Masterman:margaret masterman margaret masterman 4 may 1910 – 1 april 1986 british linguist philosopher known pioneering work field computational linguistics especially machine translation founded cambridge language research unit margaret masterman born london 4 may 1910 charles f. g. masterman politician lucy blanche lyttelton politician poet writer 1932 married richard bevan braithwaite philosopher son daughter margaret masterman one six students wittgenstein course 1933–34 whose notes compiled blue book 1955 founded directed cambridge language research unit clru grew informal discussion group major research centre computational linguistics time student newnham college cambridge read modern languages moral sciences philosophy called cambridge language research unit founded small beautiful building called adie museum housed far eastern art small buddhist sculptures built walls carved doors period twenty years starting 1953 source significant research machine translation computational linguistics quantum physics even though outside official university structures cambridge funded grants us agencies afosr onr nsf uk government agencies osti later eu funds luxembourg computing facilities primitive—an ancient icl 1202 computer -- -and serious computation done either cambridge university machine mathematical laboratory—or clru visitors sites us one measure impact staff never exceeded ten people annual lifetime achievement awards association computational linguistics us three awarded clru alumni martin kay karen spärck jones yorick wilks margaret masterman ahead time twenty years many beliefs proposals language processing computer become part common stock ideas artificial intelligence ai machine translation mt fields never able lay adequate claim unacceptable published written later students independently “ discovered ” others trace back especially fields little nothing ten years old ever reread core beliefs language processing must reflect coherence language redundancy signal idea partial inheritance old “ information theoretic ” view language meant processes analysing language must take account repetitive redundant structures writer goes saying thing different ways writer ambiguities removed signal sometimes led overemphasise real explicit redundancy would find rhythmical repetitive verse claim implausibly normal english like could see right led later years key role assigned rhythm stress breathgroupings boundaries impose text processes understanding put crudely claim languages way least part produced creatures breathe fairly regular intervals obvious claims could even entertained chomsky views preeminent language studies however could never give systematic surface criteria breathgroups stress patterns identified surface cues could reduced criteria syntax morphology would become involved actual physics voice patterns views importance semantics language processing continued defend high years chomskyan syntax 1951 1966 much influenced r. h. richens views classification description means language semantic primitives syntax along associated claims semantic pattern matching onto surface text developed actual programs might assumed straightforward believer existence semantic primitives katzian schankian sense nothing could truth far much wittgensteinian sceptic ability limited sublanguage logic take role whole language always argued semantic primitives would make sense empirical criteria discovery theory allowed fact would develop exactly polysemy higher natural language always emphasised functional role primitives example resolving sense ambiguity interlingua mt hoped escape problem origin semantic primitives would lie either empirical classification procedures operating actual texts way speak deriving primitives massive connectionist learning adequate formal theory structure thesauri believed make explicit certain underlying structures semantic relations natural language theory “ primitives ” would emerge naturally organizing classification thesauri years colleagues explored lattice theory underlying formal structure thesauri two concerns went intellectual life owe much period michael halliday university lecturer chinese cambridge colleague c.l.r.u got idea syntactic theory fundamentally semantic pragmatic either categories fundamental definition terms role syntax organizing principle semantic information first ai researcher influenced halliday long terry winograd became preoccupied considerable period nature function chinese ideograms felt clarified empirical way problems wittgenstein wrestled so-called picture-theory-of-truth led exaggerate generality ideogrammatic principles seem hold english really rather like chinese seen correctly meaning atoms highly ambiguous virtually uninflected view found little sympathy dominant linguistic computational currents time main creation 1953 one endured twenty years cambridge language research unit grew informal discussion group heterogeneous membership interested language philosophical computational points view subsequently attempt build language processing programs sound philosophical basis distinctive feature unit work approach language processing specific form took use thesaurus main vehicle semantic operations probably come seen unit major contributions field whole margaret primarily responsible vision language processing possibilities remarkable time computers rudimentary indeed much c.l.r.u work done predecessors computers namely hollerith punched card machines equally margaret determination establishing maintaining unit enormous effort fund raising involved striking fact could continue decades periods public support work hard come tribute margaret persistence charm difficult us days artificial intelligence ordinary market place powerful personal computers realise hard get financial resources needed language-processing research technical resources actual experiments perhaps best comment margaret initiative embarking language processing research specifically machine translation work comes somewhat unexpected source machine translation initial period high hopes large claims cast outer darkness 1966 funding agencies saw little return money reviewing twenty five years artificial intelligence research presidential address american association artificial intelligence 1985 woody bledsoe one long-standing leaders field though areas quite outside language said attempted machine translation fifties sixties may failed right try learned much attempts something difficult c.l.r.u trying far ahead time efforts made tackle fundamental problems computers day capacity modern digital wrist watch despite every kind problem unit produced numerous publications language related subjects including information retrieval automatic classification ten years unit presence strongly felt field always emphasis basic semantic problems language understanding margaret time felt needed syntactic parsing complete parsing necessary anything else semantics language regarded basic part understanding machine ideas c.l.r.u seem curiously modern margaret main contribution life clru continual intellectual stimulus gave research larger natural language processing community wide ranging concerns lateral ideas led example propose thesaurus means carrying many distinct language processing tasks like indexing translation margaret emphasis algorithms testing vital development clru work language processing ideas notable especially worked intellectual qualities sheer joyousness serious research stopped clru 1978 margaret tried restart clru 1980 william williams hope new breed micro-computers could used develop algorithms natural language translation margaret walked 7 miles millington road cambridge orwell purchased two north star horizon computers intelligent artefacts see st robotics installed forth programming language written david sands used various students university cambridge programmed margaret algorithms computers margaret approach natural language translation time split sentence breath group segments since breath group unique meaning could translated target language target sentence reconstructed using translated breath groups contrasted predominant language translation techniques time notably systran used dictionary rule based system still used today margaret died 1986 william williams closed clru unique library early mt documents dumped skip even though two university bodies offered give home one cofounders lucy cavendish college first vice-president 1965–1975 great-niece lucy cavendish college named also founder major inspiration epiphany philosophers group shared membership clru dedicated study relationship science religion forms religious practice 1965 margaret masterman read work nature paradigm fourth international colloquium philosophy science london conducted detailed textual criticism thomas s. kuhn book structure scientific revolutions 1962 characterizing book scientifically perspicuous philosophically obscure masterman praised kuhn one outstanding philosophers science time concept paradigms fundamental idea new one philosophy science criticised thomas kuhn vague inconsistent use concept paradigm noting used least 21 different senses summarized three groups metaparadigms sociological paradigms artefact construct paradigms masterman proposed kuhn critics philosophy science dealt metaparadigms explored insights implications various conceptions criticism accepted thomas kuhn crucial shift concept paradigm incommensurability | [
1314,
5388,
2184,
2595,
5008
] | Validation |
7,294 | 4 | Nitol_botnet:nitol botnet nitol botnet mostly involved spreading malware distributed denial-of-service attacks nitol botnet first discovered around december 2012 analysis botnet indicating botnet mostly prevalent china estimate 85 infections detected china botnet found present systems came brand-new factory indicating trojan installed somewhere assembly manufacturing process according microsoft systems risk also contained counterfeit installation microsoft windows 10 september 2012 microsoft took action nitol botnet obtaining court order subsequently sinkholing 3322.org domain 3322.org domain dynamic dns used botnet creators command control infrastructure controlling botnet microsoft later settled 3322.org operator pen yong allowed latter continue operating domain condition subdomains linked malware remain sinkholed | [
2173,
2632,
4759,
2376,
1632,
6715,
7441,
3281,
651,
7186,
2577,
5401,
6740,
6370,
5675,
7657,
51,
2693,
2789,
1691,
7307,
3154,
7600,
2535,
4110,
6328
] | Test |
7,295 | 2 | CDC_SCOPE:cdc scope scope acronym supervisory control program execution name used control data corporation number operating system projects 1960s operating system based original chippewa operating system early 1970s renamed nos/be cdc cyber machines scope operating system file-oriented system using mass storage random access devices designed make use capabilities cdc 6000 computer systems exploits fully multiple-operating modes segments computer main tasks scope controlling job execution storage assignment performing segment overlay loading features include comprehensive input/output functions library maintenance routines dayfile chronologically records jobs run problems encountered aid debugging dumps memory maps available control scope variety assemblers compass compilers algol fortran cobol utility programs sort/merge pert/time export/import respond simscript apt optima etc may operated computer emulation community made repeated attempts recover preserve software running cdc cyber 6000 series emulator screenshot scope 3.1 building scope written programming team sunnyvale california 2,000 miles cdc hardware division considered buggy inefficient piece software though much different many operating systems era cdc arden hills minnesota laboratories referred scope sunnyvale collection programming errors competing operating system mace mansfield cahlander executive greg mansfield dave cahlander authors system started engineering test executive eventually developed complete operating system — modularized rewrite enhancement original chippewa operating system cos never official cdc product copy freely given customer asked one many customers especially advanced ones like university research sites control data decided write next operating system kronos considered current scope system unofficial mace alternative chose abandon scope system base kronos mace software eventually kronos replaced new network operating system nos though many smaller cdc customers continued use scope system rather kronos nos became primary control data operating system customers running mainly batch operations reluctant switch nos system saw benefit shop scope system maintained renamed nos/be batch environment primarily cdc marketing could say mainframe customers using nos operating system | [
4566,
1522,
5571,
4670,
2803,
13
] | Validation |
7,296 | 9 | Nuprl:nuprl nuprl proof development system providing computer-mediated analysis proofs formal mathematical statements tools software verification optimization originally developed 1980s robert lee constable others system maintained prl project cornell university currently supported version nuprl 5 also known fdl formal digital library nuprl functions automated theorem proving system also used provide proof assistance nuprl uses type system based martin-löf intuitionistic type theory model mathematical statements digital library mathematical theories constructed analyzed variety editors including graphical user interface web-based editor emacs mode variety evaluators inference engines operate statements library translators also allow statements manipulated java ocaml programs overall system controlled variant ml nuprl 5 architecture described distributed open architecture intended primarily used web service rather standalone software interested using web service migrating theories older versions nuprl contact email address given nuprl system web page nuprl first released 1984 first described detail book implementing mathematics nuprl proof development system published 1986 nuprl 2 first unix version nuprl 3 provided machine proof mathematical problems related girard paradox higman lemma nuprl 4 first version developed world wide web used verify cache coherency protocols computer systems current system architecture implemented nuprl 5 first proposed 2000 conference paper reference manual nuprl 5 published 2002 nuprl subject many computer science publications recent 2014 jonprl redprl systems also based computational type theory redprl explicitly inspired nuprl | [
6986,
4482,
84,
5164,
4359
] | Test |
7,297 | 5 | Multicast_Listener_Discovery:multicast listener discovery multicast listener discovery mld component internet protocol version 6 ipv6 suite mld used ipv6 routers discovering multicast listeners directly attached link much like internet group management protocol igmp used ipv4 protocol embedded icmpv6 instead using separate protocol mldv1 similar igmpv2 mldv2 similar igmpv3 protocol described rfc 3810 updated rfc 4604 several operating system support mldv2 | [
7148,
979,
456,
6879,
2281,
3946,
6521,
6976,
3775,
3447,
3855,
2644,
7170,
7070,
6531,
1462,
2650,
7637,
2119,
6908,
7091,
3383,
2219,
3640,
3797,
4710,
500,
2043,
5850,
3312,
4435,
4622,
2057,
3819,
3820,
3821,
7214,
7217,
7765,
259,
... | Test |
7,298 | 9 | Chez_Scheme:chez scheme chez scheme programming language dialect implementation language scheme type lisp uses incremental native-code compiler produce native binary files x86 ia-32 x86-64 powerpc sparc processor architectures supported r6rs standard since version 7.9.1 free open-source software released apache license version 2.0 first released 1985 r. kent dybvig originally licensed proprietary software released open-source software github version 9.4 petite chez scheme sibling implementation uses threaded interpreter design instead chez scheme incremental native-code compiler programs written chez scheme run unchanged petite chez scheme long depend using compiler example foreign function interface available compiler petite chez scheme freely distributable may used royalty fees subject license agreement one series benchmarks chez scheme among fastest available scheme implementations sun sparc processor architecture petite chez scheme among slowest implementations common x86 pentium 32-bit processor architecture chez scheme windowing system computer graphics package called scheme widget library supported portable slib library | [
7878,
1445,
5019,
1820,
6796,
6087,
2915,
5734,
1478,
2218,
4704,
5757,
6116,
1116,
6471,
7573,
2600,
5077,
1885,
1889,
6507,
795,
6876,
6888,
1557,
5494,
5501,
6210,
144,
4074,
4085,
5515,
8025,
3749,
6949,
5883,
1989,
6955,
4837,
1616,
... | Test |
7,299 | 9 | Interface_description_language:interface description language interface description language interface definition language idl specification language used describe software component application programming interface api idls describe interface language-independent way enabling communication software components share one language example written c++ written java idls commonly used remote procedure call software cases machines either end link may using different operating systems computer languages idls offer bridge two different systems software systems based idls include sun onc rpc open group distributed computing environment ibm system object model object management group corba implements omg idl idl based dce/rpc data distribution service mozilla xpcom microsoft microsoft rpc evolved com dcom facebook thrift wsdl web services | [
5631,
6080,
8163,
4587,
4938,
5288,
7805,
4136,
5650,
6986,
977,
5299,
6989,
7896,
304,
5571,
5583,
3646,
328,
3820,
4905,
2797,
4017,
6686,
2715
] | Validation |
7,300 | 4 | Session_fixation:session fixation computer network security session fixation attacks attempt exploit vulnerability system allows one person fixate find set another person session identifier session fixation attacks web based rely session identifiers accepted urls query string post data alice account bank codice_1 mallory intends target alice money bank alice reasonable level trust mallory visit links mallory sends straightforward scenario misconception server accepts server-generated session identifiers safe fixation false scenario like cross-site cookie except rely browser vulnerabilities rather relies fact wildcard cookies set one subdomain affect subdomains scenario attack scenarios result mallory successfully gained access functions data normally reserved alice alternative attack scenario require alice log site rather simply fixing session mallory may able spy alice abuse data enters example mallory may use attacks give alice authenticated session—so alice start using site authentication mallory alice decides purchase something site enters credit card details mallory might able retrieve data confidential data looking historical data stored account type session fixation exploitation differs classic exploitation scenarios since happens unauthenticated part application reverses authentication attacker logging victim session identifiers url query string get variables post variables recommended simplify attack – easy make links forms set get post variables note cookies shared tabs popped browser windows system requires hit domain www.example.com/ code=site1 www.example.com/ code=site2 cookies may conflict one another tabs may required send session identifier url order overcome limitation possible use site1.example.com site2.example.com domain conflicts cookies may incur costs extra ssl certificates behavior seen many sites opening another tab trying side side search results one sessions become unusable attack largely avoided changing session id users log every request specific user requires user authenticated logged site attacker would need know id victim log-in session victim visits link fixed session id however need log account order anything important point session id change attacker able anything important anonymous session id similar technique used solve phishing problem user protects account two passwords solved great extent technique also useful cross-site request forgery attacks session identifier modern systems stored default http cookie moderate level security long session system disregards get/post values however solution vulnerable cross-site request forgery meet statelessness requirement rest enabling https security systems allow applications obtain ssl tls session identifier use ssl/tls session identifier secure many web development languages provide robust built-in functionality ssl/tls session identifiers may suitable critical applications large financial sites due size systems issue however rarely debated even security forums countermeasure session fixation generate new session identifier sid request done even though attacker may trick user accepting known sid sid invalid attacker attempts re-use sid implementation system simple demonstrated following example mallory successfully tricks alice visiting codice_24 http request sent codice_25 codice_25 accepts codice_27 would normally bad however codice_25 secure performs session regeneration codice_25 gets following response alice use codice_30 unknown mallory codice_27 invalid mallory thus unsuccessful session fixation attempt unfortunately session regeneration always possible problems known occur third-party software activex java applets used browser plugins communicate server third-party software could cause logouts session could split two separate sessions implementation sessions includes transmitting sid get post variables might also render back button browsers unusable user would using older invalid session identifier previous request one way improve security accept session identifiers generated server however noted prevent session fixation attacks isset _session 'server_generated_sid session_regenerate_id // generate new session identifier _session 'server_generated_sid true logout function useful allows users indicate session allow requests thus attacks effective session active note following code performs cross-site request forgery checks potentially allowing attacker force users log web application logout defense simple implement advantage providing measure protection unauthorized users accessing authorized user account using machine may left unattended store session variable containing time stamp last access made sid sid used compare current timestamp one stored session difference greater predefined number say 5 minutes destroy session otherwise update session variable current timestamp visiting page browsers set referrer – page contained link followed get page user logged site likely linked outside site e.g. banking websites webmail site kind site users would remain logged great length time referrer site referrer considered suspicious however originating request https page referrer stripped depend security system example codice_8 could employ following security check strpos _server 'http_referer 'http //vulnerable.example.com/ == 0 session_regenerate_id // generate new session identifier one way improve security ensure user appears end user client makes bit harder perform session fixation attacks networks begin conform rfc 3704 anti-spoofing practices ip address becomes reliable source identifier therefore security web site improved verifying source ip address consistent throughout session could performed manner _server 'remote_addr _session 'prev_remoteaddr session_regenerate_id // generate new session identifier _session 'prev_remoteaddr _server 'remote_addr however points consider employing approach sites added security outweighs lack convenience others browsers identify user-agent http headers header normally change use would extremely suspicious happen web application might make use user-agent detection attempt prevent malicious users stealing sessions however trivial bypass attacker easily capture victim user-agent site spoof attack proposed security system relying security obscurity _server 'http_user_agent _session 'prev_useragent session_regenerate_id // generate new session identifier _session 'prev_useragent _server 'http_user_agent however points consider employing approach user agent may change legally cases following examples users defense depth combine several countermeasures idea simple one obstacle trivial overcome several obstacles could hard overcome defense depth strategy could involve http referrers passed ssl/tls https following php script demonstrates several countermeasures combined defense depth manner isset _get 'logout || session_regenerate_id // generate new session identifier _session 'prev_useragent _server 'http_user_agent _session 'prev_remoteaddr _server 'remote_addr note code checks current remote_addr user ip address user-agent remote_addr user-agent previous request might inconvenient sites discussed | [
321,
2944,
7282,
7390,
57,
7139,
5115
] | Validation |
7,301 | 4 | ITSEC:itsec information technology security evaluation criteria itsec structured set criteria evaluating computer security within products systems itsec first published may 1990 france germany netherlands united kingdom based existing work respective countries following extensive international review version 1.2 subsequently published june 1991 commission european communities operational use within evaluation certification schemes since launch itsec 1990 number european countries agreed recognize validity itsec evaluations itsec largely replaced common criteria provides similarly-defined evaluation levels implements target evaluation concept security target document product system evaluated called target evaluation subjected detailed examination security features culminating comprehensive informed functional penetration testing degree examination depends upon level confidence desired target provide different levels confidence itsec defines evaluation levels denoted e0 e6 higher evaluation levels involve extensive examination testing target unlike earlier criteria notably tcsec developed us defense establishment itsec require evaluated targets contain specific technical features order achieve particular assurance level example itsec target might provide authentication integrity features without providing confidentiality availability given target security features documented security target document whose contents evaluated approved target evaluated itsec evaluation based exclusively verifying security features identified security target formal z notation used prove security properties mondex smart card electronic cash system allowing achieve itsec level e6 highest granted security-level classification | [
2879,
3932,
6208
] | Validation |
7,302 | 3 | Socket_370:socket 370 socket 370 also known pga370 socket cpu socket first used intel pentium iii celeron processors first complement later replace older slot 1 cpu interface personal computers 370 refers number pin holes socket cpu pins socket 370 replaced socket 423 2000 socket 370 started budget oriented platform 66 mhz fsb ppga mendocino celeron cpus late 1998 move on-die l2 cache removed need pcb design seen slot 1 late 1999 late 2000 intel main desktop socket 100/133 mhz fsb coppermine pentium iiis 2001 tualatin pentium iii processors brought changes infrastructure required dedicated tualatin-compatible motherboards manufacturers would indicate blue instead white socket late sockets typically compatible coppermine processors older mendocino celerons motherboards used socket 370 support intel processors dual cpu configurations others allowed use socket 370 slot 1 cpu although time via-cyrix cyrix iii later renamed via c3 also used socket 370 weight socket 370 cpu cooler exceed 180 grams 6.3 ounces heavier coolers may result damage die system properly handled intel socket 370 processors pentium iii celeron following mechanical maximum load limits exceeded heat sink assembly shipping conditions standard use load limits crack processor die make unusable intel socket 370 processors integrated heat sink pentium iii celeron 1.13–1.4 ghz following mechanical maximum load limits exceeded heatsink assembly shipping conditions standard use load limits crack processor die make unusable | [
2541,
4123,
3849,
2997,
1729,
2828,
6173,
7974,
2830,
3002,
4314,
5379,
2744,
1841,
3193,
1645,
2751,
3203,
5404,
4968,
1759,
3385,
4972,
5853,
2685,
6935,
8021,
5963,
866,
3333,
7134,
262,
2351,
6683,
5886
] | Test |
7,303 | 1 | Database_model:database model database model type data model determines logical structure database fundamentally determines manner data stored organized manipulated popular example database model relational model uses table-based format common logical data models databases include object-relational database combines two related structures physical data models include models include given database management system may provide one models optimal structure depends natural organization application data application requirements include transaction rate speed reliability maintainability scalability cost database management systems built around one particular data model although possible products offer support one model various physical data models implement given logical model database software offer user level control tuning physical implementation since choices made significant effect performance model way structuring data also defines set operations performed data relational model example defines operations select project join although operations may explicit particular query language provide foundation query language built flat table model consists single two-dimensional array data elements members given column assumed similar values members row assumed related one another instance columns name password might used part system security database row would specific password associated individual user columns table often type associated defining character data date time information integers floating point numbers tabular format precursor relational model models popular 1960s 1970s nowadays found primarily old legacy systems characterized primarily navigational strong connections logical physical representations deficiencies data independence hierarchical model data organized tree-like structure implying single parent record sort field keeps sibling records particular order hierarchical structures widely used early mainframe database management systems information management system ims ibm describe structure xml documents structure allows one one-to-many relationship two types data structure efficient describe many relationships real world recipes table contents ordering paragraphs/verses nested sorted information hierarchy used physical order records storage record access done navigating downward data structure using pointers combined sequential accessing hierarchical structure inefficient certain database operations full path opposed upward link sort field also included record limitations compensated later ims versions additional logical hierarchies imposed base physical hierarchy network model expands upon hierarchical structure allowing many-to-many relationships tree-like structure allows multiple parents popular replaced relational model defined codasyl specification network model organizes data using two fundamental concepts called records sets records contain fields may organized hierarchically programming language cobol sets confused mathematical sets define one-to-many relationships records one owner many members record may owner number sets member number sets set consists circular linked lists one record type set owner parent appears circle second record type subordinate child may appear multiple times circle way hierarchy may established two record types e.g. type owner b time another set may defined b owner thus sets comprise general directed graph ownership defines direction network construct access records either sequential usually record type navigation circular linked lists network model able represent redundancy data efficiently hierarchical model one path ancestor node descendant operations network model navigational style program maintains current position navigates one record another following relationships record participates records also located supplying key values although essential feature model network databases generally implement set relationships means pointers directly address location record disk gives excellent retrieval performance expense operations database loading reorganization popular dbms products utilized cincom systems total cullinet idms idms gained considerable customer base 1980s adopted relational model sql addition original tools languages object databases invented 1990s use navigational concept provide fast navigation across networks objects generally using object identifiers smart pointers related objects objectivity/db instance implements named one-to-one one-to-many many-to-one many-to-many named relationships cross databases many object databases also support sql combining strengths models inverted file inverted index contents data used keys lookup table values table pointers location instance given content item also logical structure contemporary database indexes might use contents particular columns lookup table inverted file data model put indexes set files next existing flat database files order efficiently directly access needed records files notable using data model adabas dbms software ag introduced 1970 adabas gained considerable customer base exists supported today 1980s adopted relational model sql addition original tools languages document-oriented database clusterpoint uses inverted indexing model provide fast full-text search xml json data objects example relational model introduced e.f. codd 1970 way make database management systems independent particular application mathematical model defined terms predicate logic set theory implementations used mainframe midrange microcomputer systems products generally referred relational databases fact implement model approximation mathematical model defined codd three key terms used extensively relational database models relations attributes domains relation table columns rows named columns relation called attributes domain set values attributes allowed take basic data structure relational model table information particular entity say employee represented rows also called tuples columns thus relation relational database refers various tables database relation set tuples columns enumerate various attributes entity employee name address phone number example row actual instance entity specific employee represented relation result tuple employee table represents various attributes single employee relations thus tables relational database adhere basic rules qualify relations first ordering columns immaterial table second ca n't identical tuples rows table third tuple contain single value attributes relational database contains multiple tables similar one flat database model one strengths relational model principle value occurring two different records belonging table different tables implies relationship among two records yet order enforce explicit integrity constraints relationships records tables also defined explicitly identifying non-identifying parent-child relationships characterized assigning cardinality 1:1 0 1 tables also designated single attribute set attributes act key used uniquely identify tuple table key used uniquely identify row table called primary key keys commonly used join combine data two tables example employee table may contain column named location contains value matches key location table keys also critical creation indexes facilitate fast retrieval data large tables column key multiple columns grouped together compound key necessary define keys advance column used key even originally intended one key external real-world meaning person name book isbn car serial number sometimes called natural key natural key suitable think many people named brown arbitrary surrogate key assigned giving employees id numbers practice databases generated natural keys generated keys used internally create links rows break natural keys used less reliably searches integration databases example records two independently developed databases could matched social security number except social security numbers incorrect missing changed common query language used relational model structured query language sql dimensional model specialized adaptation relational model used represent data data warehouses way data easily summarized using online analytical processing olap queries dimensional model database schema consists single large table facts described using dimensions measures dimension provides context fact participated happened type used queries group related facts together dimensions tend discrete often hierarchical example location might include building state country measure quantity describing fact revenue important measures meaningfully aggregated—for example revenue different locations added together olap query dimensions chosen facts grouped aggregated together create summary dimensional model often implemented top relational model using star schema consisting one highly normalized table containing facts surrounding denormalized tables containing dimension alternative physical implementation called snowflake schema normalizes multi-level hierarchies within dimension multiple tables data warehouse contain multiple dimensional schemas share dimension tables allowing used together coming standard set dimensions important part dimensional modeling high performance made dimensional model popular database structure olap products offering general data model relational model sometimes classified post-relational alternate terms include hybrid database object-enhanced rdbms others data model products incorporates relations constrained e.f. codd information principle requires extensions relational model integrate concepts technologies pre-date relational model example allow representation directed graph trees nodes german company sones implements concept graphdb post-relational products extend relational systems non-relational features others arrived much place adding relational features pre-relational systems paradoxically allows products historically pre-relational pick mumps make plausible claim post-relational resource space model rsm non-relational data model based multi-dimensional classification graph databases allow even general structure network database node may connected node multivalue databases lumpy data store exactly way relational databases also permit level depth relational model approximate using sub-tables nearly identical way xml expresses data given field/attribute multiple right answers time multivalue thought compressed form xml example invoice either multivalue relational data could seen invoice header table one entry per invoice b invoice detail table one entry per line item multivalue model option storing data table embedded table represent detail invoice table one entry per invoice tables needed advantage atomicity invoice conceptual invoice data representation one-to-one also results fewer reads less referential integrity issues dramatic decrease hardware needed support given transaction volume 1990s object-oriented programming paradigm applied database technology creating new database model known object databases aims avoid object-relational impedance mismatch overhead converting information representation database example rows tables representation application program typically objects even type system used particular application defined directly database allowing database enforce data integrity invariants object databases also introduce key ideas object programming encapsulation polymorphism world databases variety ways tried storing objects database products approached problem application programming end making objects manipulated program persistent typically requires addition kind query language since conventional programming languages ability find objects based information content others attacked problem database end defining object-oriented data model database defining database programming language allows full programming capabilities well traditional query facilities object databases suffered lack standardization although standards defined odmg never implemented well enough ensure interoperability products nevertheless object databases used successfully many applications usually specialized applications engineering databases molecular biology databases rather mainstream commercial data processing however object database ideas picked relational vendors influenced extensions made products indeed sql language alternative translating objects relational databases use object-relational mapping orm library | [
3928,
1449,
3951,
6430,
6098,
736,
2937,
7915,
6462,
1861,
6128,
7205,
5419,
7933,
5424,
7937,
5778,
7213,
6144,
1891,
6855,
1902,
784,
2265,
1905,
6507,
7248,
3005,
3011,
4054,
6543,
2663,
7999,
4798,
6932,
4439,
517,
1600,
4457,
4463,
... | Test |
7,304 | 2 | F6_disk:f6 disk f6 disk colloquial name floppy disk containing microsoft windows nt device driver scsi raid system f6 disks used nt-based versions windows including windows 2000 windows server 2003 windows xp starting windows vista floppy f6 disks obsolete setup process supports loading third-party drivers usb drives cd-roms f6 disk named manner used installation process windows setup program must load device drivers disk system windows installed unless disk system established market finalization particular windows release installed drivers included windows installation discs must loaded means f6 disk f6 disk loaded windows setup pressing f6 key immediately windows setup starts message press f6 need install third party scsi raid driver ... briefly flashed screen every time windows setup starts f6 disk contains device drivers root directory prior windows vista f6 disks always floppy disks point f6 prompt shown windows setup loaded drivers media type floppy disks support usb drives cd-roms added windows vista device drivers raid disk controllers often provided cd-roms manufacturers must copied f6 disk used windows setup alternative approach slipstream required sata/scsi/sas/raid/eide drivers windows installation files directory e.g i386 x86 variety means software like nlite create iso image burned cd dvd media | [
6256,
2885,
6952
] | Test |
7,305 | 9 | DMS_Software_Reengineering_Toolkit:dms software reengineering toolkit dms software reengineering toolkit proprietary set program transformation tools available automating custom source program analysis modification translation generation software systems arbitrary mixtures source languages large scale software systems dms used implement wide variety practical tools include domain-specific languages code generation factory control test coverage profiling tools clone detection language migration tools c++ component reengineering. research difficult topics refactoring c++ reliably toolkit provides means defining language grammars produce parsers automatically construct abstract syntax trees asts prettyprinters convert original modified asts back compilable source text parse trees capture prettyprinters regenerate complete detail original source program including source position comments radix format numbers etc. ensure regenerated source text recognizable programmer original text modulo applied transformations many program analysis transformation tools limited ascii western european character sets iso-8859 dms handle well utf-8 utf-16 ebcdic shift-jis variety microsoft character encodings dms uses glr parsing technology enabling handle practical context-free grammars semantic predicates extend capability interesting non-context-free grammars fortran requires matching multiple loops shared continue statements label glr semantic predicates enables dms fortran parser produce asts correctly nested loops parses dms provides attribute grammar evaluators computing custom analyses asts metrics including special support symbol table construction program facts extracted built-in control- data- flow analysis engines local global pointer analysis whole-program call graph extraction symbolic range analysis abstract interpretation changes asts accomplished procedural methods coded parlanse source-to-source tree transformations coded rewrite rules using surface-syntax conditioned extracted program facts using dms rule specification language rsl rewrite rule engine supporting rsl handles associative commutative rules rewrite rule c replace complex condition codice_1 operator written rewrite rules names e.g simplify_conditional_assignment rule match replace pattern pair separated example separate lines readability patterns must correspond language syntax categories case patterns must syntax category statement also separated sympathy patterns target language e.g. c surface syntax coded inside meta-quotes separate rewrite-rule syntax target language backslashes inside meta-quotes represent domain escapes indicate pattern meta variables e.g. \v \e1 \e2 match language construct corresponding metavariable declaration signature line e.g. e1 must syntactic category expression metavariable mentioned multiple times match pattern must match identical subtrees identically shaped v must occur assignments match pattern example metavariables replace pattern replaced corresponding matches left side conditional clause provides additional condition must met rule apply e.g. matched metavariable v arbitrary left-hand side must side effect e.g. form i++ no_side_effects predicate defined analyzer built dms mechanisms achieving complex transformation code accomplished providing number rules cooperate achieve desired effect ruleset focused portions program metaprograms coded parlanse complete example language definition source-to-source transformation rules defined applied shown using high school algebra bit calculus domain-specific language dms variety predefined language front ends covering real dialects c c++ including c++0x c java python php egl fortran cobol visual basic verilog vhdl 20 languages predefined languages enable customizers immediately focus reengineering task rather details languages processed dms additionally unusual implemented parallel programming language parlanse uses symmetric multiprocessors available commodity workstations enables dms provide faster answers large system analyses conversions dms originally motivated theory maintaining designs software called design maintenance systems dms design maintenance system registered trademarks semantic designs | [
2387,
646,
2659,
1011,
6359,
7375,
6029,
1662,
5326,
7036,
5965,
2438,
3499,
7777,
2803,
1435
] | Test |
7,306 | 6 | Comparison_of_disc_image_software:comparison disc image software article comparison notable software applications access manipulate disk image files compares disk image handling features article compares two features supported file formats capabilities software treat image format | [
6256,
1534,
6885,
4398,
8070,
5571,
2657,
5660,
578,
5753,
405,
5158,
5069,
6940,
7584,
3152,
7046,
619
] | Train |
7,307 | 4 | Metulji_botnet:metulji botnet metulji botnet discovered june 2011 botnet mainly involved cyberscamming denial service attacks botnet dismantled consisted 12 million individual zombie computers infected butterfly bot making june 2011 largest known botnet known type computers vulnerable tell computer part botnet | [
704,
2173,
3932,
2912,
376,
3277,
2923,
3281,
7186,
2577,
5401,
2587,
51,
3323,
5779,
7600,
4025,
1528,
2632,
2991,
1173,
6526,
6904,
6541,
6194,
7657,
2678,
3038,
7294,
3047,
6569,
2693,
862,
6589,
5187,
4110,
1996,
7328,
2376,
1632,
2... | Test |
7,308 | 2 | Xcode:xcode xcode integrated development environment ide macos containing suite software development tools developed apple developing software macos ios ipados watchos tvos first released 2003 latest stable release version 10.3 available via mac app store free charge macos mojave users registered developers download preview releases prior versions suite apple developer website xcode supports source code programming languages c c++ objective-c objective-c++ java applescript python ruby resedit rez swift variety programming models including limited cocoa carbon java third parties added support gnu pascal free pascal ada c perl d. xcode build fat binary files containing code multiple architectures mach-o executable format called universal binary files allow software run powerpc intel-based x86 platforms include 32-bit 64-bit code architectures using ios sdk xcode also used compile debug applications ios run arm architecture processors xcode includes gui tool instruments runs atop dynamic tracing framework dtrace created sun microsystems released part opensolaris main application suite integrated development environment ide also named xcode xcode suite includes apple developer documentation built-in interface builder application used construct graphical user interfaces xcode 4.1 xcode suite included modified version gnu compiler collection xcode 3.1 xcode 4.6.3 included llvm-gcc compiler front ends gnu compiler collection code generator based llvm xcode 3.2 later included clang c/c++/objective-c compiler newly-written front ends code generator based llvm clang static analyzer starting xcode 4.2 clang compiler became default compiler starting xcode 5.0 clang compiler provided xcode 4.6.3 xcode suite used gnu debugger gdb back-end ide debugger starting xcode 4.3 lldb debugger also provided starting xcode 4.5 lldb replaced gdb default back-end ide debugger starting xcode 5.0 gdb longer supplied formerly xcode supported distributing product build process multiple systems one technology involved named shared workgroup build used bonjour protocol automatically discover systems providing compiler services modified version free software product distcc facilitate distribution workloads earlier versions xcode provided system named dedicated network builds features absent supported versions xcode xcode also includes apple webobjects tools frameworks building java web applications web services formerly sold separate product xcode 3.0 apple dropped webobjects development inside xcode wolips used instead xcode 3 still includes webobjects frameworks xcode 1.0 released fall 2003 xcode 1.0 based project builder updated user interface ui zerolink fix continue distributed build support code sense indexing next significant release xcode 1.5 better code completion improved debugger xcode 2.0 released mac os x v10.4 tiger included quartz composer visual programming language better code sense indexing java ant support also included apple reference library tool allows searching reading online documentation apple website documentation installed local computer xcode 2.1 could create universal binary files supported shared precompiled headers unit testing targets conditional breakpoints watchpoints also better dependency analysis final version xcode mac os x v10.4 2.5 xcode 3.0 released mac os x v10.5 leopard notable changes since 2.1 include dtrace debugging tool named instruments refactoring support context-sensitive documentation objective-c 2.0 garbage collection also supports project snapshots provide basic form version control message bubbles show build errors debug values alongside code building four-architecture fat binaries 32 64-bit intel powerpc xcode 3.1 update release developer tools mac os x version included iphone sdk could target non-mac os x platforms including iphone os 2.0 included gcc 4.2 llvm gcc 4.2 compilers another new feature since xcode 3.0 xcode scm support includes subversion 1.5 xcode 3.2 released mac os x v10.6 snow leopard installs earlier version os x supports static program analysis among features also drops official support targeting versions earlier iphone os 3.0 still possible target older versions simulator supports iphone os 2.0 3.1 also java support exiled 3.2 organizer xcode 3.2.6 last version downloaded free users mac os x v10.6 downloading requires free registration apple developer site june 2010 apple worldwide developers conference version 4 xcode announced developer tools state union address version 4 developer tools consolidates xcode editing tools interface builder one application among enhancements apple released final version xcode 4.0 march 9 2011 software made available free registered members 99 per year mac developer program 99 per year ios developer program also sold 4.99 non-members mac app store longer available xcode 4.0 drops support many older systems including powerpc development software development kits sdks mac os x 10.4 10.5 ios sdks older 4.3 deployment target still set produce binaries older platforms mac os platforms one limited creating x86 x86-64 binaries later xcode free general public version 4.1 xcode cost 4.99 xcode 4.1 made available free july 20 2011 day mac os x lion release users mac os x lion mac app store august 29 2011 xcode 4.1 made available mac os x snow leopard members paid mac ios developer programs xcode 4.1 last version include gnu compiler collection gcc instead llvm gcc clang october 12 2011 xcode 4.2 released concurrently release ios 5.0 included many improved features storyboarding automatic reference counting arc xcode 4.2 last version support mac os x 10.6 snow leopard available registered developers paid accounts without paid account 3.2.6 latest download appears snow leopard xcode 4.3 released february 16 2012 distributed one application bundle xcode.app installed mac app store xcode 4.3 reorganizes xcode menu include development tools xcode 4.3.1 released march 7 2012 add support ios 5.1 xcode 4.3.2 released march 22 2012 enhancements ios simulator suggested move lldb debugger versus gdb debugger appear undocumented changes xcode 4.3.3 released may 2012 featured updated sdk mac os x 10.7.4 lion bug fixes xcode 4.4 released july 25 2012 runs mac os x lion 10.7 os x mountain lion 10.8 first version xcode contain os x 10.8 mountain lion sdk xcode 4.4 includes support automatic synthesizing declared properties new objective-c features literal syntax subscripting improved localization august 7 2012 xcode 4.4.1 released bug fixes september 19 2012 ios 6 xcode 4.5 released xcode added support ios 6 4-inch retina display iphone 5 ipod touch 5th generation also brought new objective-c features ios simplified localization added auto-layout support ios october 3 2012 xcode 4.5.1 released bug fixes stability improvements less month later xcode 4.5.2 released support ipad mini ipad retina display bug fixes stability improvements january 28 2013 ios 6.1 xcode 4.6 released june 2013 apple worldwide developers conference version 5 xcode announced september 18 2013 xcode 5.0 released added support ios 7 sdk always support os x 10.8 mountain lion sdk support os x 10.9 mavericks sdk latest included betas version also added version clang generating 64-bit arm code ios 7 apple removed support building garbage collected cocoa binaries xcode 5.1 june 2 2014 worldwide developers conference apple announced version 6 xcode one notable features support swift all-new programming language developed apple xcode 6 also included features like playgrounds live debugging tools september 17 2014 time ios xcode 6 released xcode could downloaded mac app store june 8 2015 apple worldwide developers conference xcode version 7 announced introduced support swift 2 metal os x added support deploying ios devices without apple developer license xcode 7 released september 16 2015 june 13 2016 apple worldwide developers conference xcode version 8 announced introduced support swift 3 xcode 8 released september 13 2016 june 5 2017 apple worldwide developers conference xcode version 9 announced introduced support swift 4 metal 2 also introduced remotely debugging ios tvos devices wirelessly wifi xcode 9 publicly released september 19 2017 june 4 2018 apple worldwide developers conference xcode version 10 announced beta version released day xcode 10 introduced support dark mode announced macos mojave collaboration platforms bitbucket gitlab addition github training machine learning models playgrounds new features swift 4.2 metal 2.1 well improvements editor project build system xcode 10 also dropped support building 32-bit macos apps longer supports subversion integration xcode 10 publicly released september 17 2018 june 3 2019 apple worldwide developers conference xcode version 11 announced beta version released day xcode 11 introduced support new features swift 5.1 well new swiftui framework although interactive ui tools available running macos 10.15 also supports building ipad applications run macos includes integrated support swift package manager contains improvements editor including minimap gives overview source code file quick navigation xcode 11 requires macos 10.14.4 later | [
4296,
379,
6428,
3955,
2202,
4320,
405,
1123,
1502,
2609,
5786,
5787,
4012,
4376,
5091,
5450,
7601,
1154,
1155,
6513,
7259,
120,
2300,
1191,
5137,
7274,
4070,
149,
2327,
163,
3412,
8037,
8043,
1616,
6067,
552,
7335,
896,
566,
3107,
5571... | Test |
7,309 | 4 | Norton_System_Insight:norton system insight norton system insight part performance monitoring system found norton 2010–2012 lines monitors displays information downloaded files installed applications scans detected security risks also shows number performance alerts addition represents cpu memory usage 30 days graphical way easier understanding provides links norton insight startup manager optimize button defragments system drive system insight launched click performance link | [
7597,
5856
] | Test |
7,310 | 2 | Simple_DirectMedia_Layer:simple directmedia layer simple directmedia layer sdl cross-platform software development library designed provide hardware abstraction layer computer multimedia hardware components software developers use write high-performance computer games multimedia applications run many operating systems android ios linux macos windows sdl manages video audio input devices cd-rom threads shared object loading networking timers 3d graphics handle opengl vulkan direct3d context common misconception sdl game engine true however library suited building games directly usable indirectly engines built top library internally written c possibly depending target platform c++ objective-c provides application programming interface c bindings languages available free open-source software subject requirements zlib license since version 2.0 prior versions subject gnu lesser general public license zlib license sdl 2.0 freely available static linking closed-source projects unlike sdl 1.2 sdl extensively used industry large small projects 700 games 180 applications 120 demos posted library website sam lantinga created library first releasing early 1998 working loki software got idea porting windows application macintosh used sdl port doom beos see doom source ports several free libraries developed work alongside sdl smpeg openal also founded galaxy gameworks 2008 help commercially support sdl although company plans currently hold due time constraints soon putting galaxy gameworks hold lantinga announced sdl 1.3 would later become sdl 2.0 would licensed zlib license lantinga announced sdl 2.0 14 july 2012 time announcing joining valve corporation first version announced day joined company lantinga announced stable release sdl 2.0.0 13 august 2013 sdl 2.0 major update sdl 1.2 codebase different backwards-compatible api replaces several parts 1.2 api general support multiple input output options feature additions include multiple window support hardware-accelerated 2d graphics better unicode support support mir wayland added sdl 2.0.2 enabled default sdl 2.0.4 version 2.0.4 also provided better support android sdl wrapper around operating-system-specific functions game needs access purpose sdl provide common framework accessing functions multiple operating systems cross-platform sdl provides support 2d pixel operations sound file access event handling timing threading often used complement opengl setting graphical output providing mouse keyboard input since opengl comprises rendering game using simple directmedia layer automatically run every operating system adaptations must applied reduced minimum since sdl also contains abstraction apis frequent functions offered operating system syntax sdl function-based operations done sdl done passing parameters subroutines functions special structures also used store specific information sdl needs handle sdl functions categorized several different subsystems sdl divided several subsystems besides basic low-level support also separate official libraries provide functions comprise standard library provided official website included official documentation non-standard libraries also exist example sdl_collide sourceforge created amir taaki sdl 2.0 library language bindings way sdl designed much source code split separate modules operating system make calls underlying system sdl compiled appropriate modules selected target system following back-ends available sdl 1.2 support risc os dropped 2.0 unofficial sixel back-end available sdl 1.2 rockbox mp3 player firmware also distributes version sdl 1.2 used run games quake years sdl used many commercial non-commercial video game projects instance mobygames listed 120 games using sdl 2013 sdl website listed around 700 games 2012 important commercial examples angry birds unreal tournament ones open-source domain openttd battle wesnoth freeciv cross-platform game releases popular humble indie bundles linux mac android often sdl based sdl also often used later ports new platforms legacy code instance pc game homeworld ported pandora handheld jagged alliance 2 android via sdl also several non video game software uses sdl examples emulators dosbox visualboyadvance several books written development sdl see readings sdl used university courses teaching multimedia computer science instance workshop game programming using libsdl university cadiz 2010 game design discipline utfpr ponta grossa campus 2015 | [
1154,
6692,
5897,
95,
4759,
1445,
2639,
3355,
4017,
993,
7438,
6984,
2470,
2740,
7075,
6352,
3368,
1936,
1840,
304,
6009,
5571,
5662,
578,
1284,
7912,
4705,
1659,
930,
6116,
3212,
5948,
5321,
1965,
5506,
3398,
7573,
1128,
340,
2787,
340... | Test |
7,311 | 3 | Mac_NC:mac nc mac nc sometimes referred macintosh nc network thin client expected released apple april 1998 device widely promoted then-apple director larry ellison apparently part oracle network computer initiative mac nc ultimately never released although key components technology inherited original imac released august 1998 may 21 1996 oracle corporation along 30 hardware software vendors announced intent build computers designed around network computer platform idea design technology based profile included diskless computers commonly coded applications using languages java interface internet using common software netscape navigator may 1996 apple became partner network computing effort used apple pippin platform implementation july 9 1997 gil amelio ousted ceo apple board directors steve jobs stepped interim ceo begin critical restructuring company product line would eventually become ceo served position august 2011 oracle corporation ceo apple board member larry ellison announced december 1997 talking harvard computer society apple would release product called macintosh nc april 1998 suggested network computer would near-300 mhz processor 17-inch screen would sell less us 1,000 hard disk drive available extra costing additional 100 steve jobs agree stating unfortunately ellison pretty far base e-mail maybe trying deflect interest really oracle ellison overseen development business alliance produced number network computer-branded devices companies sun ibm apple never manufactured devices oracle alliance endorse network computer reference profile steve jobs already stopped macintosh clone efforts would shut apple pippin concept prospects mac nc ultimately technology shipped netboot release mac os x server 1.0 january 1999 | [
6788,
7890,
5732,
722,
1094,
2926,
5037,
5752,
3306,
6125,
2954,
7572,
6482,
6847,
6142,
4373,
7226,
2978,
7601,
4749,
3346,
6165,
4389,
5463,
102,
5469,
4768,
3008,
5477,
7639,
1940,
3025,
6200,
6202,
3387,
3390,
1216,
2331,
4820,
1599,
... | Test |
7,312 | 2 | Xenomai:xenomai xenomai real-time development framework cooperating linux kernel provide pervasive interface-agnostic hard real-time support user space applications seamlessly integrated linux environment xenomai project launched august 2001 2003 merged real-time application interface rtai project produce production-grade real-time free software platform linux called rtai/fusion top xenomai abstract real-time operating system rtos core eventually rtai/fusion effort became independent rtai 2005 xenomai project xenomai based abstract rtos core usable building kind real-time interface nucleus exports set generic rtos services number rtos personalities called “ skins ” built nucleus providing specific interface applications using services single generic core implement long list differences xenomai rtai though projects share ideas support rtdm layer major differences derive goals projects aim respective implementation rtai focused lowest technically feasible latencies xenomai also considers clean extensibility rtos skins portability maintainability important goals xenomai path towards ingo molnár preempt_rt support another major difference compared rtai objectives | [
3256,
2182,
3613,
7528,
7532,
5744,
6443,
4336,
2942,
6117,
4341,
5762,
412,
415,
3664,
771,
3666,
2970,
7950,
7956,
7605,
5453,
5460,
7242,
1535,
1924,
5110,
6892,
1176,
1933,
5829,
6918,
1208,
6211,
4435,
5865,
7669,
3404,
1227,
861,
... | Test |
7,313 | 3 | FeiTeng_(processor):feiteng processor feiteng 飞腾 fēiténg name several computer central processing units designed produced china supercomputing applications microprocessors developed tianjin phytium technology processors also described yinhefeiteng 银河飞騰 yhft family cpu family developed team directed nudt professor xing zuocheng first generation binary compatible intel itanium 2 second generation ft64 system chip cpu 64-bit stream processor ft64 chips used yinhe 银河 supercomputers accelerators feiteng-1000 third generation cpu family manufactured 65 nm technology contains 350 million gates clock frequency 0.8–1 ghz compatible sparcv9 instruction set architecture chip contains 8 cores capable executing 64 threads 3 hypertransport channels coherent links 4 ddr3 memory controllers 8x pcie 2.0 link tianhe-1a supercomputer uses 2,048 feiteng 1000 processors tianhe-1a theoretical peak performance 4.701 petaflops also employing 7,168 nvidia tesla m2050 gpus 14,336 intel xeon x5670 cpus addition ft1000 processors feiteng-1000 eight-core processor based sparc system used operate service nodes tianhe-1 2012 report european high performance computing service stated feiteng used work opensparc project tianhe-2 supercomputer uses 4096 processors galaxy ft-1500 16 cores opensparc architecture based 65 w tdp made 40 nm technology processor cores work 1.8 ghz peak performance ft-1500 115–144 gflops every core may execute 8 interleaving threads supports 256-bit wide simd vector operations including fused mul-add fma cache soc works 2 ghz frequency 16 kb l1i 16 kb l1d 512 kb l2 per core shared 4 mb l3 cache l3 cache 4 segments 1 segment per block 4 cpu cores 1 mb 32-way associative cache uses directory-based cache coherency protocol ft-1500 also ft-1500a arm64 soc designed phytium includes 16 cores armv8 processor 32-lane pcie host 2 gmac on-chip ethernet controller gicv3 interrupt controller support | [
8130,
7535,
1023,
3747,
1237,
5936,
971,
1678,
357,
8024
] | Train |
7,314 | 3 | Microsequencer:microsequencer computer architecture engineering sequencer microsequencer generates addresses used step microprogram control store used part control unit cpu stand-alone generator address ranges usually addresses generated combination counter field microinstruction subset instruction register counter used typical case next microinstruction one execute field microinstruction used jumps logic since cpus implement instruction set useful able decode instruction bits directly sequencer select set microinstructions perform cpu instructions modern cisc processors use combination pipelined logic process lower complexity opcodes completed one clock cycle microcode implement ones take multiple clock cycles complete one first integrated microcoded processors ibm palm processor emulated processor instruction microcode used ibm 5100 one first personal computers recent examples similar microsequencer-based processors microcore labs mcl86 mcl51 mcl65 cores emulate intel 8086/8088 8051 mos 6502 instruction sets entirely microcode | [
5012,
1447,
5371,
3948,
7527,
7529,
5737,
2567,
4694,
5042,
1481,
5055,
1867,
2248,
6148,
2266,
3347,
4047,
5483,
1556,
5487,
6198,
1568,
1570,
6922,
7666,
515,
8024,
5521,
3747,
1237,
1252,
1254,
4847,
4479,
8066,
1640,
4864,
216,
4154,
... | Test |
7,315 | 5 | SOAP:soap soap abbreviation simple object access protocol messaging protocol specification exchanging structured information implementation web services computer networks purpose provide extensibility neutrality independence uses xml information set message format relies application layer protocols often hypertext transfer protocol http simple mail transfer protocol smtp message negotiation transmission soap allows processes running disparate operating systems windows linux communicate using extensible markup language xml since web protocols like http installed running operating systems soap allows clients invoke web services receive responses independent language platforms soap provides messaging protocol layer web services protocol stack web services xml-based protocol consisting three parts soap three major characteristics example soap procedures application send soap request server web services enabled—such real-estate price database—with parameters search server returns soap response xml-formatted document resulting data e.g. prices location features since generated data comes standardized machine-parsable format requesting application integrate directly soap architecture consists several layers specifications soap evolved successor xml-rpc though borrows transport interaction neutrality web service addressing envelope/header/body elsewhere probably wddx soap designed object-access protocol 1998 dave winer box bob atkinson mohsen al-ghosein microsoft atkinson al-ghosein working specification made available submitted ietf 13 september 1999 according box due politics within microsoft microsoft hesitation dave winer shipped xml-rpc 1998 submitted internet draft reach rfc status therefore considered standard version 1.1 specification published w3c note 8 may 2000 since version 1.1 reach w3c recommendation status considered standard either version 1.2 specification however became w3c recommendation june 24 2003 soap specification maintained xml protocol working group world wide web consortium group closed 10 july 2009 soap originally stood simple object access protocol version 1.2 standard dropped acronym soap first introduced became underlying layer complex set web services based web services description language wsdl xml schema universal description discovery integration uddi different services especially uddi proved far less interest appreciation gives complete understanding expected role soap compared web services actually evolved soap specification broadly defined consisting following 3 conceptual components protocol concepts encapsulation concepts network concepts soap specification defines messaging framework consists soap message ordinary xml document containing following elements smtp http valid application layer protocols used transport soap http gained wider acceptance works well today internet infrastructure specifically http works well network firewalls soap may also used https protocol http application level uses encrypted transport protocol underneath either simple mutual authentication advocated ws-i method provide web service security stated ws-i basic profile 1.1 major advantage distributed protocols like giop/iiop dcom normally filtered firewalls soap amqp yet another possibility implementations support soap also advantage dcom unaffected security rights configured machines require knowledge transmitting receiving nodes lets soap loosely coupled way possible dcom also soap-over-udp oasis standard xml information set chosen standard message format widespread use major corporations open source development efforts typically xml information set serialized xml wide variety freely available tools significantly eases transition soap-based implementation somewhat lengthy syntax xml benefit drawback promotes readability humans facilitates error detection avoids interoperability problems byte-order endianness slow processing speed cumbersome example corba giop ice dcom use much shorter binary message formats hand hardware appliances available accelerate processing xml messages binary xml also explored means streamlining throughput requirements xml xml messages self-documenting nature usually 'overhead headers footers nested tags delimiters actual data contrast earlier protocols overhead usually relatively small percentage overall message financial messaging soap found result 2–4 times larger message previous protocols fix financial information exchange cdr common data representation xml information set serialized xml instance csv json xml-infoset representations exist also need specify generic transformation framework concept soap bindings allows specific bindings specific application drawback senders receivers support newly defined binding post /instock http/1.1 host www.example.org content-type application/soap+xml charset=utf-8 content-length 299 soapaction http //www.w3.org/2003/05/soap-envelope xml version= 1.0 soap envelope xmlns soap= http //www.w3.org/2003/05/soap-envelope xmlns m= http //www.example.org /soap envelope | [
4682,
4685,
7537,
7896,
6105,
737,
7198,
7565,
5417,
773,
5432,
2973,
4743,
1147,
87,
3345,
4759,
103,
4766,
5111,
7628,
112,
817,
3363,
3369,
7637,
1554,
3377,
6908,
3383,
5500,
4436,
148,
6221,
519,
6224,
5874,
1609,
8045,
2715,
542,
... | Validation |
7,316 | 4 | Messaging_Architects:messaging architects messaging architects canadian software company specializing e-mail products flagship product netmail integrated email management platform launched march 1995 chronofax company distributor computer-based fax solutions chronofax became tobit software north america result partnership german company called tobit produced fax software novell netware groupwise markets three-and-a-half-year partnership tobit came close company renamed messaging architects messaging architects initially provided add-ons novell groupwise messaging platform company offers integrated email management platform called netmail netmail consolidates company portfolio email software solutions includes netmail secure formerly gwguardian m+guardian netmail archive formerly m+archive netmail search netmail migrate formerly migrator netmail store formerly m+securestore company also provides email platform migration services messaging architects also highly skilled professional services team full novell microsoft exchange certification messaging architects works messaging platform providers provide solutions microsoft exchange novell groupwise lotus notes late 2008 mark crispin inventor imap worked messaging architects senior software engineer developing entirely new imap server based upon distributed mail store extending mix format messaging architects email security email archiving solutions positioned gartner magic quadrant reports 2009 m+archive positioned magic quadrant email active archiving 2009 m+guardian email security solution achieve one gold two vbspam platinum awards virus bulletin anti-spam certification messaging architects also offers range remote on-site services managing email risk co-existence different email platforms including professional services email migration services email consulting email policy training | [] | Validation |
7,317 | 4 | SHRED:shred spam harassment reduction via economic disincentives shred proposed sender-at-risk e-mail stamp mechanism reducing e-mail spamming problem indirectly increasing cost e-mail sending senders unwanted e-mail aims avoid defects earlier sender-at-risk mechanisms main aim shred provide economic incentives legitimate isps clean botnet problem within networks making cheaper continue pay excess postage charges delivered spam messages whilst requiring shred mandated universally adopted effective smtp re-engineered shred differs e-mail postage stamp systems shred stamps represent potential financial liability e-mail sender rather unconditional cost incur replacement cost cancelled e-mail recipient considers e-mail unwanted shred thus effectively electronic reputation system reputation—in form able affix stamps e-mail—is lost complaints bought back money thus imposing financial cost loss reputation presence absence stamp used e-mail receivers together sources information blacklists whitelists content analysis make judgments whether e-mail relayed delivered | [
6908
] | Test |
7,318 | 2 | NeXT_RISC_Workstation:next risc workstation next risc workstation nrw unreleased computer workstation designed next early 1990s successor m68k-based nextcube nextstation initially nrw based motorola 88110 microprocessor due lack confidence motorola commitment 88k architecture later redesigned around dual powerpc 601s pre-production motherboards enclosures produced nrw enter production next exited hardware market 1993 | [
5614,
5450
] | Test |
7,319 | 4 | Web_application_security:web application security web application security branch information security deals specifically security websites web applications web services high level web application security draws principles application security applies specifically internet web systems majority web application attacks occur cross-site scripting xss sql injection attacks typically made possible flawed coding failure sanitize application inputs outputs attacks ranked 2009 cwe/sans top 25 dangerous programming errors according security vendor cenzic top vulnerabilities march 2012 include open web application security project owasp provides free open resources led non-profit called owasp foundation owasp top 10 2017 published result recent research based comprehensive data compiled 40 partner organizations data approximately 2.3 million vulnerabilities discovered across 50,000 applications according owasp top 10 2017 ten critical web application security risks include secure web application development enhanced applying security checkpoints techniques early stages development well throughout software development lifecycle special emphasis applied coding phase development security mechanisms used include threat modeling risk analysis static analysis digital signature among others owasp emerging standards body web application security particular published owasp top 10 describes detail major threats web applications web application security consortium wasc created web hacking incident database whid also produced open source best practice documents web application security whid became owasp project february 2014 security fundamentally based people processes number technical solutions consider designing building testing secure web applications high level solutions include | [
623,
3932,
6515,
3681,
3448,
2105,
1461,
6986,
651,
7262,
2566,
6725,
5485,
1376,
3967,
5135,
3794,
2577,
5401,
2310,
6823,
1019,
2491,
1956,
5149,
6376,
230,
1584,
6567,
6756,
6043,
860,
2789,
1691,
74,
7865,
2072,
80,
84,
3680,
1805
] | Test |
7,320 | 3 | Tile_processor:tile processor tile processors multicore manycore chips contain one-dimensional commonly two-dimensional arrays identical tiles tile comprises compute unit processing engine cpu caches switch tiles viewed adding switch core core comprises compute unit caches typical tile processor configuration switches tiles connected using one mesh networks tilera tile pro 64 example contains 64 tiles tiles comprises cpu l1 l2 caches switches several mesh networks processors tile configuration include seaforth24 kilocore kc256 xmos xcore microcontrollers massively parallel processor arrays | [
3439,
5371,
7453
] | Validation |
7,321 | 2 | Robotics_middleware:robotics middleware robotics middleware middleware used complex robot control software systems described software glue make easier robot builders focus specific problem area wide variety projects robotics middleware exist one dominates fact many robotic systems use middleware middleware products rely wide range different standards technologies approaches make use interoperation difficult developers may prefer integrate system player project formerly player/stage project project create free software research robotics sensor systems components include player network server stage robot platform simulators although accurate statistics hard obtain player one popular open-source robot interfaces research post-secondary education major intelligent robotics journals conferences regularly publish papers featuring real simulated robot experiments using player stage rt-middleware common platform standards robots based distributed object technology rt-middleware supports construction various networked robotic systems integration various network-enabled robotic elements called rt-components specification standard rt-components discussed defined object management group omg urbi open source cross-platform software platform c++ used develop applications robotics complex systems based uobject distributed c++ component architecture also includes urbiscript orchestration language parallel event-driven script language uobject components plugged urbiscript appear native objects scripted specify interactions data exchanges uobjects linked urbiscript interpreter executed autonomous processes remote mode either another thread another process machine local network machine distant network miro distributed object oriented framework mobile robot control based corba common object request broker architecture technology miro core components developed aid ace adaptive communications environment object oriented multi-platform framework os-independent interprocess network real time communication use tao ace orb orb object request broker corba implementation designed high performance real time applications currently supported platforms include pioneers b21 robot soccer robots various robotic sensors orca describes goals also state successful think framework objectives must general flexible extensible sufficiently robust high-performance full-featured use commercial applications yet sufficiently simple experimentation university research environments describe approach orca software released lgpl gpl licenses openrdk open-source software framework robotics developing loosely coupled modules provides transparent concurrency management inter-process via sockets intra-process via shared memory blackboard-based communication linking technique allows input/output data ports conceptual system design modules connecting simulators generic robot drivers provided rock robot construction kit software framework development robotic systems underlying component model based orocos rtt real time toolkit rock provides tools required set run high-performance reliable robotic systems wide variety applications research industry contains rich collection ready use drivers modules use system easily extended adding new components isaac nvidia® isaac software development kit sdk developer toolbox accelerating development deployment artificial intelligence-powered robots sdk includes isaac robot engine packages high-performance robotics algorithms perform perception navigation hardware reference applications isaac sim virtual robotics laboratory high-fidelity 3d world simulator accelerates research design development robotics reducing cost risk developers quickly easily train test robots detailed highly realistic scenarios open source community version available github suppported hardware platform includes bom details refer kaya-robot ros robot operating system collection software frameworks robot software development heterogeneous computer cluster ros provides standard operating system services hardware abstraction low-level device control implementation commonly used functionality message-passing processes package management yarp open-source software package written c++ interconnecting sensors processors actuators robots | [
668,
5666
] | Test |
7,322 | 4 | Racetrack_problem:racetrack problem racetrack problem specific instance type race condition racetrack problem flaw system process whereby output and/or result process unexpectedly critically dependent sequence timing events run circular pattern note problem semantically different race condition circular nature problem term originates idea two signals racing circular motion influence output first racetrack problems occur electronics systems especially logic circuits computer software especially multithreaded distributed programs | [
4318,
5209
] | Test |
7,323 | 4 | Webroot_Window_Washer:webroot window washer webroot window washer tool designed protect user privacy permanently deleting traces web browsing history personal information files computer running microsoft windows currently versions planned program longer updated window washer .95 first launch product originally designed remove unwanted files accumulate computer ’ hard drive surfing internet areas trace file removal include internet history address bar cache cookies recent documents list recycle bin icq history temporary internet files stored computer web search window washer total removal feature completely erases everything found hard drive including operating system beginning 1.0 version launch mid-1998 new process added file deletion process known “ bleaching ” file encryption process seeks files random characters names destroys permanently removes computer ’ hard drive custom cookie selection feature also added allow users select specific cookies excluded deletion process making homepages internet preferences logins passwords stored future visits website software updates also included ability clean chk files created scandisk third party programs files activex java downloaded internet explorer 2.0 version updates launched late 1998 primarily designed able match advancements visual improvements windows 95/98 nt 4.0 window washer adapted user interface allow users use software multiple users programming new window ’ operations systems version window washer also supported netscape 4.5 internet explorer 5.0 well added features came along keyword storing feature search engines personal information stored entered online auto-complete form users also gained ability reassign wash path commonly washed items command-line washes routine cleaning cycles reprogrammed include cleaning information stored windows registry aka “ streams ” deletes tracking paths past actions user additional features 2.0 launch included real-time counter drive space restored items washed added status window custom plug-ins also made available beginning version history pathways left behind popular media programs realplayer adobe acrobat would included wash cycles customizable user interface added feature 3.0 version launch early 2000 additional third party plug-ins made available download well ability wash recent history cache windows media player increased compatibility also added netscape 6 msn explorer 6 aol 6 interface updated include easier custom configuration preferences settings notable upgrade 4.0 version addition automatic check updates feature release also included enhanced password security improvement destroying deleting function bleaching increased efficiency cleaning sweeps overall version 4.0 made window washer compatible aol 7.0 beta netscape 6.1 windows xp internet explorer 6.0 window washer 5.0 eventually included requested feature one-click personal privacy safety option shreds permanently destroys deletes files folders version 5.0 also came built safety feature prompts user confirm requested delete files categories personal files commonly stored operating system files saved files unintentionally deleted 5.0 features included cookie keeper helps maintain internet settings personal favorites option organize frequently visited sites without deleted clean-up cycles 6.0 product launch included completely new user interface well cleaning internet browsers including mozilla firefox version 6.6 latest version product available makes window washer compatible windows 7 windows vista operating system 32 bit 64 bit also includes cleaning functions internet explorer 8 | [
6777,
4759,
5571
] | Test |
7,324 | 1 | UK_Detector_Finds_Database:uk detector finds database uk detector finds database initiative members metal-detecting community united kingdom promote good practice within hobby online facility detectorists record finds ensure information preserved future generations joining scheme immediate access database uploading details finds instructions provided stage process personal gallery created user entering first record grows may browsed searched way personal database items submitted reviewed scheme team experts full identification details provided confirmed soon possible users also able record detector make model performance different circumstances different types find may assessed | [
2054
] | Test |
7,325 | 2 | IncludeOS:includeos includeos minimal open source unikernel operating system cloud services iot includeos allows users run c++ applications cloud without operating system includeos adds operating system functionality application allowing oneself create 'virtual machine application includeos applications boot tens milliseconds require megabytes disk memory minimalist architecture includeos means virtual memory space turn therefore concept system calls user space | [
1807,
4297,
5021,
13,
3271,
3276,
5041,
7546,
7550,
405,
1855,
4347,
65,
4733,
6853,
5088,
6500,
785,
2266,
788,
3682,
1522,
7605,
7611,
4759,
7242,
4397,
6892,
126,
6907,
4786,
4423,
6197,
4061,
1208,
1574,
5161,
5865,
6570,
858,
8026,... | Validation |
7,326 | 3 | Palm_IIIc:palm iiic palm iiic first colour pda made palm inc started sold 1998 ran palm os 3.5 first palm os version native colour support supported paletted 8-bit colour modes machine tft lcd bright indoors palm iiic features classic iii-series connector 8mb ram 20mhz dragonball ezi cpu unit also lithium ion rechargeable battery slightly modified version original palm iii chassis | [
4754,
2551,
4317,
488,
2133,
7919,
1581,
3405,
1237,
1702
] | Test |
7,327 | 3 | PowerPC_7xx:powerpc 7xx powerpc 7xx family third generation 32-bit powerpc microprocessors designed manufactured ibm motorola freescale semiconductor family called powerpc g3 well-known customer apple inc. introduced november 10 1997 term powerpc g3 often incorrectly imagined microprocessor fact number microprocessors different vendors used designations applied macintosh computers powerbook g3 multicolored imacs ibooks several desktops including beige blue white power macintosh g3s low power requirements small size made processors ideal laptops name lived last days apple ibook 7xx family also widely used embedded devices like printers routers storage devices spacecraft video game consoles 7xx family shortcomings namely lack smp support simd capabilities relatively weak fpu motorola 74xx range processors picked 7xx left powerpc 740 750 codename arthur introduced late 1997 evolutionary replacement powerpc 603e enhancements included faster 60x system bus 66 mhz larger l1 caches 32 kb instruction 32 kb data second integer unit enhanced floating point unit higher core frequency 750 support optional 256 512 1024 kb external unified l2 cache cache controller cache tags on-die cache accessed via dedicated 64-bit bus 740 750 added dynamic branch prediction 64-entry branch target instruction cache btic dynamic branch prediction uses recorded outcome branch stored 512-entry 2-bit branch history table bht predict outcome btic caches first two instructions branch target 740/750 models 6.35 million transistors initially manufactured ibm motorola aluminium based fabrication process die measured 67 mm 0.26 μm reached speeds 366 mhz consuming 7.3 w. 1999 ibm fabricated versions 0.20 μm process copper interconnects increased frequency 500 mhz decreased power consumption 6 w die size 40 mm 740 slightly outperformed pentium ii consuming far less power smaller die off-die l2 cache 750 increased performance approximately 30 situations design successful quickly surpassed powerpc 604e integer performance causing planned 604 successor scrapped powerpc 740 completely pin compatible older 603 allowing upgrades powerbook 1400 2400 even prototype powerbook 500/g3 750 l2 cache bus required pins thus different package 360-pin ball grid array bga powerpc 750 used many computers apple including original imac radiation-hardened processor based powerpc 750 intended use high radiation environments experienced board satellites spacecraft rad750 released purchase 2001 mars science laboratory curiosity mars reconnaissance orbiter spacecraft rad750 board processor 10.4 million transistors manufactured bae systems using either 250 150 nm process die area 130 mm² operates 110 200 mhz cpu withstand 200,000 1,000,000 rads temperature ranges −55 125 °c rad750 packaging logic functions price tag excess us 200,000 high price mainly due radiation hardening revisions powerpc 750 architecture manufacturing stringent quality control requirements extended testing processor chip manufactured motorola revised 740/750 design 1998 shrunk die size 51 mm thanks newer aluminium based fabrication 0.22 μm speeds increased 600 mhz 755 used ibook models model motorola chose keep developing 750 processors favour powerpc 7400 processor cores ibm continued develop powerpc 750 line introduced powerpc 750cx code-named sidewinder 2000 256 kib on-die l2 cache increased performance reducing power consumption complexity 400 mhz drew 4 w. 750cx 20 million transistors including l2 cache die size 43 mm 0.18 μm copper process 750cx used one imac ibook revision 750cxe codename anaconda introduced 2001 minor revision 750cx increased frequency 700 memory bus 100 mhz 133 mhz 750cxe also featured improved floating-point performance 750cx several ibook models last g3-based imac used processor cost reduced version 750cxe called 750cxr available lower frequencies gekko custom central processor nintendo gamecube game console based powerpc 750cxe adds 50 new instructions well modified fpu capable simd functionality 256 kib die l2 cache operates 485 mhz 162 mhz memory bus fabricated ibm 180 nm process die 43 mm large 750fx code-named sahara came 2002 increased frequency 900 mhz bus speed 166 mhz on-die l2 cache 512 kib also featured number improvements memory subsystem enhanced faster 200 mhz 60x bus controller wider l2 cache bus ability lock parts l2 cache manufactured using 0.13 μm copper based fabrication low-k dielectric silicon insulator technology 750fx 39 million transistors die size 35 mm consumes less 4 w 800 mhz typical loads last g3 type processor used apple employed ibook g3 low powered version 750fx available called 750fl 750fx powers nasa orion multi-purpose crew vehicle orion using honeywell international inc. flight computer originally built boeing 787 jet airliner 750gx codenamed gobi revealed 2004 latest powerful 7xx processor ibm on-die 1 mb l2 cache top frequency 1.1 ghz support bus speeds 200 mhz among enhancements compared 750fx manufactured using 0.13 μm process copper interconnects low-k dielectric silicon insulator technology 750gx 44 million transistors die size 52 mm consumes less 9 w 1 ghz typical loads low-power version 750gx available called 750gl 750vx codenamed mojave rumored confirmed canceled version 7xx line would powerful featured version date 4mb die l3 cache 400mhz ddr front side bus implementation altivec used powerpc 970 expected clock high 1.8 ghz starting 1.5 ghz reported additional pipeline stages advanced power management features reported finished ready production december 2003 said timing late get significant orders seeing apple ibook line switched g4s october year thus quickly fell roadmap never released heard since follow chips planned 750vxe would surpassed 2 ghz 750cl evolved 750cxe speeds ranging 400 mhz 1 ghz system bus 240 mhz l2 cache prefetch features graphics related instructions added improve performance added graphics-related functions match closely ones found gekko processor likely 750cl shrink processor general purpose use 750cl manufactured using 90 nm copper based fabrication low-k dielectric silicon insulator technology features 20 million transistors 16 mm die draws 2.7 w 600 mhz 9.8 w 1 ghz cpu wii virtually identical 750cl runs 729 mhz frequency supported stock 750cl measures 4.2 x 4.5 mm 18.9 mm smaller half size gekko microprocessor 43 mm incorporated gamecube first release cpu wii u believed evolution broadway architecture largely unconfirmed characteristics triple core cpu runs 1.24 ghz manufactured 45 nm process ibm ceased publish roadmap 750 family favor marketing custom processor vendor given ibm resources 750 core produced new features long willing buyer particular ibm public plans produce ordinary 750-based microprocessor process smaller 90 nm effectively phasing commodity chip competitive markets networking equipment however ibm make espresso processor nintendo 750 based design improvements multiprocessor support part triple core new 45 nm fabrication process edram instead regular l2 cache unknown changes made design 2015 rochester electronics started providing legacy support devices freescale discontinued 750 designs favor designs based powerpc e500 core powerquicc iii list complete list known 750 based designs pictures illustrations scale | [
4661,
3936,
1075,
713,
1454,
1083,
5737,
7905,
6111,
4702,
405,
6474,
1131,
5079,
2257,
3674,
7597,
5097,
3348,
5100,
4408,
3012,
3708,
7990,
1199,
6202,
7654,
4815,
6226,
2353,
2719,
4479,
3440,
912,
7361,
234,
239,
2781,
8125,
2785,
6... | Test |
7,328 | 4 | Democratic_Congressional_Campaign_Committee_cyber_attacks:democratic congressional campaign committee cyber attacks friday july 29 2016 democratic congressional campaign committee reported computer systems infiltrated strongly believed us intelligence sources infiltrator groups russian foreign intelligence groups breached democratic national committee computer systems groups known fancy bear cozy bear sofacy crowdstrike assisted efforts deal dccc breach significant concern russians attempting influence 2016 presidential campaign russian cyber intrusions united states government private sector computer systems significantly increased u.s imposed sanctions russia invasion crimea ukraine president obama preference publicize cyber attacks | [
704,
3932,
4025,
1528,
2991,
7799,
7066,
2912,
376,
1173,
6526,
998,
3528,
3277,
2923,
7818,
208,
2021,
3864,
5922,
6628,
124,
5305,
1376,
6541,
6904,
6194,
924,
1383,
2854,
7600,
6740,
5675,
2587,
2678,
3038,
4531,
5330,
600,
1307,
304... | Test |
7,329 | 7 | Panzura:panzura panzura privately held company based us markets computer data storage products panzura founded 2008 randy chou john taylor members founding software team aruba networks company incorporated delaware first headquartered san jose california funded november 2010 12 million company initially funded matrix partners khosla ventures chevron technology ventures arm chevron corporation june 2012 opus capital led round 15 million funding included previous investors round 25 million funding june 2013 included meritech capital partners july 2013 flash memory maker sandisk announced new strategic investor alex lam sandisk joining board observer based campbell california 2013 panzura provides cloud storage data protection specialized cloud storage controllers panzura products accessed using network-attached storage nas protocols allow users secure access latest versions file widely distributed locations industry analysts sometimes call kind product cloud storage gateway available hardware appliance called quicksilver software-only use vmware esx quicksilver best show award may 2012 interop trade show panzura global cloud storage system integrates cloud storage platforms including amazon web services cleversafe emc atmos google hp cloud services nirvanix panzura received three patents technology 2013 panzura offers proprietary software delivered hardware appliances virtual machine licenses installed locally backup actively archive centralize data remote location architectural firm diller scofidio renfro credited panzura technology speeding backup recovery data hurricane sandy california state university northridge also used technology backing data march 2013 panzura announced achieved fips 140-2 security certification national institute standards technology use us government agencies contractors | [
5064,
1254,
298,
5889
] | Test |
7,330 | 1 | Database_tuning:database tuning database tuning describes group activities used optimize homogenize performance database usually overlaps query tuning refers design database files selection database management system dbms application configuration database environment operating system cpu etc. database tuning aims maximize use system resources perform work efficiently rapidly possible systems designed manage use system resources still much room improve efficiency customizing settings configuration database dbms hardware software configuration disk subsystems examined raid levels configuration block stripe size allocation configuration disks controller cards storage cabinets external storage systems sans transaction logs temporary spaces heavy consumers i/o affect performance users database placing appropriately crucial frequently joined tables indexes placed requested file storage retrieved parallel separate disks simultaneously frequently accessed tables indexes placed separate disks balance i/o prevent read queuing dbms tuning refers tuning dbms configuration memory processing resources computer running dbms typically done configuring dbms resources involved shared host system tuning dbms involve setting recovery interval time needed restore state data particular point time assigning parallelism breaking work single query tasks assigned different processing resources network protocols used communicate database consumers memory allocated data execution plans procedure cache much faster access data memory data storage maintaining sizable cache data makes activities perform faster consideration given work space caching execution plans procedures means reused instead recompiled needed important take much memory possible leaving enough processes os use without excessive paging memory storage processing resources sometimes assigned specific activities improve concurrency server eight processors six could reserved dbms maximize available processing resources database utilizes machine learning learn evaluate performance various workloads database maintenance includes backups column statistics updates defragmentation data inside database files heavily used database transaction log grows rapidly transaction log entries must removed log make room future entries frequent transaction log backups smaller interrupt database activity shorter periods time dbms use statistic histograms find data range table index statistics updates scheduled frequently sample much underlying data possible accurate updated statistics allow query engines make good decisions execution plans well efficiently locate data defragmentation table index data increases efficiency accessing data amount fragmentation depends nature data changed time amount free space database pages accept inserts data without creating additional pages | [
1905,
6604,
8167,
7341,
6345,
5561,
906,
5217,
2390,
6098,
5571,
4054,
6636,
2663,
2124,
6737,
6739,
3119,
3801,
7999,
5943,
7472,
2054,
6932,
6386,
684,
6390,
7937,
7303,
6144,
4457,
6320,
1902,
6594,
2445
] | Test |
7,331 | 3 | IBM_System/360:ibm system/360 ibm system/360 s/360 family mainframe computer systems announced ibm april 7 1964 delivered 1965 1978 first family computers designed cover complete range applications small large commercial scientific design made clear distinction architecture implementation allowing ibm release suite compatible designs different prices partially compatible model 44 expensive systems use microcode implement instruction set features 8-bit byte addressing binary decimal hexadecimal floating-point calculations launch system/360 family introduced ibm solid logic technology slt new technology start powerful smaller computers slowest system/360 model announced 1964 model 30 could perform 34,500 instructions per second memory 8 64 kb high performance models came later 1967 ibm system/360 model 91 could 16.6 million instructions per second larger 360 models could 8 mb main memory though main memory big unusual—a large installation might little 256 kb main storage 512 kb 768 kb 1024 kb common 8 megabytes slower 8 microsecond large capacity storage lcs also available ibm 360 extremely successful market allowing customers purchase smaller system knowledge would always able migrate upward needs grew without reprogramming application software replacing peripheral devices many consider design one successful computers history influencing computer design years come chief architect system/360 gene amdahl project managed fred brooks responsible chairman thomas j. watson jr commercial release piloted another watson lieutenants john r. opel managed launch ibm ’ system 360 mainframe family 1964 application-level compatibility restrictions system/360 software maintained present day system z mainframe servers contrasting at-the-time normal industry practice ibm created entire new series computers small large low- high-performance using instruction set two exceptions specific markets feat allowed customers use cheaper model upgrade larger systems needs increased without time expense rewriting software introduction system/360 business scientific applications used different computers different instruction sets operating systems different-sized computers also instruction sets ibm first manufacturer exploit microcode technology implement compatible range computers widely differing performance although largest fastest models hard-wired logic instead flexibility greatly lowered barriers entry vendors customers choose machines could outgrow machines potentially powerful thus costly meant many companies simply buy computers ibm initially announced series six computers forty common peripherals ibm eventually delivered fourteen models including rare one-off models nasa least expensive model model 20 little 4096 bytes core memory eight 16-bit registers instead sixteen 32-bit registers system/360 models instruction set subset used rest range initial announcement 1964 included models 30 40 50 60 62 70 first three low- middle-range systems aimed ibm 1400 series market three first shipped mid-1965 last three intended replace 7000 series machines never shipped replaced 65 75 first delivered november 1965 january 1966 respectively later additions low-end included models 20 1966 mentioned 22 1971 25 1968 model 20 several sub-models sub-model 5 higher end model model 22 recycled model 30 minor limitations smaller maximum memory configuration slower i/o channels limited slower lower-capacity disk tape devices 30 model 44 1966 specialized model designed scientific computing real-time computing process control featuring additional instructions storage-to-storage instructions five complex instructions eliminated succession high-end machines included model 67 1966 mentioned briefly anticipated 64 66 85 1969 91 1967 anticipated 92 95 1968 195 1971 85 design intermediate system/360 line follow-on system/370 basis 370/165 system/370 version 195 include dynamic address translation implementations differed substantially using different native data path widths presence absence microcode yet extremely compatible except specifically documented models architecturally compatible 91 example designed scientific computing provided out-of-order instruction execution could yield imprecise interrupts program trap occurred several instructions read lacked decimal instruction set used commercial applications new features could added without violating architectural definitions 65 dual-processor version m65mp extensions inter-cpu signalling 85 introduced cache memory models 44 75 91 95 195 implemented hardwired logic rather microcoded models model 67 announced august 1965 first production ibm system offer dynamic address translation virtual memory hardware support time-sharing dat commonly referred mmu experimental one-off unit built based model 40 67 ibm announced models 64 66 dat versions 60 62 almost immediately replaced 67 time 60 62 replaced 65 dat hardware would reappear s/370 series 1972 though initially absent series like close relative 65 67 also offered dual cpus ibm stopped marketing system/360 models end 1977 ibm existing customers large investment software executed second-generation machines several models offered option emulation customer previous computer using combination special hardware special microcode emulation program used emulation instructions simulate target system old programs could run new machine however customers initially halt computer load emulation program ibm later added features modified emulator programs allow emulation 1401 1440 1460 1410 7010 control operating system model 85 later system/370 maintained precedent retaining emulation options allowing emulator programs execute operating system control alongside native programs system/360 excepting model 20 replaced compatible system/370 range 1970 model 20 users targeted move ibm system/3 idea major breakthrough fs technology dropped mid-1970s cost-effectiveness continuity reasons later compatible ibm systems include 4300 family 308x family 3090 es/9000 9672 families system/390 family ibm z series computers mostly identical compatible terms machine code architecture system/360 included amdahl 470 family successors hitachi mainframes univac 9000 series fujitsu facom rca spectra 70 series english electric system 4 system 4 machines built license rca rca sold spectra series univac became univac series 70 univac also developed univac series 90 successors 9000 series series 70 soviet union produced system/360 clone named es evm ibm 5100 portable computer introduced 1975 offered option execute system/360 apl.sv programming language hardware emulator ibm used approach avoid costs delay creating 5100-specific version apl special radiation-hardened otherwise somewhat modified system/360s form system/4 pi avionics computer used several fighter bomber jet aircraft complete 32-bit ap-101 version 4 pi machines used replicated computing nodes fault-tolerant space shuttle computer system five nodes u.s. federal aviation administration operated ibm 9020 special cluster modified system/360s air traffic control 1970 1990s 9020 software apparently still used via emulation newer hardware system/360 introduced number industry standards marketplace system/360 series computer system architecture specification specification makes assumptions implementation rather describes interfaces expected behavior implementation architecture describes mandatory interfaces must available implementations optional interfaces aspects architecture optional features models system/360 except model 20 model 44 implemented specification binary arithmetic logical operations performed register-to-register memory-to-register/register-to-memory standard feature commercial instruction set option installed packed decimal arithmetic could performed memory-to-memory memory-to-register operations scientific instruction set feature installed provided access four floating point registers could programmed either 32-bit 64-bit floating point operations models 85 195 could also operate 128-bit extended-precision floating point numbers stored pairs floating point registers software provided emulation models system/360 used 8-bit byte 32-bit word 64-bit double-word 4-bit nibble machine instructions operators operands could contain register numbers memory addresses complex combination instruction options resulted variety instruction lengths formats memory addressing accomplished using base-plus-displacement scheme registers 1 f 15 displacement encoded 12 bits thus allowing 4096-byte displacement 0-4095 offset address put base register register 0 could used base register index register branch address register 0 reserved indicate address first 4 kb memory register 0 specified described value 0x00000000 implicitly input effective address calculation place whatever value might contained within register 0 specified branch address register branch taken content register 0 ignored side effect instruction performed specific behavior permitted initial execution interrupt routines since base registers would necessarily set 0 first instruction cycles interrupt routine n't needed ipl initial program load boot one always clear register without need save exception model 67 addresses real memory addresses virtual memory available ibm mainframes system/370 series model 67 introduced virtual memory architecture mts cp-67 tss/360 used—but ibm mainline system/360 operating systems system/360 machine-code instructions 2 bytes long memory operands 4 bytes long one operand 6 bytes long two operands instructions always situated 2-byte boundaries operations like mvc move-characters hex d2 move 256 bytes information moving 256 bytes data required multiple mvc operations system/370 series introduced family powerful instructions mvcl move-characters-long instruction supports moving 16 mb single block operand two bytes long typically representing address 4-bit nibble denoting base register 12-bit displacement relative contents register range 000–fff shown hexadecimal numbers address corresponding operand contents specified general-purpose register plus displacement example mvc instruction moves 256 bytes length code 255 hexadecimal ff base register 7 plus displacement 000 base register 8 plus displacement 001 would coded 6-byte instruction d2ff 8001 7000 operator/length/address1/address2 system/360 designed separate system state problem state provided basic level security recoverability programming errors problem user programs could modify data program storage associated system state addressing data operation exception errors made machine enter system state controlled routine operating system could try correct terminate program error similarly could recover certain processor hardware errors machine check routines peripherals interfaced system via channels channel specialized processor instruction set optimized transferring data peripheral main memory modern terms could compared direct memory access dma initially two types channels byte-multiplexer channels known time simply multiplexor channels connecting slow speed devices card readers punches line printers communications controllers selector channels connecting high speed devices disk drives tape drives data cells drums every system/360 except model 20 standard 360 byte-multiplexer channel 1 selector channels smaller models model 50 integrated channels larger models model 65 channels large separate units separate cabinets ibm 2860 2870 60 62 70 allowed 2860 selector channels assumption would smaller 360s attached would slow-speed work byte-multiplexer channel able handle i/o to/from several devices simultaneously device highest rated speeds hence name multiplexed i/o devices onto single data path main memory devices connected byte-multiplexer channel configured operate 1-byte 2-byte 4-byte burst mode larger blocks data used handle progressively faster devices example 2501 card reader operating 600 cards per minute would 1-byte mode 1403-n1 printer would burst mode also byte-multiplexer channels larger models optional selector subchannel section would accommodate tape drives byte-multiplexor channel address typically 0 selector subchannel addresses c0 ff thus tape drives system/360 commonly addressed 0c0-0c7 common byte-multiplexer addresses 00a 2501 card reader 00c/00d 2540 reader/punch 00e/00f 1403-n1 printers 010-013 3211 printers 020-0bf 2701/2703 telecommunications units addresses still commonly used z/vm virtual machines system/360 models 40 50 integrated 1052-7 console usually addressed 01f however connected byte-multiplexer channel rather direct internal connection mainframe model 30 attached different model 1052 1051 control unit models 60 75 also use 1052-7 selector channels enabled i/o high speed devices storage devices attached control unit channel control unit let clusters devices attached channels higher speed models multiple selector channels could operate simultaneously parallel improved overall performance control units connected channels bus tag cable pairs bus cables carried address data information tag cables identified data bus general configuration channel connect devices chain like mainframe—control unit x—control unit y—control unit z control unit assigned capture range addresses services example control unit x might capture addresses 40-4f control unit c0-df control unit z 80-9f capture ranges multiple 8 16 32 64 128 devices aligned appropriate boundaries control unit turn one devices attached example could control unit 6 disks would addressed c0-c5 three general types bus-and-tag cables produced ibm first standard gray bus-and-tag cable followed blue bus-and-tag cable finally tan bus-and-tag cable generally newer cable revisions capable higher speeds longer distances peripherals specified minimum cable revisions upstream downstream cable ordering control units channel also significant control unit strapped high low priority device selection sent mainframe channel selection sent x- y- z- y- x control unit high selection checked outbound direction low inbound direction thus control unit x either 1st 5th either 2nd 4th z 3rd line also possible multiple channels attached control unit multiple mainframes thus providing rich high-performance multiple-access backup capability typically total cable length channel limited 200 feet less preferred control unit accounts 10 feet 200-foot limit ibm introduced new type i/o channel model 85 model 195 2880 block multiplexer channel channel allowed device suspend channel program pending completion i/o operation thus free channel use another device channels support either standard 1.5 mb/second connections 2-byte interface feature 3 mb/second latter use one tag cable two bus cables initial use 2305 fixed-head disk 8 exposures alias addresses rotational position sensing rps standard system/370 thereafter block multiplexer channels operate selector channel allow compatible attachment legacy subsystems uncertain reliability availability new monolithic integrated circuits ibm chose instead design manufacture custom hybrid integrated circuits built 11 mm square ceramic substrates resistors silk screened discrete glass encapsulated transistors diodes added substrate covered metal lid encapsulated plastic create solid logic technology slt module number slt modules flip chip mounted onto small multi-layer printed circuit slt card card one two sockets one edge plugged onto pins one computer slt boards reverse company cards mounted cards pins printed contact areas plugged sockets computer boards twenty slt boards could assembled side-by-side vertically horizontally form logic gate several gates mounted together constituted box-shaped logic frame outer gates generally hinged along one vertical edge could swung open provide access fixed inner gates larger machines could one frame bolted together produce final unit multi-frame central processing unit cpu smaller system/360 models used basic operating system/360 bos/360 tape operating system tos/360 disk operating system/360 dos/360 evolved dos/vs dos/vse vse/af vse/sp vse/esa z/vse larger models used operating system/360 os/360 ibm developed several versions os/360 increasingly powerful features primary control program pcp multiprogramming fixed number tasks mft multiprogramming variable number tasks mvt mvt took long time develop usable system less ambitious mft widely used pcp used intermediate machines final releases os/360 included mft mvt system/370 later machines mft evolved os/vs1 mvt evolved os/vs2 svs single virtual storage various versions mvs multiple virtual storage culminating current z/os announced model 67 august 1965 ibm also announced tss/360 time-sharing system delivery time 67 tss/360 response multics ambitious project included many advanced features performance problems delayed canceled reinstated finally canceled 1971 customers migrated cp-67 mts michigan terminal system tso time sharing option os/360 one several time-sharing systems cp-67 original virtual machine system also known cp/cms cp/67 developed outside ibm mainstream ibm cambridge scientific center cooperation mit researchers cp/cms eventually wide acceptance led development vm/370 virtual machine primary interactive sub operating system known vm/cms conversational monitoring system evolved today z/vm model 20 offered simplified rarely used tape-based system called tps tape processing system dps disk processing system provided support 2311 disk drive tps could run machine 8 kb memory dps required 12 kb pretty hefty model 20 many customers ran quite happily 4 kb cps card processing system tps dps card reader used read job control language cards defined stack jobs run read transaction data customer payments operating system held tape disk results could also stored tapes hard drives stacked job processing became exciting possibility small adventurous computer user little-known little-used suite 80-column punched-card utility programs known basic programming support bps jocularly barely programming support precursor tos available smaller systems ibm created new naming system new components created system/360 although well-known old names like ibm 1403 ibm 1052 retained new naming system components given four-digit numbers starting 2 second digit described type component follows ibm developed new family peripheral equipment system/360 carrying older 1400 series interfaces standardized allowing greater flexibility mix match processors controllers peripherals earlier product lines addition system/360 computers could use certain peripherals originally developed earlier computers earlier peripherals used different numbering system ibm 1403 chain printer 1403 extremely reliable device already earned reputation workhorse sold 1403-n1 adapted system/360 also available optical character recognition ocr readers ibm 1287 ibm 1288 could read alpha numeric a/n numeric hand printed nhp/nhw characters cashier rolls tape full legal size pages time done large optical/logic readers software slow expensive time small systems sold ibm 1052-7 console typewriter tightly integrated cpu — keyboard would physically lock program control certain high-end machines could optionally purchased 2250 graphical display costing upwards us 100,000 360/85 used 5450 display console compatible anything else line later 3066 console 370/165 370/168 used basic display design 360/85 first disk drives system/360 ibm 2302s ibm 2311s 156 kb/second 2302 based earlier 1302 available model 3 two 112.79 mb modules model 4 four modules 2311 removable 1316 disk pack based ibm 1311 theoretical capacity 7.2 mb although actual capacity varied record design used 360/20 1316 pack formatted fixed-length 270 byte sectors giving maximum capacity 5.4mb 1966 first 2314s shipped device eight usable disk drives integral control unit nine drives one reserved spare drive used removable 2316 disk pack capacity nearly 28 mb disk packs 2311 2314 physically large today standards — e.g. 1316 disk pack diameter six platters stacked central spindle top bottom outside platters store data data recorded inner sides top bottom platters sides inner platters providing 10 recording surfaces 10 read/write heads moved together across surfaces platters formatted 203 concentric tracks reduce amount head movement seeking data written virtual cylinder inside top platter inside bottom platter disks usually formatted fixed-sized sectors today hard drives though done cp/cms rather system/360 i/o software could customize length data record variable-length records case magnetic tapes powerful early system/360s used high-speed head-per-track drum storage devices 3,500 rpm 2301 replaced 7320 part original system/360 announcement capacity 4 mb 303.8 kb/second ibm 2303 announced january 31 1966 capacity 3.913 mb drums announced system/360 system/370 niche later filled fixed-head disks 6,000 rpm 2305 appeared 1970 capacities 5 mb 2305-1 11 mb 2305-2 per module although devices large capacity speed transfer rates made attractive high-performance needs typical use overlay linkage e.g os application subroutines program sections written alternate memory regions fixed head disks drums particularly effective paging devices early virtual memory systems 2305 although often called drum actually head-per-track disk device 12 recording surfaces data transfer rate 3 mb per second rarely seen ibm 2321 data cell mechanically complex device contained multiple magnetic strips hold data strips could randomly accessed placed upon cylinder-shaped drum read/write operations returned internal storage cartridge ibm data cell noodle picker among several ibm trademarked speedy mass online direct-access storage peripherals reincarnated recent years virtual tape automated tape librarian peripherals 2321 file capacity 400 mb time 2311 disk drive 7.2 mb ibm data cell proposed fill cost/capacity/speed gap magnetic tapes—which high capacity relatively low cost per stored byte—and disks higher expense per byte installations also found electromechanical operation less dependable opted less mechanical forms direct-access storage model 44 unique offering integrated single-disk drive standard feature drive used 2315 ramkit cartridge provided 1,171,200 bytes storage 2400 tape drives consisted combined drive control unit plus individual 1/2 tape drives attached system/360 ibm switched ibm 7 track 9 track tape format 2400 drives could purchased read wrote 7-track tapes compatibility older ibm 729 tape drives 1967 slower cheaper pair tape drives integrated control unit introduced 2415 1968 ibm 2420 tape system released offering much higher data rates self-threading tape operation 1600bpi packing density remained product line 1979 despite sold leased large numbers mainframe system era system/360 computers remain mainly non-operating property museums collectors examples existing systems include running list remaining system/360s found world inventory remaining system/360 cpus gallery shows operator console register value lamps toggle switches middle pictures emergency pull switch upper right pictures various models us television series mad men 2007–2015 ibm 360 featured plot device company leased system advertising agency prominent background seventh season crowdfunding campaign rescuing restoring ibm 360 system nuremberg received successful funding | [
5012,
7167,
7533,
7541,
2567,
5396,
4336,
6464,
1867,
6838,
1879,
4361,
6849,
4366,
5784,
3339,
6511,
6514,
467,
810,
4397,
1180,
7264,
1556,
4421,
839,
1570,
4428,
6922,
6213,
4089,
3748,
1237,
2350,
1992,
1994,
2717,
4847,
8066,
5571,
... | Test |
7,332 | 7 | Openbravo:openbravo openbravo cloud-based software provider specialized retail solutions head office openbravo s.l located pamplona spain openbravo also offices barcelona paris mexico df kolkata company main product openbravo commerce cloud cloud-based pos retail management solution worldwide distribution implementations software openbravo relies heavily partner network openbravo multiple-time winner infoworld bossie award best open source software application last awarded august 2014 openbravo roots development business administration software first developed two employees university navarra nicolas serrano ismael ciordia involved mid 1990s developing management university used emerging internet technologies work subsequently introduced new approach web applications concept realized new company called tecnicia founded august 2001 serrano ciordia aguinaga 2005 two management consultants manel sarasa josep mitjá asked venture capital company evaluate tecnicia prepare business plan evolution 2006 two consultants joined tecnicia ceo coo respectively around time spanish investment company sodena invested 6.4 million usd development company 2006 company renamed openbravo first product launched openbravo erp code open-sourced april year 2007 company announced acquisition librepos java-based point-of-sale pos application retail hospitality businesses librepos rebranded openbravo pos openbravo java pos may 2008 openbravo attracted three investors amadeus uk gimv belgium adara spain second investment round totalling 12.5 million usd investment launched openbravo one leading open source companies substantial resources develop products services july 2012 openbravo launched openbravo retail vertical solution retail industry including openbravo web pos new pos solution replaced previous openbravo java pos openbravo web pos web mobile responsive pos solution march 2014 openbravo erp renamed openbravo erp platform openbravo retail renamed openbravo commerce platform may 2015 openbravo commerce platform openbravo erp platform renamed openbravo commerce suite openbravo business suite openbravo announces strategic focus retail openbravo also launches openbravo subscription management recurring billing specialized solution recurring transactions based revenue models openbravo present 60 countries global partner network openbravo targets today mid-sized large organizations seeking complete solution manage entire business specific solutions help improve existing legacy systems openbravo focuses strategy retail openbravo commerce suite openbravo erp first product launched openbravo web-based erp business solution small medium-sized companies released openbravo public license based mozilla public license model program originally based compiere erp program also open source released gnu general public license version 2 program among top ten active projects sourceforge january 2008 using openbravo erp organizations automate register common business processes following processes supported sales procurement manufacturing projects finance mrp numerous commercial extensions available openbravo exchange procured users commercial edition openbravo erp paid-for version offers additional functionality compared free community edition integrated administration tools non-technical tool updates upgrades access openbravo exchange service level agreement characteristic openbravo erp application green web interface users maintain company data web-browser openbravo also create export reports data several formats pdf microsoft excel openbravo java-based architecture focuses two development models two models allow integration programs simple interface application open standards openbravo erp integrated open source applications like magento webshop pentaho business intelligence processmaker bpm liferay portal sugarcrm march 2014 openbravo erp renamed openbravo erp platform changed openbravo business suite may 2015 openbravo pos first pos solution offered openbravo java point-of-sale pos application retail hospitality businesses application came existence called tinapos legal reasons application renamed librepos 2007 librepos acquired openbravo known current name program completely integrated openbravo erp integration possible update stock levels financial journals customer data directly central database pos sales executed stores openbravo pos applied using pdas order intake july 2012 openbravo launched new pos solution openbravo web pos included openbravo commerce suite replaced openbravo java pos openbravo business suite launched may 2015 replacing previous openbravo erp platform global management solution built top openbravo technology platform including horizontal erp crm bi functionality across industries see latest confirmed stable cs release business suite release notes openbravo commerce suite openbravo solution retailers multi-channel retail management solution including responsive web mobile pos openbravo web pos backed comprehensive functionality merchandise management supply chain management enterprise management see latest confirmed stable cs release openbravo commerce suite release notes openbravo web pos launched 2012 included openbravo retail solution today openbravo commerce suite responsive web mobile pos solution core component functionality physical stores openbravo technology platform lies heart openbravo solutions modular mobile-enabled cloud-ready platform providing core set technologies allow extending openbravo fit companies needs developing completely new enterprise solutions looking best html5 framework openbravo mobile decided choose enyo openbravo web pos mobile solution openbravo analytics embedded analytics engine provides business intelligence capabilities openbravo solutions provides infrastructure necessary create analytical cubes olap reports combines power high performing open source business intelligence components pentaho use mondrian saiku allied openbravo user interface provide fully integrated analytics solution commercial solution companies recurring billing revenue models including functionality pricing definition automatic revenue recognition accounting openbravo user interface available multiple languages like english spanish french italian brazilian amongst others openbravo solutions distributed subscription-based model customers subscribe number users and/or pos terminals bundled pack services additional options two different commercial editions customers subscribe additional users and/or pos terminals well additional functionality packaged extension modules examples extension modules country localizations connectors like sugarcrm tools developed openbravo partners addition commercial editions community edition exists free limited set capabilities available without professional support available openbravo partners openbravo products distributed following licenses openbravo many partners across world including exceloid soft systems india | [
3668,
7766,
4256,
1115,
5258,
7332,
696,
1165
] | Test |
7,333 | 9 | Scope_(computer_science):scope computer science computer programming scope name binding – association name entity variable – region computer program binding valid name used refer entity region referred parts program name may refer different entity may different binding nothing may unbound scope binding also known visibility entity particularly older technical literature – perspective referenced entity referencing name scope part program scope set bindings – precise definition tricky casual use practice largely corresponds block function file depending language type entity term scope also used refer set entities visible names valid within portion program given point program correctly referred context environment strictly speaking practice programming languages part program refers portion source code area text known lexical scope languages however part program refers portion run time time period execution known dynamic scope terms somewhat misleading – misuse technical terms discussed definition – distinction accurate precise standard respective terms lexical scope main focus article dynamic scope understood contrast lexical scope cases name resolution based lexical scope relatively straightforward use implement use one read backwards source code determine entity name refers implementation one maintain list names contexts compiling interpreting program difficulties arise name masking forward declarations hoisting considerably subtler ones arise non-local variables particularly closures strict definition lexical scope name identifier unambiguous – portion source code binding name entity applies – virtually unchanged 1960 definition specification algol 60 representative language specification follow commonly scope refers given name refer given variable – declaration effect – also apply entities functions types classes labels constants enumerations fundamental distinction scoping part program means languages lexical scope also called static scope name resolution depends location source code lexical context defined named variable function defined contrast languages dynamic scope name resolution depends upon program state name encountered determined execution context calling context practice lexical scope variable definition resolved searching containing block function fails searching outer containing block whereas dynamic scope calling function searched function called calling function progressing call stack course rules first look local definition variable modern languages use lexical scoping variables functions though dynamic scoping used languages notably dialects lisp scripting languages template languages perl 5 offers lexical dynamic scoping even lexically scoped languages scope closures confusing uninitiated depend lexical context closure defined called lexical resolution determined compile time also known early binding dynamic resolution general determined run time thus known late binding object-oriented programming dynamic dispatch selects object method runtime though whether actual name binding done compile time run time depends language de facto dynamic scoping common macro languages directly name resolution instead expand place programming frameworks like angularjs use term scope mean something entirely different used article frameworks scope object programming language use javascript case angularjs used certain ways framework emulate dynamic scope language uses lexical scope variables angularjs scopes scope scope using usual meaning term given part program following usual rules variable scope language like object using inheritance transclusion rules context angularjs sometimes term scope dollar sign used avoid confusion using dollar sign variable names often discouraged style guides scope important component name resolution turn fundamental language semantics name resolution including scope varies programming languages within programming language varies type entity rules scope called scope rules scoping rules together namespaces scoping rules crucial modular programming change one part program break unrelated part discussing scope three basic concepts scope extent context scope context particular frequently confused scope property identifier fixed context property program varies position precisely context property position program either position source code lexical context point run time execution context runtime context calling context execution context consists lexical context current execution point plus additional runtime state call stack thus execution point program variable name scope variable name context meaning context point execution point exits variable name scope returning function variable name goes context narrowly speaking execution program enters exits various scopes point execution identifiers context context hence identifiers come context go context program enters exits scope – however practice usage much looser scope source-code level concept property identifiers particularly variable function names – identifiers source code references entities program – part behavior compiler interpreter language issues scope similar pointers type reference used programs generally using value variable name context variable uninitialized analogous dereferencing accessing value wild pointer undefined however variables destroyed go context analog dangling pointer exist entities variables scope subset lifetime also known extent – name refer variable exists possibly undefined value variables exist necessarily visible variable may exist inaccessible value stored referred within given context accessible via given name case context program scope name cases lifetime irrelevant – label named position source code lifetime identical program statically compiled languages may context given point program likewise static variables – static global variable context entire program static local variable context within function local context lifetime entire run program determining entity identifier refers known name resolution name binding particularly object-oriented programming varies languages given identifier language properly compiler interpreter checks entities context matches case ambiguity two entities name global local variable name name resolution rules used distinguish frequently name resolution relies inner-to-outer rule python legb local enclosing global built-in rule names implicitly resolves narrowest relevant context cases name resolution explicitly specified codice_1 codice_2 keywords python cases default rules overridden two identical identifiers context time referring different entities one says name masking occurring higher-priority name usually innermost masking lower-priority name level variables known variable shadowing due potential logic errors masking languages disallow discourage masking raising error warning compile time run time various programming languages various different scoping rules different kinds declarations identifiers scoping rules large effect language semantics consequently behavior correctness programs languages like c++ accessing unbound variable well-defined semantics may result undefined behavior similar referring dangling pointer declarations identifiers used outside scope generate syntax errors scopes frequently tied language constructs determined implicitly many languages also offer constructs specifically controlling scope scope vary little single expression much entire program many possible gradations simplest scoping rule global scope – entities visible throughout entire program basic modular scoping rule two-level scoping global scope anywhere program local scope within function sophisticated modular programming allows separate module scope names visible within module private module visible outside within function languages c allow block scope restrict scope subset function others notably functional languages allow expression scope restrict scope single expression scopes include file scope notably c functions similarly module scope block scope outside functions notably perl subtle issue exactly scope begins ends languages c scope starts declaration thus different names declared within given block different scopes requires declaring functions use though necessarily defining requires forward declaration cases notably mutual recursion languages javascript python name scope begins start relevant block start function regardless defined names within given block scope javascript known variable hoisting however name bound value varies behavior in-context names undefined value differs python use undefined variables yields runtime error javascript undefined variables usable undefined value function declarations also hoisted top containing function usable throughout function many languages especially functional languages offer feature called let-expressions allow declaration scope single expression convenient example intermediate value needed computation example standard ml codice_3 returns 12 codice_4 expression evaluates 144 using temporary variable named x avoid calling codice_3 twice languages block scope approximate functionality offering syntax block embedded expression example aforementioned standard ml expression could written perl gnu c python auxiliary variables generator expressions list comprehensions python 3 expression scope c variable names function prototype expression scope known context function protocol scope variable names prototype referred may different actual definition – dummies – often omitted though may used generating documentation instance many block-structured programming languages allow scope restricted block known block scope began algol 60 e declaration ... valid block today particularly associated languages pascal c families traditions often block contained within function thus restricting scope part function cases perl block may within function representative example use block scope c code shown two variables scoped loop loop variable n initialized incremented iteration loop auxiliary variable n_squared initialized iteration purpose avoid adding variables function scope relevant particular block – example prevents errors generic loop variable accidentally already set another value example expression codice_6 would generally assigned auxiliary variable body loop would simply written codice_7 complicated examples auxiliary variables useful blocks primarily used control flow loops cases block scope means scope variable depends structure function flow execution however languages block scope typically also allow use naked blocks whose sole purpose allow fine-grained control variable scope example auxiliary variable may defined block used say added variable function scope discarded block ends loop might enclosed block initializes variables used inside loop initialized subtlety several programming languages algol 68 c demonstrated example standardized since c99 block-scope variables declared within body block also within control statement analogous function parameters declared function declaration block function body starts scope whole function body primarily used loops initialization statement separate loop condition unlike loops common idiom block scope used shadowing example inside block auxiliary variable could also called n shadowing parameter name considered poor style due potential errors furthermore descendants c java c despite support block scope local variable made go scope end function allow one local variable hide another languages attempted declaration second n would result syntax error one n variables would renamed block used set value variable block scope requires variable declared outside block complicates use conditional statements single assignment example python use block scope one may initialize variable codice_8 accessible codice_9 statement perl block scope instead requires declaring variable prior block often instead rewritten using multiple assignment initializing variable default value python necessary would perl would case single variable assignment alternative use ternary operator avoid block general possible multiple variable assignments difficult read complex logic significant issue c notably string assignment string initialization automatically allocate memory string assignment already initialized variable requires allocating memory string copy checking successful languages allow concept block scope applied varying extents outside function example perl snippet right counter variable name block scope due use keyword increment_counter function name global scope call increment_counter increase value counter one return new value code outside block call increment_counter otherwise obtain alter value counter idiom allows one define closures perl commonly used programming languages offer way create local variable function subroutine variable whose scope ends goes context function returns cases lifetime variable duration function call – automatic variable created function starts variable declared destroyed function returns – scope variable within function though meaning within depends whether scoping lexical dynamic however languages c also provide static local variables lifetime variable entire lifetime program variable context inside function case static local variables variable created program initializes destroyed program terminates static global variable context within function like automatic local variable importantly lexical scoping variable function scope scope within lexical context function moves context another function called within function moves back context function returns – called functions access local variables calling functions local variables context within body function declared contrast dynamic scoping scope extends runtime context function local variables stay context another function called moving context defining function ends thus local variables context function defined called functions languages lexical scoping nested functions local variables context nested functions since within lexical context functions lexically nested local variable enclosing function known non-local variable nested function function scope also applicable anonymous functions example snippet python code right two functions defined square sum_of_squares square computes square number sum_of_squares computes sum squares number example square 4 4 16 sum_of_squares 4 0 1 2 3 4 30 functions variable named n represents argument function two n variables completely separate unrelated despite name lexically scoped local variables function scope one scope lexically separate function thus n't overlap therefore sum_of_squares call square without n altered similarly sum_of_squares variables named total variables limited scope interfere variables named total might belong function words risk name collision identifiers unrelated identifiers even identical note also name masking occurring one variable named n context given time scopes overlap contrast similar fragment written language dynamic scope n calling function would remain context called function – scopes would overlap – would masked shadowed new n called function function scope significantly complicated functions first-class objects created locally function returned case variables nested function local unbound variables function definition resolve variables enclosing context create closure function also environment variables must returned potentially called different context requires significantly support compiler complicate program analysis scoping rule largely particular c c++ file scope scope variables functions declared top level file within function entire file – rather c declaration end source file precisely translation unit internal linking seen form module scope modules identified files modern languages replaced explicit module scope due presence include statements add variables functions internal context may call include statements difficult determine context body file c code snippet function name sum_of_squares file scope modular programming scope name entire module however may structured across various files paradigm modules basic unit complex program allow information hiding exposing limited interface module scope pioneered modula family languages python influenced modula representative contemporary example object-oriented programming languages lack direct support modules c++ similar structure instead provided class hierarchy classes basic unit program class private methods properly understood context dynamic dispatch rather name resolution scope though often play analogous roles cases facilities available python modules classes code organization module-level function conventionally private method choice programmer declaration global scope effect throughout entire program variable names global scope — called global variables — frequently considered bad practice least languages due possibility name collisions unintentional masking together poor modularity function scope block scope considered preferable however global scope typically used depending language various sorts identifiers names functions names classes data types cases mechanisms namespaces used avoid collisions use local variables — variable names limited scope exist within specific function — helps avoid risk name collision two identically named variables however two different approaches answering question mean within function lexical scoping lexical scope also called static scoping static scope variable name scope certain function scope program text function definition within text variable name exists bound variable value outside text variable name exist contrast dynamic scoping dynamic scope variable name scope certain function scope time-period function executing function running variable name exists bound value function returns variable name exist means function f invokes separately defined function g lexical scoping function g access f local variables assuming text g inside text f dynamic scoping function g access f local variables since g invoked invocation f consider example program right first line creates global variable x initializes 1 second line defines function g prints echoes current value x sets x 2 overwriting previous value third line defines function f creates local variable x hiding identically named global variable initializes 3 calls g. fourth line calls f. fifth line prints current value x exactly program print depends scoping rules language program one uses lexical scoping g prints modifies global variable x g defined outside f program prints 1 2 contrast language uses dynamic scoping g prints modifies f local variable x g called within f program prints 3 1 happens language program bash uses dynamic scoping program prints 3 1 lexical scope name always refers less local lexical environment property program text made independent runtime call stack language implementation matching requires analysis static program text type scoping also called static scoping lexical scoping standard algol-based languages pascal modula-2 ada well modern functional languages ml haskell also used c language syntactic semantic relatives although different kinds limitations static scoping allows programmer reason object references parameters variables constants types functions etc simple name substitutions makes much easier make modular code reason since local naming structure understood isolation contrast dynamic scope forces programmer anticipate possible dynamic contexts module code may invoked example consider pascal program fragment right variable codice_10 visible points never hidden another variable name codice_11 variable codice_12 visible main program hidden codice_13 variable codice_12 visible procedure codice_15 codice_16 variable codice_17 also visible procedure codice_15 codice_16 hide variable variable codice_20 visible procedure codice_16 therefore accessible either procedure codice_15 main program also procedure codice_16 visible procedure codice_15 therefore called main program could another procedure codice_16 declared program outside procedure codice_15 place program codice_16 mentioned determines two procedures named codice_16 represents thus precisely analogous scope variables correct implementation static scope languages first-class nested functions trivial requires function value carry record values variables depends pair function environment called closure depending implementation computer architecture variable lookup may become slightly inefficient deeply lexically nested functions used although well-known techniques mitigate also nested functions refer arguments immediately local variables relative locations known compile time overhead therefore incurred using type nested function applies particular parts program nested functions used naturally programs written language nested functions available c language lexical scoping used algol picked languages since deep binding approximates static lexical scoping introduced lisp 1.5 via funarg device developed steve russell working john mccarthy original lisp interpreter 1960 early lisps used dynamic scoping descendants dynamically scoped languages often adopt static scoping common lisp scheme srfi 15 dynamic static scoping perl another language dynamic scoping added static scoping afterwards languages like pascal c always lexical scoping since influenced ideas went algol 60 although c include lexically nested functions term lexical scope dates least 1967 term lexical scoping dates least 1970 used project mac describe scoping rules lisp dialect mdl known muddle dynamic scope global identifier refers identifier associated recent environment uncommon modern languages technical terms means identifier global stack bindings introducing local variable name codice_29 pushes binding onto global codice_29 stack may empty popped control flow leaves scope evaluating codice_29 context always yields top binding note done compile-time binding stack exists run-time type scoping called dynamic scoping generally certain blocks defined create bindings whose lifetime execution time block adds features static scoping dynamic scoping process however since section code called many different locations situations difficult determine outset bindings apply variable used one exists beneficial application principle least knowledge suggests code avoid depending reasons circumstances variable value simply use value according variable definition narrow interpretation shared data provide flexible system adapting behavior function current state policy system however benefit relies careful documentation variables used way well careful avoidance assumptions variable behavior provide mechanism detect interference different parts program dynamic scoping also voids benefits referential transparency dynamic scoping dangerous modern languages use languages like perl common lisp allow programmer choose static dynamic scoping defining redefining variable examples languages use dynamic scoping include logo emacs lisp latex shell languages bash dash powershell dynamic scoping fairly easy implement find identifier value program could traverse runtime stack checking activation record function stack frame value identifier practice made efficient via use association list stack name/value pairs pairs pushed onto stack whenever declarations made popped whenever variables go scope shallow binding alternative strategy considerably faster making use central reference table associates name stack meanings avoids linear search run-time find particular name care taken properly maintain table note strategies assume last-in-first-out lifo ordering bindings one variable practice bindings ordered even simpler implementation representation dynamic variables simple global variables local binding performed saving original value anonymous location stack invisible program binding scope terminates original value restored location fact dynamic scope originated manner early implementations lisp used obvious strategy implementing local variables practice survives dialects still use gnu emacs lisp lexical scope introduced lisp later equivalent shallow binding scheme except central reference table simply global variable binding environment current meaning variable global value maintaining global variables n't complex instance symbol object dedicated slot global value dynamic scoping provides excellent abstraction thread local storage used way based saving restoring global variable possible implementation strategy variable thread-local key variable accessed thread-local key used access thread-local memory location code generated compiler knows variables dynamic lexical thread-local key exist calling thread global location used variable locally bound prior value stored hidden location stack thread-local storage created variable key new value stored nested overrides variable within thread simply save restore thread-local location initial outer-most override scope terminates thread-local key deleted exposing global version variable thread modern languages macro expansion preprocessor key example de facto dynamic scope macro language transforms source code without resolving names since expansion done place names expanded text resolved notably free variables resolved based expanded loosely called dynamic scoping occurring c preprocessor used macro expansion de facto dynamic scope name resolution example macro expand add codice_8 passed variable identifier later resolved compiler based macro codice_33 called properly expanded dynamic scope independent macro defined properly c preprocessor lexical analysis expanding macro tokenization stage parsing syntax tree name resolution example following code codice_8 macro resolved expansion local variable expansion site seen one key reasons scope helps prevent name collisions allowing identical identifiers refer distinct things restriction identifiers must separate scopes sometimes restriction inconvenient many different things need accessible throughout program generally need identifiers global scope different techniques required avoid name collisions address many languages offer mechanisms organizing global identifiers details mechanisms terms used depend language general idea group identifiers given name — prefix — necessary entity referred qualified identifier consisting identifier plus prefix normally identifiers sense two sets scopes scope usually global scope qualified identifier visible one narrower scopes unqualified identifier without prefix visible well normally groups organized groups nested although many languages support concept details vary greatly languages mechanisms namespaces c++ c serve almost exclusively enable global identifiers organized groups languages mechanisms packages ada structures standard ml combine additional purpose allowing identifiers visible members group object-oriented languages often allow classes singleton objects fulfill purpose whether also mechanism primary purpose furthermore languages often meld approaches example perl packages largely similar c++ namespaces optionally double classes object-oriented programming java organizes variables functions classes organizes classes ada-like packages scoping rules representative languages follow c scope traditionally known linkage visibility particularly variables c lexically scoped language global scope known external linkage form module scope file scope known internal linkage local scope within function within function scopes nested via block scope however standard c support nested functions lifetime visibility variable determined storage class three types lifetimes c static program execution automatic block execution allocated stack manual allocated heap static automatic supported variables handled compiler manually allocated memory must tracked manually across different variables three levels visibility c external linkage global internal linkage roughly file block scope includes functions block scopes nested different levels internal linkage possible use includes internal linkage c visibility translation unit level namely source file processed c preprocessor notably including relevant includes c programs compiled separate object files linked executable library via linker thus name resolution split across compiler resolves names within translation unit loosely compilation unit properly different concept linker resolves names across translation units see linkage discussion c variables block scope enter scope declared top block move scope non-nested function called within block move back scope function returns move scope end block case automatic local variables also allocated declaration deallocated end block static local variables allocated program initialization deallocated program termination following program demonstrates variable block scope coming scope partway block exiting scope fact deallocated block ends program outputs levels scope c. variable names used function prototype function prototype visibility exit scope end function prototype since name used useful compilation may useful documentation label names goto statement function scope case label names switch statements block scope block switch variables intend use program must declared type specifier earlier point code like previous code beginning body function main declared b result type int variable either global local scope global variable variable declared main body source code outside functions local variable one declared within body function block modern versions allow nested lexical scoping go lexically scoped using blocks java lexically scoped java class contain three types variables local variables defined inside method particular block variables local defined lower levels example loop inside method use method local variables way around loop variables local loop destroyed soon loop ends member variables also called fields variables declared within class outside method default variables available methods within class also classes package parameters variables method declarations general set brackets defines particular scope variables top level within class differ behavior depending modifier keywords used definition following table shows access members permitted modifier javascript simple scoping rules variable initialization name resolution rules cause problems widespread use closures callbacks means lexical environment function defined used name resolution different lexical environment called irrelevant name resolution javascript objects name resolution properties separate topic javascript lexical scoping nested function level global scope outermost scope scoping used variables functions meaning function declarations opposed variables function type block scoping codice_35 codice_36 keywords standard since ecmascript 6 block scoping produced wrapping entire block function executing known immediately-invoked function expression iife pattern javascript scoping simple – lexical function-level – associated initialization name resolution rules cause confusion firstly assignment name scope defaults creating new global variable local one secondly create new local variable one must use codice_37 keyword variable created top function value codice_38 variable assigned value assignment expression reached known variable hoisting – declaration initialization hoisted top function thirdly accessing variables initialization yields codice_38 rather syntax error fourthly function declarations declaration initialization hoisted top function unlike variable initialization example following code produces dialog output samp undefined /samp local variable declaration hoisted shadowing global variable initialization variable undefined used functions first-class objects javascript frequently assigned callbacks returned functions function executed name resolution depends originally defined lexical environment definition lexical environment execution environment called nested scopes particular function global local javascript particularly closure used callback sometimes referred scope chain analogy prototype chain object closures produced javascript using nested functions functions first-class objects returning nested function enclosing function includes local variables enclosing function non-local lexical environment returned function yielding closure example closures frequently used javascript due used callbacks indeed hooking function local environment callback returning function creates closure unbound variables function body environment closure based nested scopes current lexical environment scope chain may accidental creating callback based parameters parameters must stored closure otherwise accidentally create closure refers variables enclosing environment may change name resolution properties javascript objects based inheritance prototype tree – path root tree called prototype chain – separate name resolution variables functions lisp dialects various rules scoping original lisp used dynamic scoping scheme inspired algol introduced static lexical scoping lisp family maclisp used dynamic scope default interpreter lexical scope default compiled code though compiled code could access dynamic bindings use codice_40 declarations particular variables however maclisp treated lexical binding optimization one would expect modern languages come closure feature one might expect lexical scoping modern lisps separate operation codice_41 available somewhat clumsily work around issue common lisp adopted lexical scoping scheme clojure islisp lexical scoping ordinary variables also dynamic variables cases explicitly marked must defined codice_42 special form bound codice_43 special form accessed explicit codice_44 special form dialects lisp like emacs lisp still use dynamic scoping default emacs lisp lexical scoping available per-buffer basis variables python function scope module scope global scope names enter scope start context function module globally exit scope non-nested function called context ends name used prior variable initialization raises runtime exception variable simply accessed assigned context name resolution follows legb rule local enclosing global built-in however variable assigned defaults creating local variable scope entire context rules overridden codice_1 codice_2 python 3 declaration prior use allows accessing global variables even intervening nonlocal variable assigning global nonlocal variables simple example function resolves variable global scope note x initialized codice_47 called error raised even though declared codice_47 declared lexically forward reference allowed python assignment creates new local variable change value global variable assignment variable within function causes declared local function hence local variable scope entire function thus using prior assignment raises error differs c local variable scope declaration entire function code raises error default name resolution rules overridden codice_1 codice_2 python 3 keywords code codice_51 declaration codice_52 means x resolves global variable thus accessed already initialized assignment assigns global variable rather declaring new local variable note codice_1 declaration needed codice_47 – since assign variable defaults resolving global variable codice_1 also used nested functions addition allowing assignment global variable unnested function also used access global variable presence nonlocal variable nested functions also codice_2 declaration assigning nonlocal variable similar using codice_1 unnested function r lexically scoped language unlike implementations values free variables determined set global variables r determined environment function created scoping environments may accessed using variety features codice_58 simulate experience dynamic scoping programmer desire block scoping functions access environment scope created variables created modified within function stay variables created modified within function stay unless assignment enclosing environment scope explicitly requested although r lexical scoping default function scopes changed | [
3931,
7878,
4662,
1445,
4302,
5731,
6428,
383,
1478,
4704,
6116,
6118,
1114,
2600,
3659,
790,
6167,
6172,
4039,
3368,
6186,
4053,
1557,
486,
2661,
5494,
4425,
4070,
6210,
4432,
5855,
6922,
5510,
5164,
7298,
5515,
8025,
3410,
2348,
3749,
... | Test |
7,334 | 1 | SAP_IQ:sap iq sap iq formerly known sap sybase iq sybase iq iq intelligent query column-based petabyte scale relational database software system used business intelligence data warehousing data marts produced sybase inc. sap company primary function analyze large amounts data low-cost highly available environment sap iq often credited pioneering commercialization column-store technology foundation sap iq lies column store technology allows speed compression ad-hoc analysis sap iq open interface approach towards ecosystem sap iq also integrated sap ’ business intelligence portfolio products form end-to-end business analytics software stack integral component sap in-memory data fabric architecture data management platform early 1990s waltham massachusetts-based expressway technologies inc. developed expressway 103 column-based engine optimized analytics would eventually become sybase iq sybase acquired expressway re-introduced product 1995 iq accelerator renamed shortly thereafter sybase iq giving version number 11.0 offering iq product part collection related technologies often found data warehouse including sybase adaptive server enterprise replication server powerdesigner powerdesigner sql anywhere sybase became one first mainstream companies acknowledge need specialized products data warehouse market version 12.0 sybase replaced loosely coupled query interface adaptive server enterprise tight coupling sql anywhere version 16 brings re-engineered column store extreme petabyte scale data volumes extreme data compression 2014 sap hana together partners bmmsoft hp intel netapp red hat announced world ’ largest data warehouse team engineers sap bmmsoft hp intel netapp red hat built data warehouse using sap hana sap iq 16 bmmsoft federated edmt running hp dl580 servers using intel xeon e7-4870 processors red hat enterprise linux 6 netapp fas6290 e5460 storage development testing 12.1pb data warehouse conducted sap/intel petascale lab santa clara calif. audited infosizing independent transaction processing council certified auditor release sp08 version numbers changed align match sap hana ’ version numbers reflect product ’ continuous integration sap hana actual release title sp03 follow-on sp02 covering platforms affected release sap ’ new approach streamlines simplifies data warehousing in-memory data fabric advent big data sap iq coupled sap hana deliver distributed in-memory analytics platform three main applications use cases try capitalize sap iq ’ strengths concerning scalability performance edw big data processor leveraging sap hana ’ in-memory speed operational reporting https //blogs.sap.com/2016/10/12/sap-nls-solution-sap-bw scenario sap enterprise resource planning erp data goes sap hana acts operational data store immediate analysis data analyzed integrated sap iq via near-line storage mechanisms described sap iq acts enterprise data warehouse receives data variety traditional sources oltp databases files systems sap hana operational data store ods https //blogs.sap.com/2019/05/22/q-the-easy-installer-for-sap-iq/ sap iq used edw also augmented hana ’ in-memory technology common uses include planning analysis reports simultaneous oltp processing needed case data flows sap iq sap hana sap businessobjects bi used achieve visibility across platforms user sap iq looks like relational dbms sql-based language layer accessible via odbc/jdbc drivers however inside sybase iq column-oriented dbms stores data tables sections columns data rather rows data like transactional databases column-orientation number advantages search done items matching particular value column data storage objects corresponding data column within table need accessed traditional row-based database would read whole table top bottom another advantage indexed correctly value would stored row data traditional database stored sap iq n-bitindex used access data nbit tiered indexing used allow increased compression fast incremental batch loads additionally column-based storage enables sap iq compress data efficiently fly prior sap iq 16 data page structured array cells fixed size values data type storage approach efficient structured fixed length data hold unstructured variable sized data seen today combat storage inefficiency store variable sized data minimal wasted space page composed cells variable size packed tightly together column store architecture supports variable number cells per page various page formats within column sap iq also applies lempel-ziv-welch lzw compression algorithms data page written disk significantly reduce data volume bitmaps used secondary indexes sap iq massively parallel processing mpp framework based shared-everything environment supports distributed query processing products capable mpp tend based shared-nothing environments benefit shared-everything flexible terms variety queries optimized—especially balancing needs many concurrent users downside extreme cases competition among processors access shared pool storage usually storage-area network lead i/o contention affects query performance 12 however aforementioned storage architecture sap iq allows compute storage layers scale independently also allows resources provisioned on-demand better utilization without restructuring underlying database sap iq uses clustered grid architecture made clusters sap iq servers multiplex clusters used scale performance large numbers concurrent queries queries great complexity built upon shared-everything architecture compute nodes interact shared storage queries ability distribute across compute nodes multiplex coordinator node manages database catalog coordinates transactional writes store nodes reader nodes readers writes like coordinator node storage fabric implemented numerous technologies allow sharing amongst multiplex nodes architecture multiple uses including workload balancing elastic virtual data marts workload balancing achieved sap iq query engine dynamically increasing/decreasing parallelism response changes server activity automatic failover node stops participating query nodes pick work originally assigned failed node query complete client side compatibility external load balances ensures queries initiated physical servers balanced fashion eliminate bottlenecks physical nodes multiplex grouped together “ logical servers ” allow workloads isolated security resource balancing purposes machines added demand changes aim grid architecture enable resiliency even global transactions sap iq loading engine used incremental batch low latency concurrent loading bulk loading client server data files bulk loading process allows multiple load process occur simultaneously loads different tables data loaded databases well files page-level snapshot versioning allows concurrent loads queries locking occurring table level sap replication server enhanced optimize loads sap iq transactions compiled fewest set operations bulk micro-batch loads sap iq performed gives appearance real-time continuous loads bulk loader performs operations parallel make full use server cores remove bottlenecks keep threads productive instead serializing process loading process remains two-phase process first reading raw data creating fp indexes second creating secondary indexes everything executed parallel high group indexes query optimizer relies information columns/rows contain data values structured set tiers increasing move pyramid lastly sap iq introduces write-optimized row level versioned rlv delta store enables high-velocity data loads fast availability data users store minimally indexes compressed row-level locking concurrent write transaction log append acts companion main store data loaded high speed rlv store migrating main store later merging periodically user appear though two separate entities work queries operate transparently across two stores make use users specify particular “ hot ” database tables rlv tables sap iq offers query apis based pure ansi sql standards restrictions include olap full-text search support stored procedures supported ansi sql transact-sql dialects executed scheduled immediate basis well database drivers variety programming languages java c/c++m php perl python ruby ado.net sap iq analytics engine query structured unstructured data join results together sap iq introduced new text index sql “ contains ” clause facilitate searching terms within blob unstructured text sap sybase ’ partnerships vendors allow various binary forms text files ingested sap iq text indexes created text indexes get data ready higher level text analysis applications perform full-text searches within sap iq via select statements select syntax used applications performing tokenization categorization text analysis in-database analytics built upon fundamental concept keeping analytics algorithms close data higher performance extensibility framework called “ in-database analytics ” enables embedding analytic functions inside database engine sap iq moving analytics database instead specialized environment database process error prone slower pre-built functions available natively via partners sap iq providing specialized statistical data mining libraries plug sap iq framework increases sap iq ’ power advance processing analysis data moved database specialized environment analytics data results obtained shared though dbms easily acquired sql interface user defined functions udfs partners extend dbms custom computations providing specialized statistical data mining libraries plug right sap iq enhance performance advanced processing analysis sap iq provides several features included base product licensable separately help protect security user ’ data new feature introduced iq 16 role based access control rbac enables separation duties upholds principle least privilege allowing breakdown privileged operations fine-grained sets individually granted users included part base product users groups permissions database administration authorities user login policies database encryption transport-layer security ipv6 role-based access control database auditing additional features part licensable option called advanced security option fips encryption kerberos authentication ldap authentication database column encryption part ilm sap iq allows users create multiple user dbspaces logical units storage/containers database objects organizing data used separate structured unstructured data group together according age value partition table data dbspaces also marked read-only enable one-time consistency checking back-up another application ilm ability partition tables place moving portions along storage fabric backup capabilities enables storage management process data cycles tiered storage moving faster expensive storage slower cheaper storage ages partitioning data according value multiplex set-up provides scalability high availability compute nodes multiplex coordinator node failover alternate coordinator node sap iq virtual backup also allows users quickly backup data along storage replication technology data continuously copied backups occur quickly “ behind scenes ” virtual backups completed verified test restore enterprise data copied development testing ’ left complete backup transactionally consistent point time sap claims disaster recovery easier shared everything approach mpp sap sybase powerdesigner modelling tool enables users build ilm model deployed sap iq storage types dbspaces lifecycle phases defined ilm model tool used generate reports create partition creation movement scripts sap iq provides federation hadoop distributed file system hdfs popular framework big data enterprise users continue store data hadoop utilize benefits integration achieved four different ways depending user ’ needs client-side federation etl data query federation client-side federation joins data iq hadoop client application level etl federation lets user load hadoop data column store schemas iq hdfs data also joined iq data fly sql queries iq finally results mapreduce jobs combined iq data also fly sap control center replaces sybase central web-based graphical tool administration monitoring sap control center used monitoring sap sybase servers resources node multiplex location well monitoring performance spotting usage trends web application multi-tiered plug-in architecture made server product-based agents bring sap sybase performance back control center server sap iq comes web-enabled application drivers facilitating access sap iq variety web 2.0 programming execution environments python perl php .net ruby query federation databases developers build applications interact multiple data sources time well database platforms vendors federation proxy tables map tables external databases created materialized in-memory tables interacted though resided within sap iq way data sources combined unified view sap iq also supports plugging external algorithms written c++ java sql queries call algorithms allowing execution in-database analytics provides better performance scalability additionally sybase iq also provides drivers access via languages php perl python ruby rails sap iq supports major operating system platforms including sybase claims sybase iq currently installed 2000 customer sites notable customers include comscore inc. corelogic investment technology group itg u.s. internal revenue service irs sybase iq widely used focused data-mart-style deployments also deployed enterprise data warehouse | [
7788,
5983,
4759,
187,
7334,
2911,
900,
6029,
6462,
2680,
7570,
5419,
2872,
5965,
5711
] | Test |
7,335 | 2 | Metal_(API):metal api metal low-level low-overhead hardware-accelerated 3d graphic compute shader application programming interface api developed apple inc. debuted ios 8 metal combines functions similar opengl opencl one api intended bring ios macos tvos apps performance benefits similar apis platforms vulkan debuted mid-february 2016 directx 12 metal object-oriented api invoked using swift objective-c programming languages full-blown control metal framework well related metalkit framework accessible via metal unified graphics compute language according apple promotional materials metal c++ based programming language developers use write code executed gpu graphics general-purpose data-parallel computations since metal based c++ developers find familiar easy use metal graphics compute programs written single unified language allows tighter integration two metal available since june 2 2014 ios devices powered apple a7 later since june 8 2015 macs 2012 models later running os x el capitan june 5 2017 wwdc apple announced second version metal supported macos high sierra ios 11 tvos 11 metal 2 separate api metal supported hardware metal 2 enables efficient profiling debugging xcode accelerated machine learning lower cpu workload support virtual reality macos specificities apple a11 gpu particular ios tvos metal supports apple-designed socs apple a7 newer macos metal supports intel hd iris graphics hd 4000 series newer amd gcn-based gpus nvidia kepler-based gpus newer metal designed around principles modern graphics compute apis vulkan direct3d 12 instructions sent gpu command buffers obtained command queues metal improves capabilities gpgpu programming using compute shaders metal uses specific shading language based c++14 implemented using clang llvm metal better performance opengl several reasons points reduce amount work cpu required successfully execute commands gpu lead overall performance gain cpu used compute tasks according apple 148,000 applications use metal directly 1.7 million use high-level frameworks june 2017 presumably applications games ios notable macos games using metal rendering listed | [
6788,
3940,
713,
7890,
722,
4320,
2926,
4690,
734,
5752,
6832,
6125,
3989,
2954,
2597,
1123,
3322,
6847,
1502,
6142,
5781,
2609,
5786,
1895,
4740,
1897,
5091,
4749,
6505,
7601,
2627,
7609,
1171,
5109,
2284,
1178,
6188,
1187,
1940,
2300,
... | Train |
7,336 | 1 | Australian_Plant_Name_Index:australian plant name index australian plant name index apni online database published names australian vascular plants covers names whether current names synonyms invalid names includes bibliographic typification details information australian plant census including distribution state links resources specimen collection maps plant photographs facility notes comments aspects originally brainchild nancy tyson burbidge began four-volume printed work consisting 3,055 pages containing 60,000 plant names compiled arthur chapman part australian biological resources study abrs 1991 made available online database handed australian national botanic gardens two years later responsibility maintenance given newly formed centre plant biodiversity research recognised australian herbaria authoritative source australian plant nomenclature core component australia virtual herbarium collaborative project 10 million funding aimed providing integrated online access data specimen collections australia major herbaria two query interfaces offered | [
394,
845,
4602,
4598
] | Test |
7,337 | 9 | Microsoft_Visual_Programming_Language:microsoft visual programming language microsoft visual programming language mvpl visual programming dataflow programming language developed microsoft microsoft robotics studio microsoft visual programming language distinguished microsoft programming languages visual basic c microsoft language true visual programming language microsoft utilized term visual previous programming products reflect large degree development languages performed dragging dropping traditional wysiwyg fashion | [
1908
] | Test |
7,338 | 4 | Audio_injection:audio injection audio injection exploitation digital assistants amazon echo google home apple siri unwanted instructions third party services lack authentication reacting user commands making possible attackers issue activation words commands trigger execution desired actions injection results include fraud burglary data espionage takeover connected systems digital assistants require activation word trigger complete recording audio analysis spoken commands e.g ok google commands spoken natural language processed executed activation word different manufacturer often connected product ’ name possible product owner customize activation word meaning models react word processed language analyzed regards voice recognition authorization individual users result users audible range device authorizations trigger execute actions depending functionality actions range simple actions like music playback controlling lights security critical sensitive actions opening gates executing ordering chargeable transactions reading private information audio injection attacks performed remotely access audible area digital assistant restricted attacked increasing distance transmission either reached overcoming existent acoustic barriers e.g via vending opening momentary opened window via unusual loud playback via amplifiers loudspeakers approach possible control digital assistants rooms floors outside building digital assistants distinguish whether voice commands directly spoken reproduced loudspeaker system means attacks performed via devices support audio playback via loudspeaker radio television used run mass-attacks telephones hands-free systems digital assistants systems text-to-speech-processing misused systems accessed randomly anonymously absence owner well activated remotely critical answering machines automated monitoring function playing message aloud along could used remote precise attacks june 2014 television commercial microsoft depicted actor issuing voice command xbox causing command interpreted xbox systems room television showing commercial december 2016 adam jakowenko showed one virtual assistant could activate another one using tts-processing january 2017 television news coverage child ordering dollhouse amazon alexa interface included news anchor jim patton quoting child quotation triggered orders dollhouses viewers coverage alexa devices running | [] | Validation |
7,339 | 3 | Mac_68k_emulator:mac 68k emulator mac 68k emulator software emulator built versions classic mac os powerpc emulator enabled running applications system code originally written 680x0-based macintosh models exceptions notably connectix ram doubler emulator ran software noticeable impact lower performance relative program compiled powerpc first version written gary davidian originally created use motorola 88000 cpu used apple abortive first attempt risc target platform later version using dynamic recompilation developed eric traut later worked successful emulation projects connectix virtual game station virtual pc prior traut arrival connectix released speed doubler included even faster powerpc 68k emulator versions emulator emulated user subset 68ec040 instruction set 68020/68030 exception stack frame apple developer documents indicate emulator provided operating environment closely resembling macintosh centris 610 system based motorola 68lc040 microprocessor early versions emulated decoding instruction immediately carrying series equivalent powerpc instructions pci powermacs dynamic recompilation emulator used boost performance dynamic recompilation works recompiling common sections code faster powerpc-native sequences locally cached emulator could recognise sequence 680x0 code run previously-cached powerpc code avoid translation emulator theoretically capable emulating 680x0 code faster real 680x0 capable running 68lc040 floating point instructions making feat slightly simpler less impressive one reason emulation successful many apis mac os originally implemented traps 680x0 processor therefore calling api actually recognised 680x0 equivalent error condition would cause handle error one hardware vectors turn vector would look run operating system routine rom ram emulator traps could replaced native powerpc code code emulated application system api called could accelerated native powerpc code also allowed apple time port os powerpc first time-critical aspects rewritten native code leaving much os emulated gradually os rewritten native os got faster time programmer transition powerpc made fairly painless emulator started stopped automatically achieved using new type pointer called universal procedure pointer upp 68k code pointer appeared ordinary pointer code could used however actually led data structure contained special trap instruction flags indicating instruction set architecture isa called code powerpc code upp could passed calluniversalproc function call 68k emulator dealt details presenting passed parameters right order isa question well starting stopping emulator required compilers mac os created upps automatically proper macros used powerpc system libraries contained native stubs transparently call native still-68k functions needed meant dealing dual architecture required little work programmer like os applications could mix match 680x0 powerpc code fairly easily built powerpc versions classic mac os emulator also part classic environment mac os x. powerpc macintosh emulators sheepshaver therefore use emulator well running classic mac os native mac os x outside classic never used emulator | [
405,
4453,
5614,
713,
352,
3674,
6014,
4175,
1880
] | Test |
7,340 | 8 | IFTTT:ifttt also known ifttt free web-based service create chains simple conditional statements called applets applet triggered changes occur within web services gmail facebook telegram instagram pinterest example applet may send e-mail message user tweets using hashtag copy photo facebook user archive someone tags user photo addition web-based application service runs ios android february 2015 ifttt renamed original application released new suite apps called lets users create shortcut applications actions 2015 ifttt users created 20 million recipes day functionalities suite apps since integrated redesigned ifttt app december 14 2010 linden tibbets co-founder ifttt posted blog post titled “ ifttt beginning ... ” ifttt website announcing new project first ifttt applications designed developed tibbets co-founder jesse tane september 7 2011 tibbets announced launch official website april 30 2012 users created 1 million tasks june 2012 service entered internet things space integrating belkin wemo devices allowing applets interact physical world july 10 2013 ifttt released iphone app later released version ipad ipod touch april 24 2014 ifttt released version android end 2014 ifttt business valued approximately usd 170 million february 19 2015 ifttt launched three new applications button triggers action press camera automatically uploads image service choice facebook twitter dropbox etc. notes camera except notes instead images november 2016 four apps combined one december 2016 company announced partnership jotform integrate applet create actions applications part revenue ifttt comes ifttt platform partners pay products connected service among ge bmw microsoft google others dropbox new york times twitter slack spotify partners choose various monthly plans lite free use basic 199 enterprise 499 july 2019 ifttt announced tenfold increase monthly charges pricing smaller integration partners ifttt employs following concepts ifttt received positively forbes time wired new york times reader digest microsoft developed comparable product microsoft flow | [
6827,
6986,
3263,
5571,
3445,
518
] | Test |
7,341 | 1 | Database_server:database server database server server uses database application provides database services computer programs computers defined client–server model database management systems dbmss frequently provide database-server functionality database management systems mysql rely exclusively client–server model database access others e.g sqlite meant using embedded database users access database server either front end running user computerwhich displays requested dataor back end runs server handles tasks data analysis storage master-slave model database master servers central primary locations data database slave servers synchronized backups master acting proxies database applications respond query language database understands query language converts submitted query server-readable form executes retrieve results examples proprietary database applications include oracle db2 informix microsoft sql server examples free software database applications include postgresql gnu general public licence include ingres mysql every server uses query logic structure sql structured query language query language less relational database applications clarification database server simply server maintains services related clients via database applications db-engines lists 300 dbmss ranking foundations modeling large sets data first introduced charles bachman 1969 bachman introduced data structure diagrams dsds means graphically represent data dsds provided means represent relationships different data entities 1970 codd introduced concept users database ignorant inner workings database codd proposed relational view data later evolved relational model databases use today 1971 database task report group codasyl driving force behind development programming language cobol first proposed data description language describing database data description language describing part data base known program data manipulation language research development databases focused relational model 1970s 1975 bachman demonstrated relational model data structure set similar congruent ways structuring data working honeywell entity-relationship model first proposed current form peter chen 1976 conducting research mit model became frequently used model describe relational databases chen able propose model superior navigational model applicable real world relational model proposed codd | [
1905,
5014,
6604,
7330,
187,
3268,
7715,
6345,
3005,
5561,
906,
5217,
2390,
2924,
3702,
5735,
3863,
6098,
1554,
4054,
4505,
6636,
2663,
2124,
6737,
838,
3119,
3801,
4747,
4798,
6739,
5943,
6462,
7999,
2054,
4439,
6932,
6386,
5772,
684,
... | Test |
7,342 | 0 | Morphological_dictionary:morphological dictionary field computational linguistics morphological dictionary linguistic resource contains correspondences surface form lexical forms words surface forms words found text corresponding lexical form surface form lemma followed grammatical information example part speech gender number english give gives giving gave given surface forms verb give lexical form would give verb two kinds morphological dictionaries aligned non-aligned aligned morphological dictionary correspondence surface form lexical form word aligned character level example θ empty symbol signifies noun signifies plural example left hand side surface form input right hand side lexical form output order used morphological analysis lexical form generated surface form morphological generation order would reversed formally σ alphabet input symbols formula_1 alphabet output symbols aligned morphological dictionary subset formula_2 alphabet possible alignments including empty symbol aligned morphological dictionary set string formula_4 non-aligned morphological dictionary simply set formula_5 pairs input output strings non-aligned morphological dictionary would represent previous example possible convert non-aligned dictionary aligned dictionary besides trivial alignments left right linguistically motivated alignments align characters corresponding morphemes possible frequently exists one lexical form associated surface form word example house may noun singular may verb present tense result necessary function relates input strings corresponding output strings define set formula_6 input words formula_7 correspondence function would formula_8 defined formula_9 | [
1314
] | Test |
7,343 | 7 | Peer-to-peer_web_hosting:peer-to-peer web hosting peer-to-peer web hosting using peer-to-peer networking distribute access webpages differentiated client–server model involves distribution web data dedicated web servers user-end client computers p2p web hosting may take form p2p web caches content delivery networks like dijjer coral cache allow users hold copies data single web pages distribute caches users faster access peak traffic | [
7232,
2984,
3172,
7714,
2379,
4495,
4594,
2390,
3626,
1554,
2664,
744,
6025,
7744,
499,
4434,
2681,
4891,
5414,
7756,
3573,
2961,
2430,
2696,
5531,
1329,
3338,
4014,
6499
] | Validation |
7,344 | 7 | BlackSpider_Technologies_Limited:blackspider technologies limited blackspider technologies limited british software company founded 2002 subsequently acquired surfcontrol july 2006 company provided cloud computing services filtering email spam malware blackspider start-up company founded 2002 john cheney reading berkshire uk january 2004 casenove private equity invested £4.6m 6.6m business allowing organisation grow french german markets july 2006 surfcontrol uk listed plc acquired blackspider £19.5m cash point acquisition blackspider £4m historic revenues operating loss £3.1m 1,200 customers october 2007 websense acquired surfcontrol approximately £204m following acquisition surfcontrol websense original blackspider management team including john cheney left found workbooks.com provider web-based crm software small businesses mailcontrol brand name blackspider technologies email filtering services products sold forcepoint brand name hosted email security | [
2961,
7522
] | Test |
7,345 | 5 | Software_Communications_Architecture:software communications architecture software communications architecture sca open architecture framework defines standard way radios instantiate configure manage waveform applications running platform sca separates waveform software underlying hardware platform facilitating waveform software portability re-use avoid costs redeveloping waveforms latest version sca 4.1 sca published joint tactical networking center jtnc architecture developed assist development software defined radio sdr communication systems capturing benefits recent technology advances expected greatly enhance interoperability communication systems reduce development deployment costs architecture also applicable embedded distributed-computing applications communications terminals electronic warfare ew sca structured sca deliberately designed meet commercial application requirements well military applications since sca intended become self-sustaining standard wide cross-section industry invited participate development validation sca sca system specification implementation independent set rules constrain design systems achieve objectives listed core framework cf defines essential core set open software interfaces profiles provide deployment management interconnection intercommunication software application components embedded distributed-computing communication system sense interfaces defined sca part cf standard waveform apis define key software interfaces allow waveform application radio platform interact sca use apis separate waveform software underlying hardware platform facilitating waveform software portability re-use avoid costs redeveloping waveforms | [
4482
] | Test |
7,346 | 5 | Google_Earth:google earth google earth computer program renders 3d representation earth based primarily satellite imagery program maps earth superimposing satellite images aerial photography gis data onto 3d globe allowing users see cities landscapes various angles users explore globe entering addresses coordinates using keyboard mouse program also downloaded smartphone tablet using touch screen stylus navigate users may use program add data using keyhole markup language upload various sources forums blogs google earth able show various kinds images overlaid surface earth also web map service client addition earth navigation google earth provides series tools desktop application additional globes moon mars available well tool viewing night sky flight simulator game also included features allow users view photos various places uploaded panoramio information provided wikipedia locations street view imagery web-based version google earth also includes voyager feature periodically adds in-program tours often presented scientists documentarians google earth viewed threat privacy national security leading program banned multiple countries countries requested certain areas obscured google satellite images usually areas containing military facilities core technology behind google earth originally developed intrinsic graphics late 1990s time company developing 3d gaming software libraries demo 3d software created spinning globe could zoomed similar powers ten film demo popular board intrinsic wanted remain focused gaming 1999 created keyhole inc. headed john hanke keyhole developed way stream large databases mapping data internet client software key part technology acquired patchworks mapping data governments sources product called keyhole earthviewer sold cds use fields real estate urban planning defense intelligence users paid yearly fee service despite making number capital deals nvidia sony small company struggling make payroll employees leaving fortunes company changed early 2003 cnn received discount software exchange placing keyhole logo on-air whenever map used keyhole expect would amount brief 5 10 second prerecorded animation clips used extensively miles o'brien live 2003 invasion iraq allowing cnn millions viewers follow progress war way never seen public interest software exploded keyhole servers able keep demand keyhole soon contacted central intelligence agency venture capital firm in-q-tel national geospatial-intelligence agency use defense mapping databases gave keyhole much-needed cash infusion intrinsic graphics sold 2003 vicarious visions gaming libraries sell well core group engineers management transitioned keyhole hanke remaining head time google finding 25 searches geospatial character including searches maps directions october 2004 google acquired keyhole part strategy better serve users google earth imagery displayed digital globe displays planet surface using single composited image far distance zooming far enough imagery transitions different imagery area finer detail varies date time one area next imagery retrieved satellites aircraft launch nasa usgs landsat 8 satellite google relied partially imagery landsat 7 suffered hardware malfunction left diagonal gaps images 2013 google used datamining remedy issue providing described successor blue marble image earth single large image entire planet achieved combining multiple sets imagery taken landsat 7 eliminate clouds diagonal gaps creating single mosaic image google uses landsat 8 provide imagery higher quality greater frequency imagery hosted google servers contacted application opened requiring internet connection imagery resolution ranges 15 meters resolution 15 centimeters much earth google earth uses digital elevation model data collected nasa shuttle radar topography mission creates impression three-dimensional terrain even imagery two-dimensional every image created google earth using satellite data provided google earth copyrighted map derivative google earth made copyrighted data united states copyright law may used except licenses google provides google allows non-commercial personal use images e.g personal website blog long copyrights attributions preserved contrast images created nasa globe software world wind use blue marble landsat usgs imagery public domain version 5.0 google introduced historical imagery allowing users view earlier imagery clicking clock icon toolbar opens time slider marks time available imagery past feature allows observation area changes time utilizing timelapse feature allows ability view zoomable video far back 32 years google earth shows 3d building models cities including photorealistic 3d imagery first 3d buildings google earth created using 3d modeling applications sketchup beginning 2009 building maker uploaded google earth via 3d warehouse june 2012 google announced would replacing user-generated 3d buildings auto-generated 3d mesh would phased starting select larger cities notable exception cities london toronto required time process detailed imagery vast number buildings reason given greater uniformity 3d buildings compete nokia apple maps already using technology coverage began year 21 cities four countries early 2016 3d imagery expanded hundreds cities 40 countries including every u.s. state encompassing every continent except antarctica 2009 collaboration google museo del prado madrid museum selected 14 paintings photographed displayed resolution 14,000 megapixels inside 3d version prado google earth google maps april 15 2008 version 4.3 google fully integrated street view google earth street view displays 360° panoramic street-level photos select cities surroundings photos taken cameras mounted automobiles viewed different scales many angles navigable arrow icons imposed introduced google earth 5.0 2009 google ocean feature allows users zoom surface ocean view 3d bathymetry supporting 20 content layers contains information leading scientists oceanographers april 14 2009 google added bathymetric data great lakes june 2011 google increased resolution deep ocean floor areas 1-kilometer grids 100 meters high-resolution features developed oceanographers columbia university lamont-doherty earth observatory scientific data collected research cruises sharper focus available 5 percent oceans seen hudson new york city wini seamount near hawaii mendocino ridge u.s pacific coast google programs features including within google earth allowing exploration mars moon view sky earth outer space including surfaces various objects solar system google sky feature introduced google earth 4.2 august 22 2007 browser-based application march 13 2008 android smartphones augmented reality features google sky allows users view stars celestial bodies produced google partnership space telescope science institute stsci baltimore science operations center hubble space telescope dr. alberto conti co-developer dr. carol christian stsci plan add public images 2007 well color images archived data hubble advanced camera surveys newly released hubble pictures added google sky program soon issued new features multi-wavelength data positions major satellites orbits well educational resources provided google earth community also christian conti website sky also visible sky mode constellations stars galaxies animations depicting planets orbits real-time google sky mashup recent astronomical transients using voevent protocol provided voeventnet collaboration programs similar google sky include microsoft worldwide telescope stellarium google mars application within google earth version program imagery planet mars google also operates browser-based version although maps much higher resolution within google earth include 3d terrain well infrared imagery elevation data also extremely-high-resolution images mars reconnaissance orbiter hirise camera similar resolution cities earth finally many high-resolution panoramic images various mars landers mars exploration rovers spirit opportunity viewed similar way google street view mars also small application found near face mars called meliza robot character user speak originally browser application google moon feature allows exploration moon google brought feature google earth 40th anniversary apollo 11 mission july 20 2009 announced demonstrated group invited guests google along buzz aldrin newseum washington d.c. google moon includes several tours including one apollo missions incorporating maps videos street view-style panoramas provided nasa google earth numerous features allow user learn specific places called layers include different forms media including photo video layers include tours guide user specific places set order layers created using keyhole markup language kml users also use create customized layers locations marked placemarks organized folders example user use placemarks list interesting landmarks around globe provide description photos videos viewed clicking placemarks viewing new layer application december 2006 google earth added new integration wikipedia panoramio wikipedia layer entries scraped coordinates via also community-layer project coordinates used different types display different languages supported built-in wikipedia layer panoramio layer features pictures uploaded panoramio users placed google earth based user-provided location data addition flat images google earth also includes layer user-submitted panoramic photos navigable similar way street view google earth includes multiple features allow user monitor current events 2007 google began offering users ability monitor traffic data provided google traffic real time based information crowdsourced gps-identified locations cell phone users google earth 4.2 flight simulator added application originally hidden feature introduced 2007 starting 4.3 given labeled option menu addition keyboard control simulator controlled mouse joystick simulator also runs animation allowing objects planes animate simulator another flight simulator geofs created name gefs-online using google earth plug-in api operate within web browser september 1 2015 program uses open-source program cesiumjs due google earth plug-in discontinued liquid galaxy cluster computers running google earth creating immersive experience september 30 2010 google made configuration schematics rigs public placing code setup guides liquid galaxy wiki liquid galaxy also used panoramic photo viewer using krpano well google street view viewer using peruse-a-rue peruse-a-rue method synchronizing multiple maps api clients google earth released macos linux ios android linux version began version 4 beta google earth native port using qt toolkit free software foundation consider development free compatible client google earth high priority free software project google earth released android february 22 2010 ios october 27 2008 mobile versions google earth make use multi-touch interfaces move globe zoom rotate view allow select current location automotive version google earth made available 2010 audi a8 google earth pro originally business-oriented upgrade google earth features movie maker data importer late january 2015 available 399/year though google decided make free public google earth pro currently standard version google earth desktop application version 7.3 pro version includes add-on software movie making advanced printing precise measurements currently available windows mac os x 10.8 later linux discontinued december 2008 google earth plus paid subscription upgrade google earth provided customers following features become available free google earth one feature gps integration allowed users read tracks waypoints gps device variety third-party applications created provide functionality using basic version google earth generating kml kmz files based user-specified user-recorded waypoints google earth enterprise designed use organizations whose businesses could take advantage program capabilities example globe holds company data available anyone company march 20 2015 google retired google earth enterprise product support ended march 22 2017 google earth enterprise allowed developers create maps 3d globes private use host platform gee fusion gee server gee portable server source code published github apache2 license march 2017 google earth 9 version google earth first released april 18 2017 development two years main feature version launching new web version google earth currently available google chrome version added voyager feature whereby users view portal page containing guided tours led scientists documentarians version also added 'm feeling lucky button represented die takes user random location earth along showing knowledge card containing short excerpt location wikipedia article google earth api free beta service allowing users place version google earth web pages api enabled sophisticated 3d map applications built unveiling google 2008 i/o developer conference company showcased potential applications game player controlled milktruck atop google earth surface google earth api deprecated december 15 2014 remained supported december 15 2015 google chrome ended support netscape plugin api google earth api relies end 2016 november 16 2016 google released virtual reality version google earth valve steam computer gaming platform google earth vr allows users navigate using vr controllers currently compatible oculus rift htc vive virtual reality headsets september 14 2017 part google earth vr 1.4 update google added street view support google earth outreach charity program google promotes donates various non-profit organizations beginning 2007 donations often accompanied layers featured google earth allowing users view non-profit projects goals navigating certain related locations google earth outreach offers online training using google earth google maps public education issues affecting local regions entire globe june 2008 training given 20 indigenous tribes amazon rainforest suruí help preserve culture raise awareness problem deforestation non-profit organizations featured google earth via outreach program include arkive global heritage fund wateraid world wide fund nature google earth engine cloud computing platform processing satellite imagery geospatial observation data provides access large database satellite imagery computational power needed analyze images google earth engine allows observation dynamic changes agriculture natural resources climate using geospatial data landsat satellite program passes places earth every sixteen days google earth engine become platform makes landsat sentinel-2 data easily accessible researchers collaboration google cloud storage google earth engine provides data catalog along computers analysis allows scientists collaborate using data algorithms visualizations platform uses python javascript application programming interfaces making requests servers google earth engine used multiple times tool tracking deforestation initial applications engine included mapping forests mexico identifying water congo basin detecting deforestation amazon rainforest using google earth engine track global forest loss gain university maryland reported overall loss global forest cover carnegie institute science claslite system imazon ’ sisteme de alerta de deforesation sad two institutions partnered google development google earth engine organizations use program build maps forests measure environmental disturbances additionally google earth engine expanded applications range tiger habitat monitoring malaria risk mapping global surface water software criticized number special interest groups including national officials invasion privacy posing threat national security typical argument software provides information military critical installations could used terrorists google earth blocked google iran sudan since 2007 due united states government export restrictions program also blocked morocco since 2006 maroc telecom major service provider country academic realm increasing attention devoted google earth place development digital globes particular international journal digital earth features multiple articles evaluating comparing development google earth differences compared professional scientific governmental platforms google earth role expansion earth observing media examined role shaping shared cultural consciousness regarding climate change humanity capacity treat earth engineerable object | [
2902,
3933,
5372,
6427,
5036,
1095,
2569,
740,
4340,
42,
3309,
3310,
7924,
2591,
5771,
1496,
5775,
2961,
6153,
7956,
5455,
4762,
7967,
6176,
5473,
474,
5476,
6183,
822,
831,
5141,
136,
2317,
2673,
6209,
7285,
2683,
5509,
855,
6937,
168,... | Test |
7,347 | 9 | JavaServer_Faces:javaserver faces javaserver faces jsf java specification building component-based user interfaces web applications formalized standard java community process part java platform enterprise edition also mvc web framework simplifies construction user interfaces ui server-based applications using reusable ui components page jsf 2 uses facelets default templating system view technologies xul plain java also employed contrast jsf 1.x uses javaserver pages jsp default templating system 2001 original java specification request jsr technology ultimately became javaserver faces proposed developing package name codice_1 june 2001 javaworld would report amy fowler team design javaserver faces api aka moonwalk – application framework creating web-based user interfaces based component-driven ui design-model javaserver faces uses xml files called view templates facelets views codice_2 processes requests loads appropriate view template builds component tree processes events renders response typically html language client state ui components objects scope interest saved end request process called statesaving note transient true restored upon next creation view either client server side save objects states jsf often used together ajax rich internet application development technique ajax combination web development techniques technologies make possible create rich user interfaces user interface components mojarra jsf reference implementation apache myfaces originally developed html ajax added via javascript changed however jsf supports multiple output formats ajax-enabled components easily added enrich jsf-based user interfaces jsf 2.0 specification provides built-in support ajax standardizing ajax request lifecycle providing simple development interfaces ajax events allowing event triggered client go proper validation conversion finally method invocation returning result browser via xml dom update jsf 2 includes support graceful degradation javascript disabled browser following companies projects offer ajax-based jsf frameworks component libraries facelets designed specifically javaserver faces adopted official view technology jsf 2.0 eliminates life-cycle conflicts existed jsp forcing workarounds java developers facelets allows easy component/tag creation using xml markup instead java code chief complaint jsf 1.x new jsf developments also provide wide accessibility java 5 annotations codice_3 codice_4 codice_5 removes need codice_6 cases except framework extension navigation simplified removing need codice_6 navigation cases page transitions invoked simply passing name desired view/facelet addition partial state saving dom updates part built-in standardized ajax support latest jsf release built-in support handling resources like images css javascript allowing artifacts included component libraries separated jar files simply co-located consistent place within web application includes logical naming versioning resources jsf 2.0 also includes number changes like adding support events separate development staging production modes similar codice_8 ruby rails significantly expanding standard set components january 2014 technology radar publication thoughtworks wrote article published november 2014 dzone website titled avoid jsf jens schauder wrote february 2014 çağatay çivici primefaces lead responded thoughtworks criticisms post titled jsf ’ told anymore çivici argues improvements jsf years offer many features embrace modern web development providing option write javascript html css also regarding state çağatay wrote | [
5015,
1445,
1819,
6428,
6095,
1479,
401,
5408,
417,
54,
773,
6156,
2619,
2624,
103,
3368,
6191,
486,
4422,
6553,
2322,
5155,
3077,
2371,
7347,
2740,
6986,
5575,
6281,
6280,
933,
4535,
3488,
4185,
5965,
2799,
6319,
2807,
2451,
5983,
631,... | Test |
7,348 | 0 | Bradford's_law:bradford law bradford law pattern first described samuel c. bradford 1934 estimates exponentially diminishing returns searching references science journals one formulation journals field sorted number articles three groups one-third articles number journals group proportional 1 n n² number related formulations principle many disciplines pattern called pareto distribution practical example suppose researcher five core scientific journals subject suppose month 12 articles interest journals suppose order find another dozen articles interest researcher would go additional 10 journals researcher bradford multiplier b 2 i.e 10/5 new dozen articles researcher need look b times many journals looking 5 10 20 40 etc journals researchers quickly realize little point looking different researchers different numbers core journals different bradford multipliers pattern holds quite well across many subjects may well general pattern human interactions social systems like zipf law related good explanation works knowing useful librarians means specialty sufficient identify core publications field stock rarely researchers need go outside set however impact far greater armed idea inspired vannevar bush famous article may think eugene garfield institute scientific information 1960s developed comprehensive index scientific thinking propagates science citation index sci effect making easy identify exactly scientists science impact journals science appeared also caused discovery expect journals nature science core hard science pattern happen humanities social sciences result pressure scientists publish best journals pressure universities ensure access core set journals hand set core journals may vary less strongly individual researchers even strongly along schools-of-thought divides also danger over-representing majority views journals selected fashion bradford law also known bradford law scattering bradford distribution another general term come use since 2006 information scattering though better categorized secondary information scattering law distribution bibliometrics applied world wide web hjørland nicolaisen 2005 p. 103 identified three kinds scattering found literature bradford law including bradford papers unclear relation kind scattering actually measured interpretation bradford law terms geometric progression suggested v. yatsko introduced additional constant demonstrated bradford distribution applied variety objects distribution articles citations across journals v. yatsko interpretation y-interpretation effectively used compute threshold values case necessary distinguish subsets within set objects successful/unsuccessful applicants developed/underdeveloped regions etc | [
4385,
2611,
84
] | Test |
7,349 | 2 | Bruce_Perens'_Open_Source_Series:bruce perens open source series bruce perens open source series series books edited bruce perens series editor published prentice hall ptr principal topics linux open-source software books intended professional software developers system network administrators power users series published 2002 2006 24 titles series book licensed open publication license made available free download several months publication first book series published open content license | [
578
] | Validation |
7,350 | 4 | Two-man_rule:two-man rule two-man rule control mechanism designed achieve high level security especially critical material operations rule access actions require presence two authorized people times per us air force instruction afi 91-104 two-person concept designed prevent accidental malicious launch nuclear weapons single individual case minuteman missile launch crews launch order received operators must agree valid comparing authorization code order sealed authenticator special sealed envelope holds code sealed authenticators stored safe two separate locks operator key one lock neither open safe alone also operator one two launch keys order verified must insert keys slots control panel turn simultaneously precaution slots two launch keys positioned far enough apart make impossible one operator reach additional protection missile crew another launch control center must missiles launched total four keys thus required initiate launch submarine commanding officer executive officer must agree order launch valid mutually authorize launch operations personnel instead another party would confirm missile launch case land-based icbms third officer weapons officer must also confirm launch addition set keys distributed among key personnel submarine keys kept safes crew members access keys keys stored special safes board secured combination locks nobody board combination open safes unlock key comes part launch order emergency action message higher authority journalist ron rosenbaum pointed order issued process entirely concerned authenticating identity commanding officers authenticity order safeguards verify order person issuing actually sane notably major harold hering discharged air force asking question know order receive launch missiles came sane president two-man rule applies missile silos submarines check president sole authority order nuclear launch two-person integrity tpi security measure taken prevent single-person access comsec keying material cryptographic manuals tpi accomplished follows time one person possession combinations keys gain lone access security container cryptographic equipment containing comsec material neither one person sole possession comsec material requires tpi security no-lone zone area must staffed two qualified cleared individuals individual must within visual contact visual contact critical component requires no-lone-zone area designation no-lone zone may contain cryptographic component weapon system hardware test nuclear weapon active nuclear weapon controls united states air force usaf policy concerning critical weapons no-lone zone area presence single individual prohibited two-person concept requires presence two individuals knowledgeable task performed capable detecting incorrect unauthorized procedure part regarding task performed two-man rule used safety critical applications presence two people required potentially hazardous operation performed common safety practice example laboratories machine shops context additional security may less important fact one individual injured call help another example firefighters operating hazardous environment i.e interior structure fire hazmat zone also known idlh 'immediately dangerous life health function team least two personnel commonly one team environment team operates unit dual keys require authorization two separate parties particular action taken simplest form dual key security lock requires two keys unlock two keys would possession two separate persons lock could opened parties agreed open time 1963 canada accepted american w-40 nuclear warheads dual key control canadian soil used canadian bomarc missiles similarly many banks implement variant two-man rule secure large sums money valuable items concept unlocking vault requires two individuals different keys vault secured key lock system bank vaults secured combination lock one individual know half combination second person know remaining half point either person know person half lock combination requiring persons physically present order unlock vault extension broader rationale two-man rule regulations companies not-for-profit organizations may require signatures two executives checks rules make harder individual acting alone defraud organization software systems enforce two-man rule whereby certain actions example funds wire transfers take place approved two authorized users helps prevent expensive errors makes difficult commit fraud embezzlement requirements common financial systems also used controls critical infrastructure nuclear reactors electrical power generation dangerous operations biohazard research facilities finally testimony two witnesses valuable various situations deter wrongful act false accusation one prove wrongful act occurred late march 2015 many national aviation authorities and/or airlines made cockpits aircraft flight mandatory two-man no-lone zones result germanwings flight 9525 crash early investigation crash believed cockpit voice recorder audio later supported flight data recorder information co-pilot deliberately crashed aircraft locking cockpit door captain left use toilet | [
874,
8038,
33
] | Test |
7,351 | 4 | Online_Armor_Personal_Firewall:online armor personal firewall online armor personal firewall firewall originally developed australian company tall emu program sold emsi software gmbh emsisoft ltd program provides protection microsoft windows operating system inbound outbound attacks three editions product independent proactive security challenge test performed matousec.com online armor premium received score 99 surpassing well-known firewalls zonealarm kaspersky internet security well known vulnerability profiling site company secunia found vulnerabilities march 2008 software though matousec reported weakness 25 march 2008 repaired latest version online armor gained negative positive feedback users reporting serious compatibility problems certain programs f-secure ad muncher noted product website also receiving praise free online support swift response problems 31 march 2015 emsisoft ltd announced discontinued selling new licenses online armor would possible activate new license keys end may 2015 support online armor would officially end 31 march 2016 | [
1249,
3165,
4759,
806,
994,
3185,
4492,
4138,
385,
7536,
2746,
5571,
6107,
578,
3637,
8100,
3551,
1291,
7275,
7744,
3394,
6560,
4977,
7478,
3223,
4091,
2790,
4734,
6235,
6149,
6951,
7597,
875,
6962
] | Test |
7,352 | 9 | Syntactic_closure:syntactic closure computer science syntactic closures implementation strategy hygienic macro system actual arguments macro call enclosed current environment inadvertently reference bindings introduced macro | [
3895,
6980,
7391
] | Test |
7,353 | 2 | Machine_code_monitor:machine code monitor machine code monitor machine language monitor software allows user enter commands view change memory locations computer options load save memory contents from/to secondary storage full-featured machine code monitors provide detailed control single-stepping execution machine language programs much like debugger include absolute-address code assembly disassembly capabilities machine code monitors became popular home computer era 1970s 1980s sometimes available resident firmware computers e.g. built-in monitor commodore 128 unheard perform one programming monitor lieu full-fledged symbolic assembler even full-featured assemblers became readily available machine code monitor indispensable debugging programs usual technique set break points code undergoing testing e.g. brk instruction 6502 assembly language start program microprocessor encountered break point test program would interrupted control would transferred machine code monitor typically would trigger register dump monitor would await programmer input activities point might include examining memory contents patching code and/or perhaps altering processor registers prior restarting test program general decline scratch-written assembly language software made use machine code monitor somewhat lost art systems higher-level languages employed debuggers used present abstract friendly view happening within program however use machine code monitors persists especially area hobby-built computers | [
4003,
8030,
5926,
2237,
5190,
336
] | Test |
7,354 | 3 | Xak:_The_Tower_of_Gazzel:xak tower gazzel xak precious package tower gazzel fantasy role-playing video game developed published japanese software developer microcabin game direct sequel technically third installment series tower gazzel sidestory taking place events game released japan latok kart defeated zamu gospel events portrayed xak ii friends intrigued rumours demonic tower man looking like latok roaming neighbourhood appearance false latok kidnapping rune greed family ploys lure two descendants duel tower laid villains al acrila gill berzes demon called zegraya using latok rune plan resurrect ancient demon gazzel demon unimaginable power comparable destroying entire mountain single attack player controls latok looking onto game world bird's-eye view latok swing sword optionally firing magical shots tip expense magic points jump short distances player choose take along one party four characters exploration tower so-called 'support members subtly change latok statistics addition triggering different events within game entirety tower large labyrinth spanning six floors elemental theme darkness basement respectively earth fire water wind heaven first fifth floors game one large puzzle goal reaching bottom floor defeating zegraya gazzel many puzzles revolve around fact floors heavily interconnected floor fire example large wall flames latok pass way water floor large door opened pours large amount water hole floor dousing flames another part puzzles involves choice support member take along support members n't affect latok combat statistics points game passed right support member tagging along even items game latok use right supportmember example latok finds magical scroll lightning spell inscribed n't master enough magic cast certain part first floor seemingly impassable wall rubble fray selected support member snatch lightning scroll latok use blast path rubble game saved fixed point entrance tower prevent player backtrack save game various items found teleport latok support member back entrance fixed point inside tower contrary predecessors tower gazzel use experience point system currency kind appear game latok starts game level 50 end xak ii advance instead occurs xak iii new equipment also unavailable latok sticks sword armor shield xak ii end throughout game eliminates need player spend large amounts time 'leveling collecting enough experience points and/or gold player character grow strong enough buy new equipment respectively way game emphasis puzzle aspect combat kind advancement system retained latok find different pairs gauntlets tower pair enhancing combat statistics game engine almost identical xak ii preserving real-time combat aspect music graphics even recycled previous installment compared xak ii xak gazzel runs much smoother even regular msx2 prompting much less shorter loading times possible supportmembers abilities follows addition single save point game represented healer fell bow except villains game uses little non-player characters emphasising puzzling aspect even | [
2955,
4206
] | Test |
7,355 | 2 | Portsnap:portsnap portsnap system written colin percival secure distribution compressed digitally signed snapshots freebsd ports tree distribution follows client–server model uses transport protocol http pipelined http freebsd 6.0 portsnap part base system including 5.5 previous versions installed ports standalone program run manually cron job one alternatives classic cvsup method advantages include another alternative cvsup cvsync used manage openbsd source tree shares cvsup disadvantages though portsnap package distributed 2-clause bsd license | [
1523,
1341,
1254,
7514,
191,
6711,
1356,
6505,
1547,
4498,
481,
3457,
1554,
732,
2300,
5571,
6278,
8194,
8096,
1193,
1013,
3636,
4059,
8001,
6918,
5760,
6211,
3986,
4806,
5065,
594,
4441,
5865,
4534,
6477,
424,
2512,
5250,
1315,
689,
61... | Test |
7,356 | 9 | Pstoedit:pstoedit pstoedit free computer program converts postscript pdf files vector formats supports many output formats including wmf/emf pdf dxf cgm html means free/shareware plugins svg mif rtf author maintainer wolfgang glunz pstoedit uses ghostscript perform first part conversion process ghostscript converts postscript pdf file basic postscript format translating complex functions basic functions line draw commands second part conversion process consists translating basic functions basic functions output format pstoedit multi platform ms windows setup program available 32bit 64bit complete job including instance making connection ghostscript ms office three interfaces installed command line interface interface means gsview import filter ms office however make actual use ms office interface 50 registration required registration also adds functionality two interfaces licensed gnu general public license pstoedit free software | [
7223,
6015,
6016
] | Test |
7,357 | 2 | Dalvik_(software):dalvik software dalvik discontinued process virtual machine vm google android operating system executes applications written android dalvik bytecode format still used distribution format longer runtime newer android versions dalvik integral part android software stack unsupported android versions 4.4 kitkat earlier commonly used mobile devices mobile phones tablet computers devices smart tvs wearables dalvik open-source software originally written dan bornstein named fishing village dalvík eyjafjörður iceland programs android commonly written java compiled bytecode java virtual machine translated dalvik bytecode stored .dex dalvik executable .odex optimized dalvik executable files related terms odex de-odex associated respective bytecode conversions compact dalvik executable format designed systems constrained terms memory processor speed successor dalvik android runtime art uses bytecode .dex files .odex files succession aiming performance improvements transparent end users new runtime environment included first time android 4.4 kitkat technology preview replaced dalvik entirely later versions android 5.0 lollipop first version art included runtime unlike java vms stack machines dalvik vm uses register-based architecture requires fewer typically complex virtual machine instructions dalvik programs written java using android application programming interface api compiled java bytecode converted dalvik instructions necessary tool called dx used convert java .class files .dex format multiple classes included single .dex file duplicate strings constants used multiple class files included .dex output conserve space java bytecode also converted alternative instruction set used dalvik vm uncompressed .dex file typically percent smaller size compressed java archive jar derived .class files dalvik executables may modified installed onto mobile device order gain optimizations byte order may swapped certain data simple data structures function libraries may linked inline empty class objects may short-circuited example optimized low memory requirements dalvik specific characteristics differentiate standard vms according google design dalvik permits device run multiple instances vm efficiently android 2.2 froyo brought trace-based just-in-time jit compilation dalvik optimizing execution applications continually profiling applications time run dynamically compiling frequently executed short segments bytecode native machine code dalvik interprets rest application bytecode native execution short bytecode segments called traces provides significant performance improvements relative merits stack machines versus register-based approaches subject ongoing debate generally stack-based machines must use instructions load data stack manipulate data thus require instructions register machines implement high-level code instructions register machine must encode source destination registers therefore tend larger difference importance vm interpreters opcode dispatch tends expensive along factors similarly relevant just-in-time compilation tests performed armv7 devices 2010 oracle owner java technology standard non-graphical java benchmarks showed hotspot vm java se embedded 2–3 times faster jit-based dalvik vm android 2.2 initial android release included jit compiler 2012 academic benchmarks confirmed factor 3 hotspot dalvik android board also noting dalvik code smaller hotspot furthermore benchmarks performed android device still show factor 100 native applications dalvik application android device upon running benchmarks using early interpreter 2009 java native interface jni native code showed order magnitude speedup dalvik published terms apache license 2.0 say dalvik clean-room implementation rather development top standard java runtime would mean inherit copyright-based license restrictions either standard-edition open-source-edition java runtimes oracle reviewers dispute august 12 2010 oracle acquired sun microsystems april 2009 therefore owns rights java sued google claimed infringement copyrights patents oracle alleged google developing android knowingly directly repeatedly infringed oracle java-related intellectual property may 2012 jury case found google infringe oracle patents trial judge ruled structure java apis used google copyrightable parties agreed zero dollars statutory damages 9 lines copied code | [
3933,
4293,
4662,
2182,
5372,
6427,
3955,
1095,
5396,
740,
4705,
7189,
3978,
4340,
42,
3310,
2591,
5064,
5771,
5775,
6851,
6497,
2619,
7956,
6874,
5473,
474,
1547,
6183,
822,
3368,
136,
6209,
6937,
6232,
1237,
1989,
5884,
5190,
3761,
41... | Test |
7,358 | 7 | Virtual_Enterprise_Network_Architecture:virtual enterprise network architecture fabric connect computer networking usage name used extreme networks market extended implementation ieee 802.1aq shortest path bridging mac-in-mac standard fabric connect technology originally developed enterprise solutions r department within nortel networks 2009 avaya inc acquired nortel networks enterprise business solutions transaction included fabric connect intellectual property together ethernet switching platforms supported subsequently fabric connect technology became part extreme networks portfolio virtue 2017 purchase avaya networking business assets avaya era technology promoted lead element virtual enterprise network architecture vena part extreme networks stated acquisition avaya networking assets specifically award-winning fabric technology ... strengthens extreme position leader across education healthcare government markets network virtualization capability based enhanced implementation ieee 802.1aq shortest path bridging spb standard fabric connect offers ability create simplified network dynamically virtualize elements efficiently provision utilize resources thus reducing strain network personnel extreme networks base fabric connect technology spb standard including support nowiki rfc 6329 /nowiki integrated ip routing ip multicast support unified technology allows replacement multiple conventional protocols spanning tree rip and/or ospf ecmp pim simply put fabric connect aim provide network-wide end-to-end multi-layer virtualization adjunct fabric connect technology fabric attach allows network operators extend network virtualization directly conventional wiring closet existing non-fabric ethernet switches automate provisioning devices appropriate virtual network particularly relevant mass unattended network end-point appearing ip phones wireless access points ip cameras fabric attach standardized protocols 802.1ab lldp exchange credentails obtain provisioning information allows client switches automatically re-configured fly parameters let traffic flows map fabric connect edge switches aka backbone edge bridge spb definition functioning fabric attach server switch method described ietf internet draft pending standardization activity fabric attach typically used automate wiring closet connectivity potential extensible use data center virtual machines able dynamically request vlan/vsn virtual service network assignment based upon application requirements range modular chassis-based products featuring carrier-grade linux operation system designed high-performance deployment scenarios need scale multiple terabit switching capacity support 10 40 gigabit ethernet connections designed eventually support 100 gigabit ethernet compact form-factor platform delivering high-density 10/40 gigabit ethernet connectivity targeted mid-market mid-size enterprise core switch applications range high-end 10 gigabit ethernet stackable switches extend fabric-based networking data center top-of-rack support 40 gigabit ethernet via mda slot range high-end gigabit ethernet stackable switches extend fabric-based networking branch metro locations range high-end gigabit ethernet stackable switches provide enterprise-class desktop features including poe offering 10 gbit/s uplink connections switch supports 144 gbit/s virtual backplane capacity delivering 1.152 tbit/s system eight creating virtual backplane stacking configuration mid-range gigabit ethernet stackable switches provide enterprise-class desktop features including poe/poe+ offering 1/10 gbit/s uplink connections switch supports 48gbit/s virtual backplane capacity delivering 384gbit/s system 8 creating virtual backplane stacking configuration entry-level gigabit ethernet stackable switches provide enterprise-class desktop features including poe/poe+ 1 gbit/s uplink connections | [
3847,
2650
] | Test |
7,359 | 4 | Cyber_threat_hunting:cyber threat hunting cyber threat hunting active cyber defence activity process proactively iteratively searching networks detect isolate advanced threats evade existing security solutions contrast traditional threat management measures firewalls intrusion detection systems ids malware sandbox computer security siem systems typically involve investigation evidence-based data warning potential threat threat hunting traditionally manual process security analyst sifts various data information using knowledge familiarity network create hypotheses potential threats limited lateral movement threat actors even effective efficient however threat hunting partially automated machine-assisted well case analyst uses software leverages machine learning user entity behavior analytics ueba inform analyst potential risks analyst investigates potential risks tracking suspicious behavior network thus hunting iterative process meaning must continuously carried loop beginning hypothesis hypothesis focus efforts known exploits potential bad actors assets data value using security data industry reports intelligence hypothesis formed hunt team sets prove disprove validity cyber threat hunts often employ automated manual tools techniques identify compromise detected three types hypotheses analyst researches hypothesis going vast amounts data network results stored used improve automated portion detection system serve foundation future hypotheses detection maturity level dml model expresses threat indicators detected different semantic levels high semantic indicators goal strategy tactics techniques procedure ttp valuable identify low semantic indicators network artifacts atomic indicators ip addresses siem tools typically provide indicators relatively low semantic levels therefore need develop siem tools provide threat indicators higher semantic levels representative notable vendors threat hunting software services include sans institute conducted research surveys effectiveness threat hunting track disrupt cyber adversaries early process possible according survey released 2017 60 hunt threats reported measurable improvements infosec programs based hunting efforts 91 report improvements speed accuracy response two types indicators sans institute identifies threat hunting maturity model follows cyberattackers operate undetected average 99 days obtain administrator credentials less three days according mandiant m-trends report study also showed 53 attacks discovered notification external party average company takes 170 days detect advanced threat 39 days mitigate 43 days recover according ponemon institute | [
2106,
429,
5982,
2434,
3888,
3495,
124,
7836,
2572,
8123,
3424,
3680,
5914
] | Test |
7,360 | 0 | Text_Retrieval_Conference:text retrieval conference text retrieval conference trec ongoing series workshops focusing list different information retrieval ir research areas tracks co-sponsored national institute standards technology nist intelligence advanced research projects activity part office director national intelligence began 1992 part tipster text program purpose support encourage research within information retrieval community providing infrastructure necessary large-scale evaluation text retrieval methodologies increase speed lab-to-product transfer technology track challenge wherein nist provides participating groups data sets test problems depending track test problems might questions topics target extractable features uniform scoring performed systems fairly evaluated evaluation results workshop provides place participants collect together thoughts ideas present current future research work new tracks added new research needs identified list current trec 2018 1997 japanese counterpart trec launched first workshop 1999 called ntcir nii test collection ir systems 2000 clef european counterpart specifically vectored towards study cross-language information retrieval launched nist claims within first six years workshops effectiveness retrieval systems approximately doubled conference also first hold large-scale evaluations non-english documents speech video retrieval across languages additionally challenges inspired large body publications technology first developed trec included many world commercial search engines independent report rtii found one-third improvement web search engines 1999 2009 attributable trec enhancements likely saved 3 billion hours time using web search engines ... additionally report showed every 1 nist partners invested trec least 3.35 5.07 benefits accrued u.s. information retrieval researchers private sector academia one study suggests state art ad hoc search advanced substantially past decade referring search topically relevant documents small news web collections gigabytes advances types ad hoc search past decade example test collections created known-item web search found improvements use anchor text title weighting url length useful techniques older ad hoc test collections 2009 new billion-page web collection introduced spam filtering found useful technique ad hoc web search unlike past test collections test collections developed trec useful potentially helping researchers advance state art also allowing developers new commercial retrieval products evaluate effectiveness standard tests past decade trec created new tests enterprise e-mail search genomics search spam filtering e-discovery several retrieval domains trec systems often provide baseline research examples include conference made varied international group researchers developers 2003 93 groups academia industry 22 countries participating | [
5429,
4734,
1233,
3017,
8065,
1333
] | Test |
7,361 | 3 | POWER6:power6 power6 microprocessor developed ibm implemented power isa v.2.03 became available systems 2007 succeeded power5+ ibm flagship power microprocessor claimed part eclipz project said goal converging ibm server hardware practical hence ipz acronym iseries pseries zseries power6 described international solid-state circuits conference isscc february 2006 additional details added microprocessor forum october 2006 next isscc february 2007 formally announced may 21 2007 released june 8 2007 speeds 3.5 4.2 4.7 ghz company noted prototypes reached 6 ghz power6 reached first silicon middle 2005 bumped 5.0 ghz may 2008 introduction p595 power6 dual-core processor core capable two-way simultaneous multithreading smt power6 approximately 790 million transistors 341 mm large fabricated 65 nm process notable difference power5 power6 executes instructions in-order instead out-of-order change often requires software recompiled optimal performance power6 still achieves significant performance improvements power5+ even unmodified software according lead engineer power6 project power6 also takes advantage viva-2 virtual vector architecture enables combination several power6 nodes act single vector processor core two integer units two binary floating-point units altivec unit novel decimal floating-point unit binary floating-point unit incorporates many microarchitectures logic circuit latch integration techniques achieve 6-cycle 13-fo4 pipeline according company paper unlike servers ibm competitors power6 hardware support ieee 754 decimal arithmetic includes first decimal floating-point unit integrated silicon 50 new floating point instructions handle decimal math conversions binary decimal feature also added z10 microprocessor featured system z10 core 64 kb four-way set-associative instruction cache 64 kb data cache eight-way set-associative design two-stage pipeline supporting two independent 32-bit reads one 64-bit write per cycle core semi-private 4 mib unified l2 cache cache assigned specific core fast access two cores share 32 mib l3 cache die using 80 gb/s bus power6 connect 31 processors using two inter node links 50 gb/s supports 10 logical partitions per core limit 254 per system interface service processor monitors adjusts performance power according set parameters ibm also makes use 5 ghz duty-cycle correction clock distribution network processor network company implements copper distribution wire 3 µm wide 1.2 µm thick power6 design uses dual power supplies logic supply 0.8-to-1.2 volt range sram power supply 150-mv higher thermal characteristics power6 similar power5 dr frank soltis ibm chief scientist said ibm solved power leakage problems associated high frequency using combination 90 nm 65 nm parts power6 design slightly enhanced power6+ introduced april 2009 shipping power 560 570 systems since october 2008 added memory keys secure memory partition feature taken ibm mainframe processors range power6 systems includes express models 520 550 560 enterprise models 570 595 various system models designed serve sized business example 520 express marketed small businesses power 595 marketed large multi-environment data centers main difference express enterprise models latter include capacity upgrade demand cuod capabilities hot-pluggable processor memory books ibm also offers four power6 based blade servers specifications shown table blades support aix linux bladecenter h chassis supported blades running aix linux bladecenter e ht chassis support blades running aix linux supercomputing 2007 sc07 conference reno new water-cooled power 575 revealed 575 composed 2u nodes 32 power6 cores 4.7 ghz 256 gb ram 448 cores installed single frame | [
7327,
2719,
3348,
4661,
3936,
1075,
1346,
4847,
2458,
3440,
1083,
4408,
5652,
912,
2845,
3708,
5042,
7453,
5665,
4702,
1199,
1386,
1388,
1855,
7099,
234,
2501,
239,
6474,
763,
8125,
4815,
1131,
6226,
608,
7499,
1237,
2257,
3156,
3674,
4... | Test |
7,362 | 3 | Bosconian:bosconian bosconian allows player ship freely roam across open space scrolls directions game also radar tracks position player ship enemy formation attacks space stations objective bosconian score many points possible destroying enemy missiles bases player controls small fighter ship move eight directions fire forward backward round consists number green enemy bases must destroyed advance next round semi-transparent automap helps identify location station consists six cannons arranged hexagon surrounding central core player must either destroy six cannons 200 points shoot core destroy station 1,500 points later rounds core capable defending opening closing launching missiles additionally player must avoid destroy stationary asteroids 10 points mines 20 points variety enemy missiles ships attempt collide ship enemy bases also occasionally launch squadron ships formation attacks — destroying leader causes remaining enemies disperse destroying enemies formation scores extra bonus points spy ship worth random bonus value also appear occasionally must destroyed round go condition red regardless long player taken throughout game digitized voice alerts player various events bosconian definite ending continue player lost lives similar galaga bosconian rolls round 255 round 0 causing game behave abnormally round player successfully complete round 0 game continues round 1 though player started upon scoring 2,000,000 points lives thereafter bosconian 1982 arcade award best science fiction/fantasy coin-op game january 1983 beating atari gravitar sega zaxxon bosconian later appeared several namco museum compilations playstation consoles game also released jakks pacific tv game controllers released part pac-man arcade party arcade machine 2010 home computer sequel bosconian '87 released 1987 amstrad cpc commodore 64 zx spectrum spiritual successor blast released 1989 japan runs namco system 1 hardware bears resemblance namco dragon spirit bosconian related title final blaster released 1990 pc-engine japan featured gameplay akin blast bosconian one first games continuation screen edged fantasy released one month earlier 1981 feature could disabled entirely arcade owners want changing dip switch setting | [
8052,
723,
7179,
1237
] | Test |
7,363 | 4 | Internet_Crimes_Against_Children:internet crimes children internet crimes children icac task-force started united states department justice office juvenile justice delinquency prevention ojjdp 1998 primary goals provide state local law enforcement agencies tools prevent internet crimes children encouraging multi-jurisdictional cooperation well educating law enforcement agents parents teachers aims icac task forces catch distributors child pornography internet whether delivered on-line solicited on-line distributed channels catch sexual predators solicit victims internet chat rooms forums methods currently fifty states participate icac | [
7286,
7181,
560
] | Validation |
7,364 | 3 | StrongARM:strongarm strongarm family computer microprocessors developed digital equipment corporation manufactured late 1990s implemented arm v4 instruction set architecture later sold intel 1997 continued manufacture replacing xscale early 2000s strongarm collaborative project dec advanced risc machines create faster arm microprocessor strongarm designed address upper-end low-power embedded market users needed performance arm could deliver able accept external support targets devices newer personal digital assistants set-top boxes traditionally semiconductor division dec located massachusetts order gain access design talent silicon valley dec opened design center palo alto california design center led dan dobberpuhl main design site strongarm project another design site worked project austin texas created ex-dec designers returning apple computer motorola project set 1995 quickly delivered first design sa-110 dec agreed sell strongarm intel part lawsuit settlement 1997 intel used strongarm replace ailing line risc processors i860 i960 semiconductor division dec sold intel many engineers palo alto design group moved sibyte start-up company designing mips system-on-a-chip soc products networking market austin design group spun become alchemy semiconductor another start-up company designing mips socs hand-held market new strongarm core developed intel introduced 2000 xscale sa-110 first microprocessor strongarm family first versions operating 100 160 200 mhz announced 5 february 1996 announced samples versions available volume production slated mid-1996 faster 166 233 mhz versions announced 12 september 1996 samples versions available announcement volume production slated december 1996 throughout 1996 sa-110 highest performing microprocessor portable devices towards end 1996 leading cpu internet/intranet appliances thin client systems sa-110 first design win apple messagepad 2000 also used number products including acorn computers risc pc eidos optima video editing system sa-110 lead designers daniel w. dobberpuhl gregory w. hoeppner liam madden richard t. witek sa-110 simple microarchitecture scalar design executed instructions in-order five-stage classic risc pipeline microprocessor partitioned several blocks ibox ebox immu dmmu biu wb pll ibox contained hardware operated first two stages pipeline program counter fetched decoded issued instructions instruction fetch occurs first stage decode issue second ibox decodes complex instructions arm instruction set translating sequences simpler instructions ibox also handled branch instructions sa-110 branch prediction hardware mechanisms speedy processing execution starts stage three hardware operates stage contained ebox comprises register file arithmetic logic unit alu barrel shifter multiplier condition code logic register file three read ports two write ports alu barrel shifter executed instructions single cycle multiplier pipelined latency multiple cycles immu dmmu memory management units instructions data respectively mmu contained 32-entry fully associative translation lookaside buffer tlb map 4 kb 64 kb 1 mb pages write buffer wb eight 16-byte entries enables pipelining stores bus interface unit biu provided sa-110 external interface pll generates internal clock signal external 3.68 mhz clock signal designed dec contracted centre suisse d'electronique et de microtechnique csem located neuchâtel switzerland instruction cache data cache capacity 16 kb 32-way set-associative virtually addressed sa-110 designed used slow therefore low-cost memory therefore high set associativity allows higher hit rate competing designs use virtual addresses allows memory simultaneously cached uncached caches responsible transistor count take half die area sa-110 contained 2.5 million transistors 7.8 mm 6.4 mm large 49.92 mm fabricated dec proprietary cmos-6 process fab 6 fab hudson massachusetts cmos-6 dec sixth-generation complementary metal–oxide–semiconductor cmos process cmos-6 0.35 µm feature size 0.25 µm effective channel length use sa-110 three levels aluminium interconnect used power supply variable voltage 1.2 2.2 volts v enable designs find balance power consumption performance higher voltages enable higher clock rates sa-110 packaged 144-pin thin quad flat pack tqfp sa-1100 derivative sa-110 developed dec announced 1997 sa-1100 targeted portable applications pdas differs sa-110 providing number features desirable applications accommodate features data cache reduced size 8 kb extra features integrated memory pcmcia color lcd controllers connected on-die system bus five serial i/o channels connected peripheral bus attached system bus memory controller supported fpm edo dram sram flash rom pcmcia controller supports two slots memory address data bus shared pcmcia interface glue logic required serial i/o channels implement slave usb interface sdlc two uarts irda interface mcp synchronous serial port sa-1100 companion chip sa-1101 introduced intel 7 october 1998 sa-1101 provided additional peripherals complement integrated sa-1100 video output port two ps/2 ports usb controller pcmcia controller replaces sa-1100 design device started dec partially complete acquired intel finish design fabricated dec former hudson massachusetts fabrication plant also sold intel sa-1100 contained 2.5 million transistors measured 8.24 mm 9.12 mm 75.15 mm fabricated 0.35 μm cmos process three levels aluminium interconnect packaged 208-pin tqfp one early recipients processor was-ill-fated psion netbook consumer oriented sibling psion series 7 sa-1110 derivative sa-110 developed intel announced 31 march 1999 positioned alternative sa-1100 announcement samples set june 1999 volume later year intel discontinued sa-1110 early 2003 sa-1110 available 133 206 mhz versions differed sa-1100 featuring support 66 mhz 133 mhz version 103 mhz 206 mhz version sdram companion chip provided additional support peripherals sa-1111 sa-1110 packaged 256-pin micro ball grid array used mobile phones personal data assistants pdas compaq later hp ipaq hp jornada sharp sl-5x00 linux based platforms simputer also used run intel web tablet tablet device considered potentially first introduce large screen portable web browsing intel dropped product prior launch 2001 sa-1500 derivative sa-110 developed dec initially targeted set-top boxes designed manufactured low volumes dec never put production intel sa-1500 available 200 300 mhz sa-1500 featured enhanced sa-110 core on-chip coprocessor called attached media processor amp on-chip sdram i/o bus controller sdram controller supported 100 mhz sdram i/o controller implemented 32-bit i/o bus may run frequencies 50 mhz connecting peripherals sa-1501 companion chip amp implemented long instruction word instruction set containing instructions designed multimedia integer floating-point multiply–accumulate simd arithmetic long instruction word 64 bits wide specifies arithmetic operation branch load/store instructions operate operands 64-entry 36-bit register file set control registers amp communicates sa-110 core via on-chip bus shares data cache sa-110 amp contained alu shifter branch unit load/store unit multiply–accumulate unit single-precision floating-point unit amp supported user-defined instructions via 512-entry writable control store sa-1501 companion chip provided additional video audio processing capabilities various i/o functions ps/2 ports parallel port interfaces various peripherals sa-1500 contains 3.3 million transistors measures 60 mm fabricated 0.28 µm cmos process used 1.5 2.0 v internal power supply 3.3 v i/o consuming less 0.5 w 100 mhz 2.5 w 300 mhz packaged 240-pin metal quad flat package 256-ball plastic ball grid array | [
6793,
3942,
2926,
5752,
5055,
2226,
3306,
1864,
1867,
766,
2248,
6152,
441,
2977,
5802,
5804,
463,
4765,
6170,
469,
3365,
5483,
3020,
6910,
3717,
5845,
7654,
3397,
5161,
1977,
5521,
6945,
3747,
4098,
534,
2351,
4108,
1995,
4847,
4479,
3... | Validation |
7,365 | 4 | Datto_(company):datto company datto inc. american cybersecurity data backup company founded 2007 norwalk connecticut 2017 became subsidiary vista equity partners merged autotask corporation founded 2007 connecticut software programmer austin mcchord mcchord initially built marketed hand-made data backup devices securing first customers 2008 afterwards built system allowed data synchronization two computers building version zenith infotech ran linux end 2009 company 70,000 monthly sales new datto product 2010 caused old systems crash replacement system designed scratch siris released several months later free upgrade 2011 datto credited helping local hospitals impacted tornado joplin missouri retrieve data 2011 sales 9 million following year 25 million established business model sold products primarily managed service providers 2013 company continuing focus small mid-size businesses clients susan g. komen cure several nfl teams september 2013 company raised 25 million first round venture capital financing led general catalyst partners time datto 225 employees posted four consecutive years 300 percent annual growth 2014 datto inc. purchased backupify cloud-to-cloud backup company backupify focused backing data servers complementing datto focus local private clouds november 2015 company garnered 75 million series b funding round mostly led technology crossover ventures 2015 became connecticut first unicorn company early 2017 datto acquired open mesh datto acquired vista equity partners around 1.5 billion late 2017 part deal datto merged vista portfolio company autotask corporation austin mcchord remained ceo combined company mcchord stepped ceo october 2018 remaining board recent years company increased employee number significantly datto 550 employees november 2015 700 employees january 2017 883 workers october 2017 434 norwalk 1,300 employees november 2017 march 2018 number grown 1,400 month datto ranked first among midsize companies democrat chronicle ’ top workplaces list datto builds hardware software data backup recovery purposes 2016 company released siris 3 data protection platform claiming first system market ransomware detection capability | [
1376,
6335,
5784,
578
] | Test |
7,366 | 1 | Codd's_12_rules:codd 12 rules codd twelve rules set thirteen rules numbered zero twelve proposed edgar f. codd pioneer relational model databases designed define required database management system order considered relational i.e. relational database management system rdbms sometimes jokingly referred codd twelve commandments codd produced rules part personal campaign prevent vision original relational database diluted database vendors scrambled early 1980s repackage existing products relational veneer rule 12 particularly designed counter positioning rule 0 foundation rule rule 1 information rule rule 2 guaranteed access rule rule 3 systematic treatment null values rule 4 dynamic online catalog based relational model rule 5 comprehensive data sublanguage rule rule 6 view updating rule rule 7 possible high-level insert update delete rule 8 physical data independence rule 9 logical data independence rule 10 integrity independence rule 11 distribution independence rule 12 nonsubversion rule | [
2054,
6462,
6543
] | Validation |
7,367 | 3 | Genghis_Khan_(video_game):genghis khan video game genghis khan original full title 1987 turn-based strategy game developed koei originally released nec pc-9801 msx sharp x68000 1988 dos nes 1990 amiga 1990 actually second game series 1985 aoki ōkami shiroki mejika also pc-88 pc-98 msx game takes player inside virtual life either genghis khan one archrivals player must arrange marriages father children appoint family members governmental positions fight order conquer old world armies must drafted soldiers must trained player rule lands england japan game two different ways play first mongol conquest begins year 1175 a.d one player mode players assume control lord temujin must conquer land keeping economy stable army ready fight attacking lands second world conquest goal conquer every opposing country world conquest begins year 1206 a.d started choosing number players difficulty supports 1-4 players players must choose want genghis khan mongols alexios byzantine richard england yoritomo japan player must randomly select stats leader successors player must stop random number choose certain stat done stats chosen certain character redone everyone ready go game begins countries eurasia cycle goes country means used turn comes player country get make three choices choices include training troops buying certain product/quantity merchant drafting soldiers sending treaty going war act takes one choice away three choices used cycle continues every country used turns season changes cycle goes different order seasons determine must pay troops farmers harvest crop food must distributed etc 1989 computer gaming world called genghis khan toughest satisfying richest historical simulation yet 1990 survey pre-20th century wargames magazine gave four five stars 1993 three stars orson scott card viewed unfavorably writing compute compared romance tedium back regarding gameplay another reviewer magazine stated genghis khan excellent prerequisite real leadership experience forces gauge resources making decisions 2008 armağan yavuz co-founder turkish developer taleworlds cited koei genghis khan influence mount blade series | [
6380,
1085
] | Test |
7,368 | 7 | Oracle_Fusion_Middleware:oracle fusion middleware oracle fusion middleware fmw also known fusion middleware consists several software products oracle corporation fmw spans multiple services including java ee developer tools integration services business intelligence collaboration content management fmw depends open standards bpel soap xml jms oracle fusion middleware provides software development deployment management service-oriented architecture soa includes oracle calls hot-pluggable architecture designed facilitate integration existing applications systems software vendors ibm microsoft sap ag many products included fmw banner qualify middleware products fusion middleware essentially represents re-branding many oracle products outside oracle core database applications-software offerings—compare oracle fusion oracle acquired many fmw products via acquisitions includes products bea systems stellent order provide standards-based software assist business process automation hp incorporated fmw service-oriented architecture soa portfolio oracle leveraged configurable network computing cnc technology acquired peoplesoft/jd edwards 2005 purchase oracle fusion applications based oracle fusion middleware finally released september 2010 according oracle 2013 120,000 customers using fusion middleware includes 35 world 50 largest companies 750 businessweek global 1000 fmw also supported 7,500 partners january 2008 oracle webcenter content formerly universal content management infoworld technology year award best enterprise content manager oracle soa suite winning award best enterprise service bus 2007 gartner wrote oracle fusion middleware reached degree completeness puts par cases ahead competing software stacks reported revenue suite us 1 billion fy06 estimating revenue genuinely middleware aspects us 740 million | [
3764,
6878,
6594,
4482,
6270,
6986,
6184,
1185,
6279,
6281,
1105,
5666,
2489,
1760,
4427,
1115,
418,
2054,
942,
1223,
1590,
7213,
2517,
2965,
5882,
7315,
971
] | Train |
7,369 | 3 | Acrojet:acrojet acrojet 1985 flight simulator video game microprose originally developed commodore 64 c64 ported amstrad cpc msx zx spectrum nec pc-8801 nec pc-9801 emphasized aerial acrobatic flying maneuverability player flies bd5j small agile jet player complete series eight stunt courses routines jet example one set player fly plane around series pylons another player must fly figure eight stunts get harder play progresses game parameters weather configurable ten acrobatic events played four players four levels difficulty ten events player must fly series obstacles compute called acrojet realistic simulation also fun play stating game like microprose products emphasized accurate details controls original c64 version programmed william mike denman edward hill jr sound music done sid meier also researched science along denman stunts bill stealey actually retired united states air force lt colonel command pilot michael haire credited artwork | [] | Validation |
7,370 | 9 | Parameter_(computer_programming):parameter computer programming computer programming parameter formal argument special kind variable used subroutine refer one pieces data provided input subroutine pieces data values arguments often called actual arguments actual parameters subroutine going called/invoked ordered list parameters usually included definition subroutine time subroutine called arguments call evaluated resulting values assigned corresponding parameters unlike argument usual mathematical usage argument computer science thus actual input expression passed/supplied function procedure routine invocation/call statement whereas parameter variable inside implementation subroutine example one defines codice_1 subroutine codice_2 codice_3 parameters called codice_4 codice_5 arguments note variables expressions thereof calling context arguments subroutine called codice_6 variables codice_7 arguments values codice_5 see parameters arguments section information common case call value parameter acts within subroutine new local variable initialized value argument local isolated copy argument argument variable cases e.g call reference argument variable supplied caller affected actions within called subroutine discussed evaluation strategy semantics parameters declared value arguments passed parameters subroutines defined language details represented particular computer system depend calling conventions system following program c programming language defines function named salestax one parameter named price type price double i.e double-precision floating point number function return type also double function defined invoked follows example function invoked argument 10.00 happens 10.00 assigned price function begins calculating result steps producing result specified enclosed codice_9 indicates first thing multiply 0.05 value price gives 0.50. codice_10 means function produce result codice_9 therefore final result ignoring possible round-off errors one encounters representing decimal fractions binary fractions 0.50 terms parameter argument may different meanings different programming languages sometimes used interchangeably context used distinguish meaning term parameter sometimes called formal parameter often used refer variable found function definition argument sometimes called actual parameter refers actual input supplied function call example one defines function codice_12 codice_13 parameter called codice_14 codice_15 argument parameter unbound variable argument value variable complex expression involving values variables case call value passed function value argument – example codice_16 codice_17 equivalent calls – call reference variable argument passed reference variable even though syntax function call could stay specification pass-by-reference pass-by-value would made function declaration and/or definition parameters appear procedure definitions arguments appear procedure calls function definition codice_18 variable x parameter function call codice_16 value 2 argument function loosely parameter type argument instance parameter intrinsic property procedure included definition example many languages procedure add two supplied integers together calculate sum would need two parameters one integer general procedure may defined number parameters parameters procedure parameters part definition specifies parameters called parameter list contrast arguments expressions supplied procedure called usually one expression matching one parameters unlike parameters form unchanging part procedure definition arguments may vary call call time procedure called part procedure call specifies arguments called argument list although parameters also commonly referred arguments arguments sometimes thought actual values references assigned parameter variables subroutine called run-time discussing code calling subroutine values references passed subroutine arguments place code values references given parameter list discussing code inside subroutine definition variables subroutine parameter list parameters values parameters runtime arguments example c dealing threads common pass argument type void* cast expected type better understand difference consider following function written c function sum two parameters named addend1 addend2 adds values passed parameters returns result subroutine caller using technique automatically supplied c compiler code calls sum function might look like variables value1 value2 initialized values value1 value2 arguments sum function context runtime values assigned variables passed function sum arguments sum function parameters addend1 addend2 evaluated yielding arguments 40 2 respectively values arguments added result returned caller assigned variable sum_value difference parameters arguments possible supply inappropriate arguments procedure call may supply many arguments one arguments may wrong type arguments may supplied wrong order situations causes mismatch parameter argument lists procedure often return unintended answer generate runtime error within eiffel software development method language terms argument parameter distinct uses established convention term argument used exclusively reference routine inputs term parameter used exclusively type parameterization generic classes consider following routine definition routine codice_20 takes two arguments codice_21 codice_22 called routine formal arguments call codice_20 specifies actual arguments shown codice_24 codice_25 parameters also thought either formal actual formal generic parameters used definition generic classes example class codice_26 declared generic class two formal generic parameters codice_27 representing data interest codice_28 representing hash key data class hash_table g k hashable class becomes client codice_26 formal generic parameters substituted actual generic parameters generic derivation following attribute declaration codice_30 used character string based dictionary data key formal generic parameters substituted actual generic parameters type codice_31 strongly typed programming languages parameter type must specified procedure declaration languages using type inference attempt discover types automatically function body usage dynamically typed programming languages defer type resolution run-time weakly typed languages perform little type resolution relying instead programmer correctness languages use special keyword e.g void indicate subroutine parameters formal type theory functions take empty parameter list whose type void rather unit exact mechanism assigning arguments parameters called argument passing depends upon evaluation strategy used parameter typically call value may specified using keywords programming languages ada c++ clojure common lisp fortran 90 python ruby tcl windows powershell allow default argument explicitly implicitly given subroutine declaration allows caller omit argument calling subroutine default argument explicitly given value used provided caller default argument implicit sometimes using keyword optional language provides well-known value null empty zero empty string etc value provided caller powershell example default arguments seen special case variable-length argument list languages allow subroutines defined accept variable number arguments languages subroutines must iterate list arguments powershell example programming languages—such ada windows powershell—allow subroutines named parameters allows calling code self-documenting also provides flexibility caller often allowing order arguments changed arguments omitted needed powershell example lambda calculus function exactly one parameter thought functions multiple parameters usually represented lambda calculus function takes first argument returns function takes rest arguments transformation known currying programming languages like ml haskell follow scheme languages every function exactly one parameter may look like definition function multiple parameters actually syntactic sugar definition function returns function etc function application left-associative languages well lambda calculus looks like application function multiple arguments correctly evaluated function applied first argument resulting function applied second argument etc output parameter also known parameter return parameter parameter used output rather usual use input using call reference parameters call value parameters value reference output parameters idiom languages notably c c++ languages built-in support output parameters languages built-in support output parameters include ada see fortran since fortran 90 see various procedural extensions sql pl/sql see pl/sql functions transact-sql c .net framework swift scripting language tscript see tscript function declarations precisely one may distinguish three types parameters parameter modes output parameters often denoted codice_32 codice_33 codice_34 codice_35 input argument argument input parameter must value initialized variable literal must redefined assigned output argument must assignable variable need initialized existing value accessible must assigned value input/output argument must initialized assignable variable optionally assigned value exact requirements enforcement vary languages – example ada 83 output parameters assigned read even assignment removed ada 95 remove need auxiliary accumulator variable analogous notion value expression r-value value l-value assigned r-value/l-value value assigned respectively though terms specialized meanings c. cases input input/output distinguished output considered specific use input/output cases input output input/output supported default mode varies languages fortran 90 input/output default c sql extensions input default tscript parameter explicitly specified input output syntactically parameter mode generally indicated keyword function declaration codice_36 c conventionally output parameters often put end parameter list clearly distinguish though always followed tscript uses different approach function declaration input parameters listed output parameters separated colon return type function function computes size text fragment parameter modes form denotational semantics stating programmer intent allowing compilers catch errors apply optimizations – necessarily imply operational semantics parameter passing actually occurs notably input parameters implemented call value output input/output parameters call reference – straightforward way implement modes languages without built-in support – always implemented distinction discussed detail ada '83 rationale emphasizes parameter mode abstracted parameter passing mechanism reference copy actually implemented instance c input parameters default keyword passed value output input/output parameters codice_33 codice_38 passed reference pl/sql input parameters codice_39 passed reference output input/output parameters codice_40 codice_41 default passed value result copied back passed reference using codice_42 compiler hint syntactically similar construction output parameters assign return value variable name function found pascal fortran 66 fortran 77 pascal example semantically different called function simply evaluated – passed variable calling scope store output primary use output parameters return multiple values function use input/output parameters modify state using parameter passing rather shared environment global variables important use returning multiple values solve semipredicate problem returning value error status – see semipredicate problem multivalued return example return two variables function c one may write codice_13 input parameter codice_44 codice_45 output parameters common use case c related languages exception handling function places return value output variable returns boolean corresponding whether function succeeded archetypal example codice_46 method .net especially c parses string integer returning codice_47 success codice_48 failure following signature may used follows similar considerations apply returning value one several possible types return value specify type value stored one several output variables output parameters often discouraged modern programming essentially awkward confusing low-level – commonplace return values considerably easier understand work notably output parameters involve functions side effects modifying output parameter semantically similar references confusing pure functions values distinction output parameters input/output parameters subtle since common programming styles parameters simply input parameters output parameters input/output parameters unusual hence susceptible misunderstanding output input/output parameters prevent function composition since output stored variables rather value expression thus one must initially declare variable step chain functions must separate statement example c++ following function composition written output input/output parameters instead becomes codice_49 output parameter codice_27 input/output parameter special case function single output input/output parameter return value function composition possible output input/output parameter c/c++ address also returned function case becomes various alternatives use cases output parameters returning multiple values function alternative return tuple syntactically clearer automatic sequence unpacking parallel assignment used go python returning value one several types tagged union used instead common cases nullable types option types return value null indicate failure exception handling one return nullable type raise exception example python one might either idiomatically micro-optimization requiring local variable copying return using output variables also applied conventional functions return values sufficiently sophisticated compilers usual alternative output parameters c related languages return single data structure containing return values example given structure encapsulating width height one write object-oriented languages instead using input/output parameters one often use call sharing passing reference object mutating object though changing object variable refers | [
2451,
1445,
4302,
6886,
5025,
993,
6428,
2740,
304,
486,
2662,
5933,
4151,
1479,
7005,
4704,
7277,
5948,
233,
5091,
5506,
330,
5510,
5164,
6766,
5965,
4998,
171,
2530,
84,
2803,
270,
1435
] | Test |
7,371 | 4 | Personal_Internet_Security_2011:personal internet security 2011 personal internet security 2011 scareware rogue anti-virus fake computer protection program induces users think number viruses personal internet security fact virus program encourages users pay certain amount subscription clean computers protect computers users also notice different number viruses listed every time virus pops | [
6463,
700,
2354,
5401
] | Test |
7,372 | 0 | Speech_recognition:speech recognition speech recognition interdisciplinary subfield computational linguistics develops methodologies technologies enables recognition translation spoken language text computers also known automatic speech recognition asr computer speech recognition speech text stt incorporates knowledge research linguistics computer science electrical engineering fields speech recognition systems require training also called enrollment individual speaker reads text isolated vocabulary system system analyzes person specific voice uses fine-tune recognition person speech resulting increased accuracy systems use training called speaker independent systems systems use training called speaker dependent speech recognition applications include voice user interfaces voice dialing e.g call home call routing e.g would like make collect call domotic appliance control search e.g find podcast particular words spoken simple data entry e.g. entering credit card number preparation structured documents e.g radiology report determining speaker characteristics speech-to-text processing e.g. word processors emails aircraft usually termed direct voice input term voice recognition speaker identification refers identifying speaker rather saying recognizing speaker simplify task translating speech systems trained specific person voice used authenticate verify identity speaker part security process technology perspective speech recognition long history several waves major innovations recently field benefited advances deep learning big data advances evidenced surge academic papers published field importantly worldwide industry adoption variety deep learning methods designing deploying speech recognition systems key areas growth vocabulary size speaker independence processing speed raj reddy first person take continuous speech recognition graduate student stanford university late 1960s previous systems required users pause word reddy system issued spoken commands playing game chess around time soviet researchers invented dynamic time warping dtw algorithm used create recognizer capable operating 200-word vocabulary dtw processed speech dividing short frames e.g 10ms segments processing frame single unit although dtw would superseded later algorithms technique carried achieving speaker independence remained unsolved time period late 1960s leonard baum developed mathematics markov chains institute defense analysis decade later cmu raj reddy students james baker janet m. baker began using hidden markov model hmm speech recognition james baker learned hmms summer job institute defense analysis undergraduate education use hmms allowed researchers combine different sources knowledge acoustics language syntax unified probabilistic model 1980s also saw introduction n-gram language model much progress field owed rapidly increasing capabilities computers end darpa program 1976 best computer available researchers pdp-10 4 mb ram could take 100 minutes decode 30 seconds speech two practical products point vocabulary typical commercial speech recognition system larger average human vocabulary raj reddy former student xuedong huang developed sphinx-ii system cmu sphinx-ii system first speaker-independent large vocabulary continuous speech recognition best performance darpa 1992 evaluation handling continuous speech large vocabulary major milestone history speech recognition huang went found speech recognition group microsoft 1993 raj reddy student kai-fu lee joined apple 1992 helped develop speech interface prototype apple computer known casper lernout hauspie belgium-based speech recognition company acquired several companies including kurzweil applied intelligence 1997 dragon systems 2000 l h speech technology used windows xp operating system l h industry leader accounting scandal brought end company 2001 speech technology l h bought scansoft became nuance 2005 apple originally licensed software nuance provide speech recognition capability digital assistant siri 2000s darpa sponsored two speech recognition programs effective affordable reusable speech-to-text ears 2002 global autonomous language exploitation gale four teams participated ears program ibm team led bbn limsi univ pittsburgh cambridge university team composed icsi sri university washington ears funded collection switchboard telephone speech corpus containing 260 hours recorded conversations 500 speakers gale program focused arabic mandarin broadcast news speech google first effort speech recognition came 2007 hiring researchers nuance first product goog-411 telephone based directory service recordings goog-411 produced valuable data helped google improve recognition systems google voice search supported 30 languages united states national security agency made use type speech recognition keyword spotting since least 2006 technology allows analysts search large volumes recorded conversations isolate mentions keywords recordings indexed analysts run queries database find conversations interest government research programs focused intelligence applications speech recognition e.g darpa ears program iarpa babel program early 2000s speech recognition still dominated traditional approaches hidden markov models combined feedforward artificial neural networks today however many aspects speech recognition taken deep learning method called long short-term memory lstm recurrent neural network published sepp hochreiter jürgen schmidhuber 1997 lstm rnns avoid vanishing gradient problem learn deep learning tasks require memories events happened thousands discrete time steps ago important speech around 2007 lstm trained connectionist temporal classification ctc started outperform traditional speech recognition certain applications 2015 google speech recognition reportedly experienced dramatic performance jump 49 ctc-trained lstm available google voice smartphone users use deep feedforward non-recurrent networks acoustic modeling introduced later part 2009 geoffrey hinton students university toronto li deng colleagues microsoft research initially collaborative work microsoft university toronto subsequently expanded include ibm google hence shared views four research groups subtitle 2012 review paper microsoft research executive called innovation dramatic change accuracy since 1979 contrast steady incremental improvements past decades application deep learning decreased word error rate 30 innovation quickly adopted across field researchers begun use deep learning techniques language modeling well long history speech recognition shallow form deep form e.g recurrent nets artificial neural networks explored many years 1980s 1990s years 2000s methods never non-uniform internal-handcrafting gaussian mixture model/hidden markov model gmm-hmm technology based generative models speech trained discriminatively number key difficulties methodologically analyzed 1990s including gradient diminishing weak temporal correlation structure neural predictive models difficulties addition lack big training data big computing power early days speech recognition researchers understood barriers hence subsequently moved away neural nets pursue generative modeling approaches recent resurgence deep learning starting around 2009–2010 overcome difficulties hinton et al deng et al reviewed part recent history collaboration colleagues across four groups university toronto microsoft google ibm ignited renaissance applications deep feedforward neural networks speech recognition early 2010s speech recognition also called voice recognition clearly differentiated speaker recognition speaker independence considered major breakthrough systems required training period 1987 ad doll carried tagline finally doll understands – despite fact described children could train respond voice 2017 microsoft researchers reached historical human parity milestone transcribing conversational telephony speech widely benchmarked switchboard task multiple deep learning models used optimize speech recognition accuracy speech recognition word error rate reported low 4 professional human transcribers working together benchmark funded ibm watson speech team task acoustic modeling language modeling important parts modern statistically-based speech recognition algorithms hidden markov models hmms widely used many systems language modeling also used many natural language processing applications document classification statistical machine translation modern general-purpose speech recognition systems based hidden markov models statistical models output sequence symbols quantities hmms used speech recognition speech signal viewed piecewise stationary signal short-time stationary signal short time-scale e.g. 10 milliseconds speech approximated stationary process speech thought markov model many stochastic purposes another reason hmms popular trained automatically simple computationally feasible use speech recognition hidden markov model would output sequence n -dimensional real-valued vectors n small integer 10 outputting one every 10 milliseconds vectors would consist cepstral coefficients obtained taking fourier transform short time window speech decorrelating spectrum using cosine transform taking first significant coefficients hidden markov model tend state statistical distribution mixture diagonal covariance gaussians give likelihood observed vector word general speech recognition systems phoneme different output distribution hidden markov model sequence words phonemes made concatenating individual trained hidden markov models separate words phonemes described core elements common hmm-based approach speech recognition modern speech recognition systems use various combinations number standard techniques order improve results basic approach described typical large-vocabulary system would need context dependency phonemes phonemes different left right context different realizations hmm states would use cepstral normalization normalize different speaker recording conditions speaker normalization might use vocal tract length normalization vtln male-female normalization maximum likelihood linear regression mllr general speaker adaptation features would so-called delta delta-delta coefficients capture speech dynamics addition might use heteroscedastic linear discriminant analysis hlda might skip delta delta-delta coefficients use splicing lda-based projection followed perhaps heteroscedastic linear discriminant analysis global semi-tied co variance transform also known maximum likelihood linear transform mllt many systems use so-called discriminative training techniques dispense purely statistical approach hmm parameter estimation instead optimize classification-related measure training data examples maximum mutual information mmi minimum classification error mce minimum phone error mpe decoding speech term happens system presented new utterance must compute likely source sentence would probably use viterbi algorithm find best path choice dynamically creating combination hidden markov model includes acoustic language model information combining statically beforehand finite state transducer fst approach possible improvement decoding keep set good candidates instead keeping best candidate use better scoring function scoring rate good candidates may pick best one according refined score set candidates kept either list n-best list approach subset models lattice scoring usually done trying minimize bayes risk approximation thereof instead taking source sentence maximal probability try take sentence minimizes expectancy given loss function regards possible transcriptions i.e. take sentence minimizes average distance possible sentences weighted estimated probability loss function usually levenshtein distance though different distances specific tasks set possible transcriptions course pruned maintain tractability efficient algorithms devised score lattices represented weighted finite state transducers edit distances represented finite state transducer verifying certain assumptions dynamic time warping approach historically used speech recognition largely displaced successful hmm-based approach dynamic time warping algorithm measuring similarity two sequences may vary time speed instance similarities walking patterns would detected even one video person walking slowly another walking quickly even accelerations deceleration course one observation dtw applied video audio graphics – indeed data turned linear representation analyzed dtw well-known application automatic speech recognition cope different speaking speeds general method allows computer find optimal match two given sequences e.g. time series certain restrictions sequences warped non-linearly match sequence alignment method often used context hidden markov models neural networks emerged attractive acoustic modeling approach asr late 1980s since neural networks used many aspects speech recognition phoneme classification isolated word recognition audiovisual speech recognition audiovisual speaker recognition speaker adaptation neural networks make fewer explicit assumptions feature statistical properties hmms several qualities making attractive recognition models speech recognition used estimate probabilities speech feature segment neural networks allow discriminative training natural efficient manner however spite effectiveness classifying short-time units individual phonemes isolated words early neural networks rarely successful continuous recognition tasks limited ability model temporal dependencies one approach limitation use neural networks pre-processing feature transformation dimensionality reduction step prior hmm based recognition however recently lstm related recurrent neural networks rnns time delay neural networks tdnn demonstrated improved performance area deep neural networks denoising autoencoders also investigation deep feedforward neural network dnn artificial neural network multiple hidden layers units input output layers similar shallow neural networks dnns model complex non-linear relationships dnn architectures generate compositional models extra layers enable composition features lower layers giving huge learning capacity thus potential modeling complex patterns speech data success dnns large vocabulary speech recognition occurred 2010 industrial researchers collaboration academic researchers large output layers dnn based context dependent hmm states constructed decision trees adopted recent overview articles one fundamental principle deep learning away hand-crafted feature engineering use raw features principle first explored successfully architecture deep autoencoder raw spectrogram linear filter-bank features showing superiority mel-cepstral features contain stages fixed transformation spectrograms true raw features speech waveforms recently shown produce excellent larger-scale speech recognition results since 2014 much research interest end-to-end asr traditional phonetic-based i.e. hmm-based model approaches required separate components training pronunciation acoustic language model end-to-end models jointly learn components speech recognizer valuable since simplifies training process deployment process example n-gram language model required hmm-based systems typical n-gram language model often takes several gigabytes memory making impractical deploy mobile devices consequently modern commercial asr systems google apple 2017 deployed cloud require network connection opposed device locally first attempt end-to-end asr connectionist temporal classification ctc -based systems introduced alex graves google deepmind navdeep jaitly university toronto 2014 model consisted recurrent neural networks ctc layer jointly rnn-ctc model learns pronunciation acoustic model together however incapable learning language due conditional independence assumptions similar hmm consequently ctc models directly learn map speech acoustics english characters models make many common spelling mistakes must rely separate language model clean transcripts later baidu expanded work extremely large datasets demonstrated commercial success chinese mandarin english 2016 university oxford presented lipnet first end-to-end sentence-level lip reading model using spatiotemporal convolutions coupled rnn-ctc architecture surpassing human-level performance restricted grammar dataset large-scale cnn-rnn-ctc architecture presented 2018 google deepmind achieving 6 times better performance human experts alternative approach ctc-based models attention-based models attention-based asr models introduced simultaneously chan et al carnegie mellon university google brain bahdanau et al university montreal 2016 model named listen attend spell las literally listens acoustic signal pays attention different parts signal spells transcript one character time unlike ctc-based models attention-based models conditional-independence assumptions learn components speech recognizer including pronunciation acoustic language model directly means deployment need carry around language model making practical deployment onto applications limited memory end 2016 attention-based models seen considerable success including outperforming ctc models without external language model various extensions proposed since original las model latent sequence decompositions lsd proposed carnegie mellon university mit google brain directly emit sub-word units natural english characters university oxford google deepmind extended las watch listen attend spell wlas handle lip reading surpassing human-level performance typically manual control input example means finger control steering-wheel enables speech recognition system signalled driver audio prompt following audio prompt system listening window may accept speech input recognition simple voice commands may used initiate phone calls select radio stations play music compatible smartphone mp3 player music-loaded flash drive voice recognition capabilities vary car make model recent car models offer natural-language speech recognition place fixed set commands allowing driver use full sentences common phrases systems therefore need user memorize set fixed command words health care sector speech recognition implemented front-end back-end medical documentation process front-end speech recognition provider dictates speech-recognition engine recognized words displayed spoken dictator responsible editing signing document back-end deferred speech recognition provider dictates digital dictation system voice routed speech-recognition machine recognized draft document routed along original voice file editor draft edited report finalized deferred speech recognition widely used industry currently one major issues relating use speech recognition healthcare american recovery reinvestment act 2009 arra provides substantial financial benefits physicians utilize emr according meaningful use standards standards require substantial amount data maintained emr commonly referred electronic health record ehr use speech recognition naturally suited generation narrative text part radiology/pathology interpretation progress note discharge summary ergonomic gains using speech recognition enter structured discrete data e.g. numeric values codes list controlled vocabulary relatively minimal people sighted operate keyboard mouse significant issue ehrs expressly tailored take advantage voice-recognition capabilities large part clinician interaction ehr involves navigation user interface using menus tab/button clicks heavily dependent keyboard mouse voice-based navigation provides modest ergonomic benefits contrast many highly customized systems radiology pathology dictation implement voice macros use certain phrases – e.g. normal report automatically fill large number default values and/or generate boilerplate vary type exam – e.g. chest x-ray vs. gastrointestinal contrast series radiology system alternative navigation hand cascaded use speech recognition information extraction studied way fill handover form clinical proofing sign-off results encouraging paper also opens data together related performance benchmarks processing software research development community studying clinical documentation language-processing prolonged use speech recognition software conjunction word processors shown benefits short-term-memory restrengthening brain avm patients treated resection research needs conducted determine cognitive benefits individuals whose avms treated using radiologic techniques substantial efforts devoted last decade test evaluation speech recognition fighter aircraft particular note us program speech recognition advanced fighter technology integration afti /f-16 aircraft f-16 vista program france mirage aircraft programs uk dealing variety aircraft platforms programs speech recognizers operated successfully fighter aircraft applications including setting radio frequencies commanding autopilot system setting steer-point coordinates weapons release parameters controlling flight display working swedish pilots flying jas-39 gripen cockpit englund 2004 found recognition deteriorated increasing g-loads report also concluded adaptation greatly improved results cases introduction models breathing shown improve recognition scores significantly contrary might expected effects broken english speakers found evident spontaneous speech caused problems recognizer might expected restricted vocabulary proper syntax could thus expected improve recognition accuracy substantially eurofighter typhoon currently service uk raf employs speaker-dependent system requiring pilot create template system used safety-critical weapon-critical tasks weapon release lowering undercarriage used wide range cockpit functions voice commands confirmed visual and/or aural feedback system seen major design feature reduction pilot workload even allows pilot assign targets aircraft two simple voice commands wingmen five commands speaker-independent systems also developed test f35 lightning ii jsf alenia aermacchi m-346 master lead-in fighter trainer systems produced word accuracy scores excess 98 problems achieving high recognition accuracy stress noise pertain strongly helicopter environment well jet fighter environment acoustic noise problem actually severe helicopter environment high noise levels also helicopter pilot general wear facemask would reduce acoustic noise microphone substantial test evaluation programs carried past decade speech recognition systems applications helicopters notably u.s. army avionics research development activity avrada royal aerospace establishment rae uk work france included speech recognition puma helicopter also much useful work canada results encouraging voice applications included control communication radios setting navigation systems control automated target handover system fighter applications overriding issue voice helicopters impact pilot effectiveness encouraging results reported avrada tests although represent feasibility demonstration test environment much remains done speech recognition overall speech technology order consistently achieve performance improvements operational settings training air traffic controllers atc represents excellent application speech recognition systems many atc training systems currently require person act pseudo-pilot engaging voice dialog trainee controller simulates dialog controller would conduct pilots real atc situation speech recognition synthesis techniques offer potential eliminate need person act pseudo-pilot thus reducing training support personnel theory air controller tasks also characterized highly structured speech primary output controller hence reducing difficulty speech recognition task possible practice rarely case faa document 7110.65 details phrases used air traffic controllers document gives less 150 examples phrases number phrases supported one simulation vendors speech recognition systems excess 500,000 usaf usmc us army us navy faa well number international atc training organizations royal australian air force civil aviation authorities italy brazil canada currently using atc simulators speech recognition number different vendors asr commonplace field telephony becoming widespread field computer gaming simulation telephony systems asr predominantly used contact centers integrating ivr systems despite high level integration word processing general personal computing field document production asr seen expected increases use improvement mobile processor speeds made speech recognition practical smartphones speech used mostly part user interface creating predefined custom speech commands language learning speech recognition useful learning second language teach proper pronunciation addition helping person develop fluency speaking skills students blind see blindness education low vision benefit using technology convey words hear computer recite well use computer commanding voice instead look screen keyboard students physically disabled suffer repetitive strain injury/other injuries upper extremities relieved worry handwriting typing working scribe school assignments using speech-to-text programs also utilize speech recognition technology freely enjoy searching internet using computer home without physically operate mouse keyboard speech recognition allow students learning disabilities become better writers saying words aloud increase fluidity writing alleviated concerns regarding spelling punctuation mechanics writing also see learning disability use voice recognition software conjunction digital audio recorder personal computer running word-processing software proven positive restoring damaged short-term-memory capacity stroke craniotomy individuals people disabilities benefit speech recognition programs individuals deaf hard hearing speech recognition software used automatically generate closed-captioning conversations discussions conference rooms classroom lectures and/or religious services speech recognition also useful people difficulty using hands ranging mild repetitive stress injuries involve disabilities preclude using conventional computer input devices fact people used keyboard lot developed rsi became urgent early market speech recognition speech recognition used deaf telephony voicemail text relay services captioned telephone individuals learning disabilities problems thought-to-paper communication essentially think idea processed incorrectly causing end differently paper possibly benefit software technology bug proof also whole idea speak text hard intellectually disabled person due fact rare anyone tries learn technology teach person disability type technology help dyslexia disabilities still question effectiveness product problem hindering effective although kid may able say word depending clear say technology may think saying another word input wrong one giving work fix causing take time fixing wrong word performance speech recognition systems usually evaluated terms accuracy speed accuracy usually rated word error rate wer whereas speed measured real time factor measures accuracy include single word error rate swer command success rate csr speech recognition machine complex problem however vocalizations vary terms accent pronunciation articulation roughness nasality pitch volume speed speech distorted background noise echoes electrical characteristics accuracy speech recognition may vary following mentioned earlier article accuracy speech recognition may vary depending following factors discontinuous speech full sentences separated silence used therefore becomes easier recognize speech well isolated speech continuous speech naturally spoken sentences used therefore becomes harder recognize speech different isolated discontinuous speech constraints often represented grammar speech recognition multi-levelled pattern recognition task e.g known word pronunciations legal word sequences compensate errors uncertainties lower level telephone speech sampling rate 8000 samples per second computed every 10 ms one 10 ms section called frame analysis four-step neural network approaches explained information sound produced air medium vibration register ears machines receivers basic sound creates wave two descriptions amplitude strong frequency often vibrates per second speech recognition become means attack theft accidental operation example activation words like alexa spoken audio video broadcast cause devices homes offices start listening input inappropriately possibly take unwanted action voice-controlled devices also accessible visitors building even outside building heard inside attackers may able gain access personal information like calendar address book contents private messages documents may also able impersonate user send messages make online purchases two attacks demonstrated use artificial sounds one transmits ultrasound attempt send commands without nearby people noticing adds small inaudible distortions speech music specially crafted confuse specific speech recognition system recognizing music speech make sounds like one command human sound like different command system popular speech recognition conferences held year two include speechtek speechtek europe icassp interspeech/eurospeech ieee asru conferences field natural language processing acl naacl emnlp hlt beginning include papers speech processing important journals include ieee transactions speech audio processing later renamed ieee transactions audio speech language processing since sept 2014 renamed ieee/acm transactions audio speech language processing—after merging acm publication computer speech language speech communication books like fundamentals speech recognition lawrence rabiner useful acquire basic knowledge may fully date 1993 another good source statistical methods speech recognition frederick jelinek spoken language processing 2001 xuedong huang etc computer speech manfred r. schroeder second edition published 2004 speech processing dynamic optimization-oriented approach published 2003 li deng doug o'shaughnessey updated textbook speech language processing 2008 jurafsky martin presents basics state art asr speaker recognition also uses features front-end processing classification techniques done speech recognition comprehensive textbook fundamentals speaker recognition depth source date details theory practice good insight techniques used best modern systems gained paying attention government sponsored evaluations organised darpa largest speech recognition-related project ongoing 2007 gale project involves speech recognition translation components good accessible introduction speech recognition technology history provided general audience book voice machine building computers understand speech roberto pieraccini 2012 recent book speech recognition automatic speech recognition deep learning approach publisher springer written microsoft researchers d. yu l. deng published near end 2014 highly mathematically oriented technical detail deep learning methods derived implemented modern speech recognition systems based dnns related deep learning methods related book published earlier 2014 deep learning methods applications l. deng d. yu provides less technical methodology-focused overview dnn-based speech recognition 2009–2014 placed within general context deep learning applications including speech recognition also image recognition natural language processing information retrieval multimodal processing multitask learning terms freely available resources carnegie mellon university sphinx toolkit one place start learn speech recognition start experimenting another resource free copyrighted htk book accompanying htk toolkit recent state-of-the-art techniques kaldi toolkit used 2017 mozilla launched open source project called common voice gather big database voices would help build free speech recognition project deepspeech available free github using google open source platform tensorflow commercial cloud based speech recognition apis broadly available aws azure ibm gcp demonstration on-line speech recognizer available cobalt webpage software resources see list speech recognition software | [
3601,
1444,
3941,
715,
5372,
7539,
3285,
5388,
3292,
2215,
740,
4702,
2579,
4337,
6829,
3651,
4349,
2591,
4726,
1129,
5429,
2900,
2614,
4753,
3349,
458,
4760,
803,
3363,
6548,
4426,
3721,
1582,
7290,
150,
1585,
4442,
1592,
4089,
5875,
5... | Test |
7,373 | 5 | Link_Capacity_Adjustment_Scheme:link capacity adjustment scheme link capacity adjustment scheme lcas method dynamically increase decrease bandwidth virtual concatenated containers lcas protocol specified itu-t g.7042 allows on-demand increase decrease bandwidth virtual concatenated group hitless manner brings bandwidth-on-demand capability data clients like ethernet mapped tdm containers lcas also able temporarily remove failed members virtual concatenation group failed member automatically cause decrease bandwidth repair bandwidth increase hitless fashion together diverse routing provides survivability data traffic without requiring excess protection bandwidth allocation | [] | Validation |
7,374 | 9 | MVEL:mvel mvflex expression language mvel hybrid dynamic/statically typed embeddable expression language runtime java platform originally started utility language application framework project developed completely independently mvel typically used exposing basic logic end-users programmers configuration xml files annotations may also used parse simple javabean expressions runtime allows mvel expressions executed either interpretively pre-compilation process support runtime bytecode generation remove overhead since mvel meant augment java-based software borrows syntax directly java programming language minor differences additional capabilities example side effect mvel typing model treats class method references regular variables possible use class function pointers static methods mvel also allows collections represented folds projections lisp-like syntax mvel relies java namespaces classes possess ability declare namespaces classes example quicksort algorithm implemented mvel 2.0 demonstrating scripting capabilities language | [
4543,
3915,
5571,
2420,
6681
] | Test |
7,375 | 9 | Backus–Naur_form:backus–naur form computer science backus–naur form backus normal form bnf notation technique context-free grammars often used describe syntax languages used computing computer programming languages document formats instruction sets communication protocols applied wherever exact descriptions languages needed instance official language specifications manuals textbooks programming language theory many extensions variants original backus–naur notation used exactly defined including extended backus–naur form ebnf augmented backus–naur form abnf idea describing structure language using rewriting rules traced back least work pāṇini ancient indian sanskrit grammarian revered scholar hinduism lived sometime 7th 4th century bce notation describe sanskrit word structure notation equivalent power backus many similar properties western society grammar long regarded subject teaching rather scientific study descriptions informal targeted practical usage first half 20th century linguists leonard bloomfield zellig harris started attempts formalize description language including phrase structure meanwhile string rewriting rules formal logical systems introduced studied mathematicians axel thue 1914 emil post 1920s–40s alan turing 1936 noam chomsky teaching linguistics students information theory mit combined linguistics mathematics taking essentially thue formalism basis description syntax natural language also introduced clear distinction generative rules context-free grammars transformation rules 1956 john backus programming language designer ibm proposed metalanguage metalinguistic formulas describe syntax new programming language ial known today algol 58 1959 notation first used algol 60 report bnf notation chomsky context-free grammars apparently backus familiar chomsky work proposed backus formula defined classes whose names enclosed angle brackets example codice_1 names denotes class basic symbols development algol led algol 60 committee 1963 report peter naur called backus notation backus normal form donald knuth argued bnf rather read backus–naur form normal form conventional sense unlike instance chomsky normal form name pāṇini backus form also suggested view fact expansion backus normal form may accurate pāṇini independently developed similar notation earlier bnf described peter naur algol 60 report metalinguistic formula another example algol 60 report illustrates major difference bnf metalanguage chomsky context-free grammar metalinguistic variables require rule defining formation formation may simply described natural language within brackets following algol 60 report section 2.3 comments specification exemplifies works purpose including text among symbols program following comment conventions hold equivalence meant three structures shown left column may replaced occurrence outside strings symbol shown line right column without effect action program naur changed two backus symbols commonly available characters := symbol originally ≡ symbol originally word bar expr := term expr addop term first symbol alternative may class defined repetition explained naur function specifying alternative sequence recursively begin previous alternative repeated number times example codice_3 defined codice_4 followed number codice_5 later metalanguages schorre meta ii bnf recursive repeat construct replaced sequence operator target language symbols defined using quoted strings codice_6 codice_7 bracket removed mathematical grouping codice_8 added codice_3 rule would appear meta ii expr term '+ term .out 'add '- term .out 'sub changes made meta ii derivative programming languages able define extend metalanguage ability use natural language description metalinguistic variable language construct description lost many spin-off metalanguages inspired bnf see meta ii tree-meta metacompiler bnf class describes language construct formation formation defined pattern action forming pattern class name expr described natural language codice_4 followed sequence codice_5 class abstraction talk independent formation talk term independent definition added subtracted expr talk term specific data type expr evaluated specific combinations data types even reordering expression group data types evaluation results mixed types natural-language supplement provided specific details language class semantics used compiler implementation programmer writing algol program natural-language description supplemented syntax well integer rule good example natural metalanguage used describe syntax integer := digit integer digit specifics white space far rule states could space digits natural language complement bnf metalanguage explaining digit sequence white space digits english one possible natural languages translations algol reports available many natural languages origin bnf important impact programming language development period immediately following publication algol 60 report bnf basis many compiler-compiler systems directly used bnf like syntax directed compiler algol 60 developed edgar t. irons compiler building system developed brooker morris others changed programming language schorre metacompilers made programming language changes codice_12 became symbol identifiers dropping enclosing using quoted strings symbols target language arithmetic like grouping provided simplification removed using classes grouping value meta ii arithmetic expression rule shows grouping use output expressions placed meta ii rule used output code labels assembly language rules meta ii equivalent class definitions bnf unix utility yacc based bnf code production similar meta ii yacc commonly used parser generator roots obviously bnf bnf today one oldest computer-related languages still use bnf specification set derivation rules written symbol nonterminal __expression__ consists one sequences symbols sequences separated vertical bar indicating choice whole possible substitution symbol left symbols never appear left side terminals hand symbols appear left side non-terminals always enclosed pair := means symbol left must replaced expression right example consider possible bnf u.s. postal address opt-suffix-part := sr. jr. roman-numeral translates english note many things format first-name apartment specifier zip-code roman numeral left unspecified necessary may described using additional bnf rules bnf syntax may represented bnf like following note empty string original bnf use quotes shown codice_13 rule assumes whitespace necessary proper interpretation rule codice_14 represents appropriate line-end specifier ascii carriage-return line-feed depending operating system codice_15 codice_16 substituted declared rule name/label literal text respectively u.s. postal address example entire block-quote syntax line unbroken grouping lines rule example one rule begins codice_17 part rule aside line-end expression consists two lists separated pipe codice_18 two lists consists terms three terms two terms respectively term particular rule rule-name many variants extensions bnf generally either sake simplicity succinctness adapt specific application one common feature many variants use regular expression repetition operators codice_19 codice_20 extended backus–naur form ebnf common one another common extension use square brackets around optional items although present original algol 60 report instead introduced years later ibm pl/i definition notation universally recognised augmented backus–naur form abnf routing backus–naur form rbnf extensions commonly used describe internet engineering task force ietf protocols parsing expression grammars build bnf regular expression notations form alternative class formal grammar essentially analytic rather generative character many bnf specifications found online today intended human-readable non-formal often include many following syntax rules extensions | [
1157,
6882,
1361,
4046,
1365,
2740,
304,
5571,
5932,
3463,
1381,
5312,
1951,
7383,
1114,
5948,
1032,
5621,
1877,
764,
4728,
2514,
4361,
6485,
7305,
6497
] | Test |
7,376 | 3 | Apple_A10:apple a10 apple a10 fusion 64-bit arm-based system chip soc designed apple inc. manufactured tsmc first appeared iphone 7 7 plus introduced september 7 2016 addition a10 chip processor sixth-generation ipad seventh-generation ipod touch a10 first apple-designed quad-core soc two high-performance cores two energy-efficient cores apple states 40 greater cpu performance 50 greater graphics performance compared predecessor apple a9 a10 internally t8010 built tsmc 16 nm finfet process contains 3.3 billion transistors including gpu caches die size 125 mm features two apple-designed 64-bit 2.34 ghz armv8-a cores called hurricane die size 4.18 mm first apple-produced quad-core soc two high-performance cores designed demanding tasks like gaming also featuring two energy-efficient apple-designed 64-bit cores codenamed zephyr 0.78 mm normal tasks configuration similar arm big.little technology however unlike implementations big.little snapdragon 820 exynos 8890 one core type active time either high-performance low-power cores thus a10 fusion appears software benchmarks dual core chip apple claims high-performance cores 40 faster apple previous a9 processor two high-efficiency cores consume 20 power high performance hurricane cores used performing simple tasks checking email new performance controller decides realtime pair cores run given task order optimize performance battery life a10 l1 cache 64 kb data 64 kb instructions l2 cache 3 mb shared cores 4 mb l3 cache services entire soc new 6-core gpu built a10 chip 50 faster consuming 66 power a9 predecessor analysis suggested apple kept gt7600 used apple a9 replaced portions powervr based gpu proprietary designs changes appear using lower half-precision floating-point numbers allowing higher-performance lower power consumption embedded a10 m10 motion coprocessor a10 also includes new image processor apple says twice throughput prior image processor a10 adds hardware encoding heif hevc a10 packaged new info packaging tsmc reduces height package package also four lpddr4 ram chips integrating 2 gb ram iphone 7 ipad 6th generation ipod touch 7th generation 3 gb iphone 7 plus | [
6788,
3940,
6421,
7890,
5732,
722,
1799,
1094,
4320,
2926,
4690,
5037,
5740,
1473,
734,
5750,
5752,
405,
5405,
5406,
1864,
6125,
2954,
1123,
7572,
6482,
6847,
67,
6142,
2609,
1895,
4373,
7226,
4376,
2978,
5091,
446,
4749,
5450,
7601,
45... | Validation |
7,377 | 3 | Arcus_II:_Silent_Symphony:arcus ii silent symphony | [] | Test |
7,378 | 2 | TRSDOS:trsdos trsdos stood tandy radio shack disk operating system operating system tandy trs-80 line 8-bit zilog z80 microcomputers sold radio shack late 1970s early 1980s tandy manuals recommended pronounced triss-doss trsdos confused tandy dos version ms-dos licensed microsoft tandy x86 line personal computers pcs original trs-80 model 1977 trsdos primarily way extending mbasic basic rom additional i/o input/output commands worked disk files rather cassette tapes used non-disk model systems later disk-equipped model iii computers used completely different version trsdos radio shack culminated 1981 trsdos version 1.3 1983 disk-equipped trs-80 model 4 computers used trsdos version 6 development model iii ldos logical systems inc last updated 1987 released ls-dos 6.3 completely unrelated version trsdos radio shack trs-80 model ii professional computer 1979 also based z80 equipped 8 inch disk drives later machines line models 12 16 6000 used z80 alternate cpu main motorola 68000 chip could run version trsdos backwards compatibility older z80 applications software model trsdos supports four floppy mini-diskette drives use 5¼-inch diskettes capacity 89kb later 160kb formatted double-density sectors versions trsdos models 4 ii support double-density double sided floppy diskettes formatted 80 tracks per side including 3.5 inch microfloppy drives available 1985 drives numbered 0 3 system diskettes contain trsdos code utilities present drive 0 times trsdos uses overlays satisfy system requests disk directories maintained memory tandy corporation trs-80 microcomputer disk drive disk operating system release first version trsdos randy cook buggy others wrote alternatives including newdos ldos disputes cook ownership source code tandy hired logical systems ldos developer continue trsdos development trsdos 6 shipped trs-80 model 4 1983 identical ldos 6.00 typical trsdos utilities although ms-dos owes heritage closely cp/m thence tops-10 many file manipulation commands similar trsdos comparison cp/m command copying files called pip pun pip printers chain copy centers era acronym standing peripheral interchange program | [
2717,
1522,
4759,
4670,
7246,
1537,
6088,
5571,
578,
5232,
667,
6380,
5079,
3748,
5789,
352,
3751,
2076
] | Test |
7,379 | 7 | Tarantool:tarantool tarantool open-source nosql database management system lua application server maintains databases memory ensures crash resistance write-ahead logging includes lua interpreter interactive console also accepts connections programs several languages mail.ru one largest internet companies russia started project 2008 part development moy mir world social network 2010 project head hired former technical lead mysql open-source contributors active especially area external-language connectors c perl php python ruby node.js tarantool became part mail.ru backbone used dynamic content user sessions unsent instant messages task queues caching layer traditional relational databases mysql postgresql 2014 tarantool also adopted social network services badoo odnoklassniki latter affiliated mail.ru since 2010 june 2014 researchers polytechnic institute coimbra university coimbra portugal conducted first formal independent performance test nosql systems included tarantool tests used standard ycsb benchmark nosql systems cassandra hbase oracle nosql redis voldemort scalaris elasticsearch mongodb orientdb data maintained memory ram data persistence ensured write-ahead logging snapshotting reasons industry observers compared tarantool membase replication asynchronous failover getting one tarantool server take another possible either replica server hot standby server locks tarantool uses lua-style coroutines asynchronous i/o result application programs stored procedures must written cooperative multitasking mind rather popular preemptive multitasking database storage basic unit tuple tuples tuple sets handle role rows tables relational databases tuples arbitrary number fields fields need names every tuple database one unique null primary key one secondary keys enabled immediate lookup via indexes supported index types binary tree hash bitmap r-tree spatial fields tuple type-agnostic specific numeric string data types users may insert update delete select granted appropriate privileges tarantool 2017 introduced optional on-disk storage engine allows databases larger memory size tarantool 2019 introduced optional sql interface complies mandatory features official sql standard tarantool comes part official distributions linux distros debian fedora ubuntu tarantool organization also supplies downloads linux distributions os x freebsd tarantool extended modules installed using luarocks includes selection extension rocks | [
1438,
5983,
6428,
3368,
3371,
5571,
3542,
578,
4511,
7914,
6029,
6489,
5965,
3244,
1435
] | Validation |
7,380 | 4 | YubiKey:yubikey yubikey hardware authentication device manufactured yubico supports one-time passwords public-key encryption authentication universal 2nd factor u2f fido2 protocols developed fido alliance allows users securely log accounts emitting one-time passwords using fido-based public/private key pair generated device yubikey also allows storing static passwords use sites support one-time passwords facebook uses yubikey employee credentials google supports employees users password managers support yubikey yubico also manufactures security key device similar yubikey focused public-key authentication yubikey implements hmac-based one-time password algorithm hotp time-based one-time password algorithm totp identifies keyboard delivers one-time password usb hid protocol yubikey neo yubikey 4 include protocols openpgp card using 2048-bit rsa elliptic curve cryptography ecc p256 p384 near field communication nfc fido u2f yubikey allows users sign encrypt decrypt messages without exposing private keys outside world 4th generation yubikey launched november 16 2015 support openpgp 4096-bit rsa keys pkcs 11 support piv smart cards feature allows code signing docker images founded 2007 ceo stina ehrensvärd yubico private company offices palo alto seattle stockholm yubico cto jakob ehrensvärd lead author original strong authentication specification became known universal 2nd factor u2f yubico founded 2007 began offering pilot box developers november year original yubikey product shown annual rsa conference april 2008 robust yubikey ii model launched 2009 yubikey ii later models two slots available storing two distinct configurations separate aes secrets settings authenticating first slot used briefly pressing button device second slot gets used holding button 2 5 seconds 2010 yubico began offering yubikey oath yubikey rfid models yubikey oath added ability generate 6- 8-character one-time passwords using protocols initiative open authentication oath addition 32-character passwords used yubico otp authentication scheme yubikey rfid model included oath capability plus also included mifare classic 1k radio-frequency identification chip though separate device within package could configured normal yubico software usb connection yubico announced yubikey nano february 2012 miniaturized version standard yubikey designed would fit almost entirely inside usb port expose small touch pad button later models yubikey also available standard nano sizes 2012 also saw introduction yubikey neo improved upon previous yubikey rfid product implementing near-field communication nfc technology integrating usb side device yubikey neo neo-n nano version device able transmit one-time passwords nfc readers part configurable url contained nfc data exchange format ndef message neo also able communicate using ccid smart-card protocol addition usb hid human interface device keyboard emulation ccid mode used piv smart card openpgp support usb hid used one-time password authentication schemes 2014 yubikey neo updated fido universal 2nd factor u2f support later year yubico released fido u2f security key specifically included u2f support none one-time password static password smart card nfc features previous yubikeys launch correspondingly sold lower price point 18 compared 25 yubikey standard 40 nano version 50 yubikey neo 60 neo-n pre-release devices issued google fido/u2f development reported yubico winusb gnubby gnubby1 april 2015 company launched yubikey edge standard nano form factors slotted neo fido u2f products feature-wise designed handle otp u2f authentication include smart card nfc support yubikey 4 family devices first launched november 2015 usb-a models standard nano sizes yubikey 4 includes features yubikey neo including increasing allowed openpgp key size 4096 bits vs. previous 2048 dropped nfc capability neo ces 2017 yubico announced expansion yubikey 4 series support new usb-c design yubikey 4c released february 13 2017 android os usb-c connection one-time password feature supported android os yubikey features currently supported including universal 2nd factor u2f 4c nano version became available september 2017 april 2018 company brought security key yubico first device implement new fido2 authentication protocols webauthn reached w3c candidate recommendation status march client authenticator protocol ctap still development may 2018 launch device available standard form factor usb-a connector like previous fido u2f security key blue color uses key icon button distinguished number 2 etched plastic button keyring hole also less expensive yubikey neo yubikey 4 models costing 20 per unit launch lacks otp smart card features previous devices though retains fido u2f capability used one-time passwords stored static passwords yubikey emits characters using modified hexadecimal alphabet intended independent system keyboard settings possible alphabet referred modhex modified hexadecimal consists characters cbdefghijklnrtuv corresponding hexadecimal digits 0123456789abcdef due yubikeys using raw keyboard scan codes usb hid mode problems using devices computers set different keyboard layouts dvorak recommended either use operating system features temporarily switch standard us keyboard layout similar using one-time passwords although yubikey neo later devices configured alternate scan codes match layouts n't compatible modhex character set u2f authentication yubikeys security keys bypasses problem using alternate u2fhid protocol sends receives raw binary messages instead keyboard scan codes ccid mode acts smart card reader use hid protocols yubico replaced open-source components yubikey 4 closed-source code longer independently reviewed security flaws yubico states internal external review code done yubikey neos still using open-source code may 16 2016 yubico cto jakob ehrensvärd responded open-source community concerns blog post affirming company strong open source support addressing reasons benefits updates yubikey 4 october 2017 security researchers found vulnerability known roca implementation rsa keypair generation cryptographic library used large number infineon security chips vulnerability allows attacker reconstruct private key using public key yubikey 4 yubikey 4c yubikey 4 nano devices within revisions 4.2.6 4.3.4 affected vulnerability yubico remedied issue shipping yubikey 4 devices switching different key generation function offered free replacements affected keys replacement offer ended march 31 2019 cases issue bypassed generating new keys outside yubikey importing onto device june 2019 yubico released security advisory reporting reduced randomness fips-certified devices shortly power-up company offered free replacements affected keys | [
17,
8103,
6049,
3277,
2319,
4412,
2346,
4133,
3227
] | Test |
7,381 | 4 | Code_wheel:code wheel code wheel type copy protection used older computer games often published late 1980s early 1990s evolved original manual protection system program would require user enter specific word manual game would start continue beyond certain point system popular allowed actual media backed replaced freely retaining security increased availability photocopiers wishing distribute games simply started copying manuals well defeat measure although whole code wheels could directly photocopied component wheels could disassembled individually photocopied components could crafted together duplicate wheel contents code wheels could also copied onto paper user unlicensed copy could simply apply mathematical formula presented challenges calculate correct response suitable formula found code wheels actually made process copying easier since amount information could contain low compared manual potentially unlimited size thus code wheels rapidly phased favor regular manual protection protection based around color public access color photocopying time expensive uncommon made obsolete return protection based game media cd-roms introduced code wheel physical object consisting several circular sheets paper card different sizes fastened center creating set concentric circles game issues user set challenges symbols words identifiers instruct user manipulate wheel order reveal response single symbol word user must enter order start game entering anything expected response would result game halting performing behaviour associated unauthorised usage software example game starflight would send unbeatable police ships destroy player spaceship simple 2-ply code wheel consisted two circular sheets challenge symbols printed intervals around rim back sheet containing table responses printed fit circle front sheet series holes allowing responses viewed hole labelled challenge symbol computer would present three challenge symbols user would read response rotating front sheet first two challenge symbols aligned rim wheel read response hole indicated third challenge symbol type codewheel used large number games neuromancer cybercon 3 used code wheel printed carbon paper one usage single-ply code wheel two challenge symbols used amiga game rocket ranger player turned wheel match ranger current location read value hole corresponding location wanted fly holes simple column since mechanism player specify wanted fly impossible crackers remove game without destroying entire gameplay 3-ply code wheel used games star control fool errand retained back wheel printed responses front wheel holes added middle wheels front back contained mixture printed responses holes allowed next wheel show particular challenge symbols aligned interactive code wheels online oldgames.sk | [] | Test |
7,382 | 9 | Simula:simula simula name two simulation programming languages simula simula 67 developed 1960s norwegian computing center oslo ole-johan dahl kristen nygaard syntactically fairly faithful superset algol 60 also influenced design simscript simula 67 introduced objects classes inheritance subclasses virtual procedures coroutines discrete event simulation features garbage collection also forms subtyping besides inheriting subclasses introduced simula derivatives simula considered first object-oriented programming language name suggests simula designed simulations needs domain provided framework many features object-oriented languages today simula used wide range applications simulating vlsi designs process modeling protocols algorithms applications typesetting computer graphics education influence simula often understated simula-type objects reimplemented c++ object pascal java c several languages computer scientists bjarne stroustrup creator c++ james gosling creator java acknowledged simula major influence following account based jan rune holmevik historical essay kristen nygaard started writing computer simulation programs 1957 nygaard saw need better way describe heterogeneity operation system go ideas formal computer language describing system nygaard realized needed someone computer programming skills ole-johan dahl joined work january 1962 decision linking language algol 60 made shortly may 1962 main concepts simulation language set simula born special purpose programming language simulating discrete event systems kristen nygaard invited visit eckert–mauchly computer corporation late may 1962 connection marketing new univac 1107 computer visit nygaard presented ideas simula robert bemer director systems programming univac bemer sworn algol fan found simula project compelling bemer also chairing session second international conference information processing hosted ifip invited nygaard presented paper simula -- extension algol description discrete-event networks norwegian computing center got univac 1107 august 1963 considerable discount dahl implemented simula contract univac implementation based univac algol 60 compiler simula fully operational univac 1107 january 1965 following couple years dahl nygaard spent lot time teaching simula simula spread several countries around world simula later implemented burroughs b5500 computers russian ural-16 computer 1966 c. a. r. hoare introduced concept record class construct dahl nygaard extended concept prefixing features meet requirements generalized process concept dahl nygaard presented paper class subclass declarations ifip working conference simulation languages oslo may 1967 paper became first formal definition simula 67 june 1967 conference held standardize language initiate number implementations dahl proposed unify type class concept led serious discussions proposal rejected board simula 67 formally standardized first meeting simula standards group ssg february 1968 simula influential development smalltalk later object-oriented programming languages also helped inspire actor model concurrent computation although simula supports coroutines true concurrency late sixties early seventies four main implementations simula implementations ported wide range platforms tops-10 implemented concept public protected private member variables procedures later integrated simula 87 simula 87 latest standard ported wide range platforms mainly four implementations november 2001 dahl nygaard awarded ieee john von neumann medal institute electrical electronics engineers introduction concepts underlying object-oriented programming design implementation simula 67 april 2002 received 2001 a. m. turing award association computing machinery acm citation ideas fundamental emergence object oriented programming design programming languages simula simula 67 unfortunately neither dahl nygaard could make acm turing award lecture scheduled delivered november 2002 oopsla conference seattle died june august year respectively simula research laboratory research institute named simula language nygaard held part-time position opening 2001 new computer science building university oslo named ole johan dahl house dahl honour main auditorium named simula empty computer file minimal program simula measured size source code consists one thing dummy statement however minimal program conveniently represented empty block begins executing immediately terminates language return value program example hello world program simula simula case-insensitive realistic example use classes subclasses virtual procedures example one super class glyph two subclasses char line one virtual procedure two implementations execution starts executing main program simula concept abstract classes since classes pure virtual procedures instantiated means example classes instantiated calling pure virtual procedure however produce run-time error simula supports call name jensen device easily implemented however default transmission mode simple parameter call value contrary algol used call name source code jensen device must therefore specify call name parameters compiled simula compiler another much simpler example summation function formula_1 implemented follows code uses call name controlling variable k expression u allows controlling variable used expression note simula standard allows certain restrictions controlling variable loop code therefore uses loop maximum portability following formula_2 implemented follows simula includes simulation package discrete event simulations simulation package based simula object oriented features coroutine concept sam sally andy shopping clothes share one fitting room one browsing store 12 minutes uses fitting room exclusively three minutes following normal distribution simulation fitting room experience follows main block prefixed codice_1 enabling simulation simulation package used block simulations even nested simulating someone simulations fitting room object uses queue codice_2 getting access fitting room someone requests fitting room use must wait queue codice_3 someone leaves fitting room first one released queue codice_4 accordingly removed door queue codice_5 person subclass process activity described using hold time browsing store time spent fitting room calls procedures fitting room object requesting leaving fitting room main program creates objects activates person objects put event queue main program holds 100 minutes simulated time program terminates | [
1616,
1710,
6507,
3509,
3437,
7516,
4033,
4302,
6882,
1361,
7071,
8082,
1180,
5571,
6441,
1746,
8097,
5312,
666,
7557,
1114,
5948,
3895,
851,
2881,
4366,
7863,
1600,
6497,
1989,
5621,
1803,
360
] | Test |
7,383 | 9 | SNOBOL:snobol snobol string oriented symbolic language series computer programming languages developed 1962 1967 bell laboratories david j. farber ralph e. griswold ivan p. polonsky culminating snobol4 one number text-string-oriented languages developed 1950s 1960s others included comit trac snobol4 stands apart programming languages era patterns first-class data type i.e data type whose values manipulated ways permitted data type programming language providing operators pattern concatenation alternation later object-oriented languages javascript patterns type object admit various manipulations strings generated execution treated programs executed eval function languages snobol4 quite widely taught larger us universities late 1960s early 1970s widely used 1970s 1980s text manipulation language humanities 1980s 1990s use faded newer languages awk perl made string manipulation means regular expressions fashionable snobol4 patterns subsume bnf grammars equivalent context-free grammars powerful regular expressions regular expressions current versions awk perl fact extensions regular expressions traditional sense regular expressions unlike snobol4 patterns recursive gives distinct computational advantage snobol4 patterns recursive expressions appear perl 5.10 though released december 2007 one designers snobol ralph griswold designed successors snobol4 called sl5 icon combined backtracking snobol4 pattern matching standard algol-like structuring well adding features initial snobol language created tool used authors work symbolic manipulation polynomials written assembly language ibm 7090 simple syntax one datatype string functions declarations little error control however despite simplicity personal nature use began spread groups result authors decided extend tidy rewrote added functions standard user-defined released result snobol3 snobol2 exist short-lived intermediate development version without user-defined functions never released snobol3 became quite popular rewritten computers ibm 7090 programmers result several incompatible dialects arose snobol3 became popular authors received requests extensions language also began receive complaints incompatibility bugs versions n't written address take advantage new computers introduced late 1960s decision taken develop snobol4 many extra datatypes features based virtual machine allow improved portability across computers snobol4 language translator still written assembly language however macro features assembler used define virtual machine instructions snobol implementation language sil much improved portability language making relatively easy port virtual machine hosted translator recreating virtual instructions machine included macro assembler indeed high level language snobol4 supports number built-in data types integers limited precision real numbers strings patterns arrays tables associative arrays also allows programmer define additional data types new functions snobol4 programmer-defined data type facility advanced time—it similar earlier cobol later pascal records snobol command lines form five elements optional general subject matched pattern object present matched portion replaced object via rules replacement transfer absolute branch conditional branch dependent upon success failure subject evaluation pattern evaluation pattern match object evaluation final assignment also transfer code created compiled program run snobol pattern simple extremely complex simple pattern text string e.g abcd complex pattern may large structure describing example complete grammar computer language possible implement language interpreter snobol almost directly backus–naur form expression changes creating macro assembler interpreter completely theoretical piece hardware could take little hundred lines new instruction added single line complex snobol patterns things would impractical impossible using primitive regular expressions used pattern matching languages power derives so-called spitbol extensions since incorporated basically modern implementations original snobol 4 language although possible achieve power without part power comes side effects possible produce pattern matching operation including saving numerous intermediate/tentative matching results ability invoke user-written functions pattern match perform nearly desired processing influence ongoing direction interrupted pattern match takes even indeed change pattern matching operation patterns saved like first-class data item concatenated used within patterns used create complex sophisticated pattern expressions possible write example snobol4 pattern matches complete name international postal mailing address well beyond anything practical even attempt using regular expressions snobol4 pattern-matching uses backtracking algorithm similar used logic programming language prolog provides pattern-like constructs via dcgs algorithm makes easier use snobol logic programming language case languages snobol stores variables strings data structures single garbage-collected heap snobol rivals apl distinctiveness format programming style radically unlike standard procedural languages basic fortran c. hello world program might follows ... end simple program ask user name use output sentence ... end choose three possible outputs ... meh output hi username end love output nice meet username end hate output oh username end continue requesting input forthcoming ... namecount namecount 1 getinput output please give name namecount 1 end classic implementation pdp-10 used study compilers formal grammars artificial intelligence especially machine translation machine comprehension natural languages original implementation ibm 7090 bell labs holmdel n.j. snobol4 specifically designed portability first implementation started ibm 7094 1966 completed ibm 360 1967 rapidly ported many platforms normally implemented interpreter difficulty implementing high-level features compiler spitbol compiler provides nearly facilities interpreter provides gnat ada compiler comes package gnat.spitbol implements spitbol string manipulation semantics called within ada program file editor michigan terminal system mts provided pattern matching based snobol4 patterns several implementations currently available macro snobol4 c written phil budne free open source implementation capable running almost platform catspaw inc provided commercial implementation snobol4 language many different computer platforms including dos macintosh sun rs/6000 others implementations available free catspaw minnesota snobol4 viktors berstis closest pc implementation original ibm mainframe version even including fortran-like format statement support also free although snobol structured programming features snobol preprocessor called snostorm designed implemented 1970s fred g. swartz use michigan terminal system mts university michigan snostorm used eight fifteen sites ran mts also available university college london ucl 1982 1984 snocone andrew koenig adds block-structured constructs snobol4 language snocone self-contained programming language rather proper superset snobol4 spitbol implementation also introduced number features using traditional structured programming keywords nevertheless used provide many equivalent capabilities normally thought structured programming notably nested if/then/else type constructs features since added recent snobol4 implementations many years commercial product april 2009 spitbol released free software gnu general public license according dave farber griswold polonsky finally arrived name symbolic expression interpreter sexi common backronyms snobol 'string oriented symbolic language quasi-initialism 'string oriented symbolic language | [
1616,
6507,
361,
2451,
5983,
7800,
1825,
5911,
5999,
1361,
7071,
3368,
304,
7375,
7204,
1774,
2871,
4447,
4366,
8137,
5878,
5348,
6861,
2803,
5621,
5008,
1435
] | Validation |
7,384 | 2 | Ambient_(desktop_environment):ambient desktop environment ambient mui-based desktop environment morphos development started 2001 david gerber main goals fully asynchronous simple fast ambient remotely resembles workbench directory opus magellan trying mix best worlds ambient strictly follow amiga workbench interface paradigm still many similarities programs called tools program attributes called tooltypes data files projects directories drawers ambient localized various languages part morphos also available separately various visual effects ambient taking advantage hardware accelerated visual effects morphos native icon format ambient png icon built-in support amiga icon formats ambient introduced special icon format called datatype icons icon simply image file renamed include .info extension icons read using amiga datatype system 2005 david gerber released ambient source code gpl developed ambient development team | [
6161,
2717,
97,
3688,
1534,
6431,
3099,
6009,
5571,
307,
5833,
5660,
5661,
4244,
7746,
1214,
594,
3222,
4354,
4006,
7942,
7775,
1435
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.