node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4 values |
|---|---|---|---|---|
7,585 | 4 | AT&T_Cybersecurity:amp cybersecurity cybersecurity developer commercial open source solutions manage cyber attacks including open threat exchange world largest crowd-sourced computer-security platform july 2017 platform 65,000 participants contributed 14 million threat indicators daily company raised 116 million since founded 2007 july 10 2018 acquired communications becoming wholly owned subsidiary transaction completed august 22 2018 february 2019 alienvault renamed cybersecurity ossim project began 2003 started dominique karg julio casal ignacio cabrera alberto román became basis alienvault founded 2007 madrid spain company hired management team hewlett packard fortify group 2012 including alienvault ceo barmak meftah cto roger thornton five others 2015 company partnered intel coordinate real-time threat information similar deal hewlett packard announced year 2015 alienvault researchers released study disclosing chinese hackers circumventing popular privacy tools june 2015 alienvault chief scientist jaime blasco released report saying chinese hackers found way circumvent virtual private networks vpns tor anonymity software hides computer ’ location routing requests series internet service providers alienvault open threat exchange 26,000 participants 140 countries reporting one million potential threats daily june 2015 february 2017 alienvault released usm anywhere saas security monitoring platform designed centralize threat detection incident response compliance management cloud hybrid cloud on-premises environments cloud-based console july 2017 alienvault open threat exchange platform 65,000 participants contributed 14 million threat indicators daily july 10 2018 announced acquire alienvault undisclosed amount acquisition completed august 22 2018 company became subsidiary communications unit february 26 2019 alienvault renamed cybersecurity addition free products cybersecurity offers paid security platform called unified security management integrates threat detection incident response compliance management one solution threat applications offered via hardware virtual machines cloud service open threat exchange otx free enables security experts research collaborate new threats better compare data integrate threat information security systems big data platform otx leverages natural language processing machine learning cybersecurity also runs open source security information management ossim project helps network administrators computer security intrusion detection response august 2015 firm raised 52 million expand security business round led institutional venture partners included ggv capital kleiner perkins trident capital jackson square ventures company said 2015 adding 300 400 new clients quarter hired chief financial officer help prepare possible initial public offering ipo end fiscal year 2016 alienvault recorded 53 percent year-over-year sales growth increased install base 65 percent approximately 5,000 commercial customers alienvault raised 116 million since founded 2007 2017 alienvault best cloud computing security solution emea presented sc magazine uk year forbes featured alienvault forbes cloud 100 list deloitte featured alienvault deloitte technology fast 500 list 2015 2016 2015 alienvault advanced persistent threat apt solution year presented computing security awards 2014 alienvault nominated “ best smb security product ” jaime blasco director alienvault labs nominated “ technology hero year ” v3 technology industry publication alienvault competes siem network security industry hp arcsight ibm qradar logrhythm among others | [
2961,
5982,
2473,
651,
4014,
760,
1805,
3833
] | Test |
7,586 | 4 | Presidential_Policy_Directive_20:presidential policy directive 20 presidential policy directive 20 ppd-20 provides framework u.s. cybersecurity establishing principles processes signed president barack obama october 2012 directive supersedes national security presidential directive nspd-38 integrating cyber tools national security directive complements nspd-54/homeland security presidential directive hspd-23 classified unreleased national security agency nsa nspd-54 authorized george w. bush gives u.s. government power conduct surveillance monitoring existence made public june 2013 former intelligence nsa infrastructure analyst edward snowden private industry issues surrounding international domestic law public-private-partnership became cornerstone america cybersecurity strategy suggestions private sector detailed declassified 2003 national strategy secure cyberspace companion document national security presidential directive nspd-38 signed secret george w. bush following year although contents nspd 38 still undisclosed u.s. military recognize cyberspace theater operations u.s. national defense strategy 2005 report declared ability operate global commons-space international waters airspace cyberspace important ... project power anywhere world secure bases operation three years later george w. bush formed classified comprehensive national cybersecurity initiative cnci citing economic national security obama administration prioritized cybersecurity upon taking office in-depth review communications information infrastructure cnci partially declassified expanded president obama outlines key elements broader updated national u.s. cybersecurity strategy 2011 pentagon announced capability run cyber attacks u.s. senate failed pass cybersecurity act 2012 august presidential policy directive 20 ppd-20 signed secret electronic privacy information center epic filed freedom information request see nsa would comply details reported november 2012 washington post wrote ppd-20 extensive white house effort date wrestle constitutes 'offensive 'defensive action rapidly evolving world cyberwar cyberterrorism following january obama administration released ten-point factsheet june 7 2013 ppd-20 became public released edward snowden posted guardian part 2013 mass surveillance disclosures u.s. factsheet claims ppd-20 acts within law consistent values promote domestically internationally previously articulated international strategy cyberspace n't reveal cyber operations directive snowden disclosure called attention passages noting cyberwarfare policy possible consequences directive calls defensive offensive measures defensive cyber effects operations dceo offensive cyber effects operations oceo respectively | [
8086,
5509
] | Test |
7,587 | 2 | GNewSense:gnewsense gnewsense linux distribution based debian developed sponsorship free software foundation goal user-friendliness proprietary e.g binary blobs non-free software removed free software foundation considers gnewsense composed entirely free software gnewsense takes relatively strict stance proprietary software example documentation gives instructions installing proprietary software excluded project launched brian brazil paul o'malley 2006. gnewsense originally based ubuntu since 1.0 release free software foundation assists gnewsense releases two years 8 august 2011 distrowatch classified gnewsense dormant september 2012 distrowatch changed status active 6 august 2013 first version directly based debian gnewsense 3 parkes released discussions trisquel forums gnewsense said inactive gnewsense activities 2017 default gnewsense uses gnome graphical user interface customized user choice x display manager window managers desktop environments available install hosted repositories ubiquity installer allows installing hard disk within live cd environment without need restarting computer prior installation besides standard system tools small applications gnewsense comes installed following software libreoffice productivity suite gnome web internet browser empathy instant messenger gimp editing photos raster graphics common software development tools including gcc installed default live cd used run operating system install onto disk cd images available download gnewsense made four major releases 2016 gnewsense announced next version gnewsense would 5.0 non-free software repositories provided gnewsense project non-free documentation artwork removed based ubuntu universe package repository enabled default order avoid trademark problems stem modification mozilla firefox gnewsense 1.1 rebranded burningdog burningdog likewise offer install non-free plugins various web media adobe flash gnewsense 2.0 abandoned burningdog adopted epiphany web browser later renamed simply web component gnome default browser application came recommendations instructions optionally compile run gnu icecat gnewsense 3.0 retains web default browser also comes modified version debian iceweasel offer access proprietary add-ons debian another linux distribution known strict licensing requirements adherence free software principles debian gnewsense rigorously exclude non-free software binary blobs official releases debian maintains hosts unofficial repositories non-free software firmware binaries debian free software sometimes depends upon suggests optional installation proprietary software theory users informed discretion use software paramount expressed clause 5 debian social contract though debian democratic project management seen stance become source recurrent controversy gnewsense contrast provide packages depend suggest use non-free software firmware extensions plugins gnewsense project provide convenience-access proprietary software reason seeing abrogation commitment development free software solutions similar debian gnewsense policies allow including documentation licensed gnu free documentation license invariant sections includes many manuals documentation released gnu project gnewsense initially forked ubuntu originally fork debian result founding developer paul o'malley prior work ubuntu gnewsense 3.0 distribution tracked debian base software distribution part debian project carefully disaggregate free software official distribution proprietary software provides courtesy access indeed many packages including debian-particular packages iceweasel icedove ported gnewsense simply modified way longer provide courtesy access non-free software options since gnewsense repositories contain free software support hardware requires firmware free firmware exists wireless network cards available may 1 2008 3d graphics application support also removed licensing issues mesa 3d january 13 2009 issues resolved 3d support became standard starting 2.2 release reviewing gnewsense 3.0 august 2013 jesse smith distrowatch noted many applications provided including openoffice.org 3 debian de-blobbed 2.6.32 linux kernel based linux-libre tools iceweasel 3.5 gnome 2.30 quite date smith concluded review following words generally speaking happy gnewsense 3.0 based debian distribution counted provide stability amazing performance distribution lean fast uncluttered flip side gnewsense system installer default package management tools geared toward experienced users probably provide steep learning curve novice linux users much automated minimum hand holding main feature gnewsense lack proprietary software also double-edged blade one hand means entire operating system audited modified redistributed great perspective software freedom fact distribution play multimedia formats handled flash content fairly well testament power free open source software one problem ran gnewsense software policy regards wireless network card distributions ship non-free intel firmware gnewsense n't include means distribution n't good fit laptop hand great match desktop system richard stallman founder president free software foundation said used gnewsense january 2010 still using april 2014 since stallman switched trisquel serdar yegulalp reviewed gnewsense infoworld said post network world gnewsense 3.1 february 2014 bryan lunduke reviewed linux distribution following words | [
2179,
2187,
2909,
5724,
7161,
6086,
6802,
7894,
2559,
2935,
6453,
2581,
6458,
2585,
2228,
1487,
4352,
58,
3996,
4008,
1893,
6865,
7954,
445,
788,
1152,
1909,
4755,
6884,
7969,
6175,
7251,
7975,
4400,
7253,
3696,
474,
1179,
7635,
6902,
2... | Test |
7,588 | 3 | Acorn_Archimedes:acorn archimedes acorn archimedes family personal computers designed acorn computers ltd cambridge england sold late-1980s mid-1990s acorn first general-purpose home computer based arm architecture first archimedes launched 1987 arm risc design 32-bit cpu using 26-bit addressing running 8 mhz stated achieving 4.5+ mips provided significant upgrade 8-bit home computers acorn previous machines claims fastest micro world running 18 mips also made tests models family omitted either acorn archimedes part name first models named bbc archimedes yet name acorn archimedes commonly used describe acorn contemporary designs based architecture archimedes machines longer sold computers raspberry pi still run operating system risc os least later versions use arm chips mostly compatible acorn archimedes first risc-based home computer first models released june 1987 300 400 series 400 series included four expansion slots although two slot backplane could added 300 series official upgrade third parties produced 4-slot backplanes st-506 controller internal hard drive models included arthur operating system later replaced risc os paid-for upgrade bbc basic programming language emulator acorn earlier bbc micro mounted two-part cases small central unit monitor top separate keyboard three-button mouse middle one used pop-up context menus operating system models featured eight-channel 8-bit stereo sound capable displaying 256 colours screen three models initially released different amounts memory a305 a310 a440 soon replaced a410/1 a420/1 a440/1 featured upgraded memc1a a540 supported 16mib ram included higher speed scsi provision connecting genlock devices unveiled september 1990 300 400 followed number machines minor changes upgrades work began successor arthur operating system initially named arthur 2 renamed risc os 2 new computers shipped pre-installed number new machines introduced along risc os 2 may 1989 300 series phased favour new acorn a3000 400 series kept production earlier models shipped arthur could upgraded risc os 2 replacing rom chips containing operating system a3000 used 8 mhz arm2 supplied ram unlike previous models a3000 came single-part case similar bbc micro amiga 500 atari st computers keyboard integrated base unit kind housing consumes lot desktop space problem acorn tried overcome offering monitor stand attached base unit new model sported single internal expansion slot physically different earlier models although electronically similar external connector could interface existing expansion cards although really needed housed external case joined main unit a300 series a400 series r140 a3000 machines vidc1a video chip provided wide variety screen resolutions provided officially operating system chip could made run others palette range 4096 colours 12-bit vidc1a 16 hardware palette registers meant screen modes sixteen colours fewer colours could mapped 4096 available however 256 colour modes 4 bits colour data hardware derived could adjusted net result 256 colours 16 could assigned desired covering range 4096 available colours also horizontal sync interrupt meaning difficult display additional colours changing palette scan line impossible thanks 2 mhz ioc timer 1 many demos managed display 4096 colour screen dithering also one hardware sprite 32 pixels width unlimited height default used mouse pointer pixel coded two bits value 0 transparency three others freely chosen 4096 colour palette 1991 a5000 launched featured new 25 mhz arm3 processor 2 4 mb ram either 40 mb 80 mb hard drive conventional pizza box-style two-part case hxwxd 100 mm × 430 mm × 340 mm enhanced video capabilities allowed a5000 comfortably display vga resolutions 800×600 pixels first archimedes feature high density capable floppy disc drive standard natively supported various formats including dos atari discs risc os adfs floppy format relatively large capacity 800 kb double low density 1600 kb high density later version a5000 featured 33 mhz arm3 4 8 mb ram 80 120 mb hard drive a5000 initially ran new 3.0 version risc os although several bugs identified shipped risc os 3.10 3.11 earlier machines capable upgraded new risc os 3 though needed additional daughterboard installed first earlier models could also benefit video performance a5000 via third party upgrade 1992 new range produced utilising first arm system-on-chip arm250 microprocessor single-chip design including functionality arm3 chip without cache ioc1 input output controller vidc1a video sound controller memc1a memory controller chips integrated one chip increase clock frequency 8 mhz 12 mhz gave performance 7 mips machines supplied risc os 3.10 3.11 a30x0 series one-piece design similar a3000 far smaller a4000 looked like slightly slimmer a5000 a3010 model intended home computing machine featuring tv modulator standard 9-pin joystick ports a3020 targeted home office educational markets featuring built-in 2.5 hard drive dedicated network interface socket technically a4000 almost identical a3020 differing hard disk size 3.5-inch a4000 though sported different appearance three arm250-based machines could upgraded 4 mb plug-in chips though a3010 designed 2 mb third party upgrades overcame one mini-podule slot used internal expansion a3000 also 1992 acorn introduced a4 laptop computer featuring slower 24 mhz compared 25 mhz a5000 version arm3 processor lcd screen capable displaying maximum resolution 15 levels grey however feature monitor port offered display capabilities a5000 notable omission machine built-in pointing device requiring users navigate cursor keys attach conventional acorn three-button mouse a7000 despite name reminiscent archimedes naming conventions actually similar riscpc line risc os computers succeeded archimedes 1994 lacked however debi expansion slots multi-slice case characterized riscpc though removing cdrom backplane one slot could fitted also produced never sold commercially archimedes one powerful home computers available late 1980s early 1990s main cpu faster motorola 68000 microprocessors found popular amiga atari st machines 68000 average performance roughly 16-bit workloads 32-bit workloads peak performance simpler 16-bit instructions yielded 32-bit workloads repeatable benchmark tests computer exhibited 1987 personal computer world show along amiga atari st video game consoles commenting show crash magazine reported despite whiz-bang demos acorn ’ archimedes 8-bit machines dead archimedes significant market share education markets uk ireland australia new zealand success archimedes british schools due partly predecessor bbc micro later computers schools scheme organised tesco supermarket chain association acorn students pupils countries early 1990s exposed archimedes a-series computer archimedes range available us canada via olivetti canada mid late 1990s uk educational market began turn away archimedes apple macintosh computers ibm compatible pcs eclipsed archimedes multimedia capabilities led erosion archimedes market share tesco computers schools scheme later changed partnership acorn rm plc many computer-related suppliers also led decrease archimedes educational market share acorn gradually moved focus away computers instead began exploiting lucrative arm processor technology separate enterprise spin arm holdings founded 1990 1994 2008 model superseding archimedes computer riscpc also used television broadcast automation programmed company named omnibus systems ltd uk original desktop models custom made 19-inch rack models used control/automate multiple television broadcast devices manufactures way unusual time used several large european television stations including bbc nrk tmf nl uk also 1994 2004 archimedes riscpc models used teleprompters television studios hardware easy adapt tv broadcast use cheaper hardware available time | [
5720,
4294,
2630,
6159,
6085,
2379,
7718,
1833,
5571,
1284,
2765,
3306,
6378,
5079,
5522,
6491,
4906,
5877,
1237,
1603,
3069
] | Test |
7,589 | 2 | Hostapd:hostapd hostapd host access point daemon user space daemon software enabling network interface card act access point authentication server three implementations jouni malinen hostapd openbsd hostapd devicescape hostapd jouni malinen hostapd user space daemon access point authentication servers used create wireless hotspot using linux computer implements ieee 802.11 access point management ieee 802.1x/wpa/wpa2/eap authenticators radius client eap server radius authentication server current version supports linux host ap madwifi prism54 drivers use kernel mac80211 subsystem qnx freebsd net80211 dragonflybsd openbsd hostapd user space daemon helps improve roaming monitoring openbsd-based wireless networks implements inter access point protocol iapp exchanging station association information access points trigger set actions like frame injection logging receiving specified ieee 802.11 frames open wireless linux version hostapd kept close possible original open source release owl specific packaging defaults website appears dead april 2013 probably project | [
3915,
5571,
7209,
578,
4836,
6501
] | Test |
7,590 | 5 | Signalling_Connection_Control_Part:signalling connection control part signalling connection control part sccp network layer protocol provides extended routing flow control segmentation connection-orientation error correction facilities signaling system 7 telecommunications networks sccp relies services mtp basic routing error detection base sccp specification defined itu-t recommendations q.711 q.714 additional information implementors provided q.715 q.716 however regional variations defined local standards bodies united states ansi publishes modifications q.713 ansi t1.112 ttc publishes jt-q.711 jt-q.714 europe etsi publishes etsi en 300-009-1 document modifications itu-t specifications although mtp provides routing capabilities based upon point code sccp allows routing using point code subsystem number global title point code used address particular node network whereas subsystem number addresses specific application available node sccp employs process called global title translation determine point codes global titles instruct mtp route messages sccp messages contain parameters describe type addressing used message routed sccp provides 4 classes protocol applications connectionless protocol classes provide capabilities needed transfer one network service data unit nsdu data field xudt ludt udt message one connectionless message sufficient convey user data contained one nsdu segmenting/reassembly function protocol classes 0 1 provided case sccp originating node relay node provides segmentation information multiple segments prior transfer data field xudt network option ludt messages destination node nsdu reassembled connection-oriented protocol classes protocol classes 2 3 provide means set signalling connections order exchange number related nsdus connection-oriented protocol classes also provide segmenting reassembling capability nsdu longer 255 octets split multiple segments originating node prior transfer data field dt messages segment less equal 255 octets destination node nsdu reassembled sccp class 0 protocol class basic sccp protocol classes network service data units passed higher layers sccp originating node delivered sccp higher layers destination node transferred independently therefore may delivered sccp user out-of-sequence thus protocol class corresponds pure connectionless network service connectionless protocol network connection established sender receiver sccp class 1 builds capabilities class 0 addition sequence control parameter nsdu allows sccp user instruct sccp given stream messages delivered sequence therefore protocol class 1 corresponds enhanced connectionless protocol assurances in-sequence delivery sccp class 2 provides facilities class 1 also allows entity establish two-way dialog another entity using sccp class 3 service builds upon class 2 also allows expedited urgent messages sent received errors sequencing segment re-assembly detected sccp restart connection occur sigtran suite protocols two primary methods transporting sccp applications across internet protocol networks sccp transported indirectly using mtp level 3 user adaptation protocol m3ua protocol provides support users mtp-3—including sccp alternatively sccp applications operate directly sccp user adaptation protocol sua form modified sccp designed specifically use ip networking itu-t also provides transport sccp users internet protocol using generic signalling transport service specified q.2150.0 signalling transport converter sctp specified q.2150.3 specialized transport-independent signalling connection control part ti-sccp specified t-rec-q.2220 ti-sccp also used generic signalling transport adapted mtp3 mtp3b described q.2150.1 adapted sscop sscopmce described q.2150.2 | [
3821,
498,
430,
3982,
1916,
4976,
3462,
5492,
995
] | Test |
7,591 | 4 | Structural_vulnerability_(computing):structural vulnerability computing computing structural vulnerability system weakness consists several so-called component vulnerabilities type weakness generally emerges due several system architecture flaws example structural vulnerability person working critical part system security training ’ follow software patch cycles likely disclose critical information phishing attack | [] | Test |
7,592 | 4 | Sieve_(mail_filtering_language):sieve mail filtering language sieve programming language used email filtering owes creation cmu cyrus project creators cyrus imap server language tied particular operating system mail architecture requires use rfc 2822-compliant messages otherwise generalize systems meet criteria current version sieve base specification outlined rfc 5228 published january 2008 sieve data-driven programming language similar earlier email filtering languages procmail maildrop earlier line-oriented languages sed awk specifies conditions match actions take matching differs general-purpose programming languages highly limited – base standard variables loops allow conditional branching preventing runaway programs limiting language simple filtering operations although extensions devised extend language include variables limited degree loops language still highly restricted thus suitable running user-devised programs part mail system also significant number restrictions grammar language order reduce complexity parsing language language also supports use multiple methods comparing localized strings fully unicode-aware sieve scripts may generated gui-based rules editor may entered directly using text editor scripts transferred mail server server-dependent way managesieve protocol defined rfc 5804 allows users manage sieve scripts remote server mail servers local users may allow scripts stored e.g .sieve file users home directories language standardized now-obsolete rfc 3028 january 2001 tim showalter ietf sieve working group updated base specification 2008 rfc 5228 brought following extensions proposed standard status number extensions still developed sieve working group example sieve script | [
361,
6789,
2453,
3915,
5571,
6908
] | Test |
7,593 | 9 | Canonical_S-expressions:canonical s-expressions canonical s-expression csexp binary encoding form subset general s-expression sexp designed use spki retain power s-expressions ensure canonical form applications digital signatures achieving compactness binary form maximizing speed parsing particular subset general s-expressions applicable composed atoms byte strings parentheses used delimit lists sub-lists s-expressions fully recursive s-expressions typically encoded text spaces delimiting atoms quotation marks used surround atoms contain spaces using canonical encoding atom encoded length-prefixed byte string whitespace separating adjacent elements list permitted length atom expressed ascii decimal number followed sexp becomes csexp note quotation marks required escape space character internal atom canonical s-expression length prefix clearly points end atom note also whitespace separating atom next element list csexps generally permit empty lists empty atoms forth certain uses csexps impose additional restrictions example csexps used spki one limitation compared csexps general every list must start atom therefore empty lists typically list first atom treated one treats element name xml encodings common use generally csexp parser one two decimal orders magnitude smaller either xml asn.1 small size corresponding speed give csexp main advantage addition parsing advantage differences csexp xml differ csexp data-representation format xml includes data-representation format also schema mechanism thus xml configured particular kinds data conform grammar say html atom svg mathml new ones needed languages defining document grammars dtd defined xml standard xsd relaxng schematron commonly used xml additional features xml also work schema csexp data course operated schemas implemented higher level provides mechanism terms characters bytes csexp string may byte sequence whatsoever length prefix atom xml like regular scheme s-expressions json literals programming languages requires alternate representations characters control characters however effect range structures semantics represented xml also provides mechanisms specify given byte sequence intended interpreted say unicode utf-8 string jpeg file integer csexp leaves distinctions external mechanisms basic level csexp xml represent trees external representations surprising since xml described differently-punctuated form lisp-like s-expressions vice versa however xml includes additional semantics commonly achieved csexp various conventions rather part language first every xml element name csexp applications commonly use first child expression second xml provide datatyping firstly via schema grammar schema also however distinguish integers strings data objects types e.g jpeg especially xsd types xml element may also attributes construct csexp share represent xml data csexp one must choose representation attributes obvious one reserve second item s-expression list name value pairs analogous lisp association list xml id idref attributes equivalent csexp easily implemented csexp application program finally xml element may contain comments and/or processing instructions csexp specific equivalents trivial represent merely reserving name example naming *com *pi prevents ever colliding xml element type names csexp xml fully recursive first atom csexp list convention roughly corresponds xml element type name identifying type list however csexp atom encoding e.g. jpeg unicode string wav file … xml element names identifiers constrained certain characters like programming-language identifiers csexp method obviously general hand identifying encoding item thus interpret determined particular user conventions meaning csexp application must build conventions code documentation forth similarly csexp atoms binary consisting length prefix followed totally arbitrary bytes xml designed human-readable arguably less json yaml arbitrary bytes xml must encoded somehow example bitmapped image included using base64 means storing large amounts non-readable information uncompressed xml takes space hand survive translation alternate character sets including transmission network hosts may apply differing character sets line-end conventions etc. suggested xml merges sequence strings within one element single string csexp allows sequence atoms within list atoms remain separate one another incorrect exactly like s-expressions csexp xml notion sequence strings strings separated somehow asn.1 popular binary encoding form however expresses syntax data types semantics two different structures sequence two integers identical representations wire barring special tag choices distinguish parse asn.1 structure one must tell parser set structures one expecting parser must match data type parsed structure options adds complexity asn.1 parser csexp structure carries indication semantics encoded element names parser csexp structure care structure parsed wire-format expression parsed internal tree form similar xml dom consumer structure examine conformance expected noted xml document without schema works like csexp respect xml document work like asn.1 | [
4543
] | Test |
7,594 | 3 | Mercury_Systems:mercury systems mercury systems inc. high-tech commercial company serving aerospace defense industries headquartered andover massachusetts processing subsystems used intelligence surveillance reconnaissance isr radar electronic warfare ew storage guidance defense applications mercury based andover massachusetts 1000 employees offices around world annual revenues approximately us 493 million fiscal year ended june 30 2018 meet department defense dod defense electronics procurement reform objectives mercury created next generation business model defense procurement reform objectives captured department ’ better buying power 3.0 bbp3.0 overarching theme “ achieving dominant capabilities technical excellence innovation. ” mercury systematic approach creation defense processing subsystems using sensor processing chain methodology define reusable building blocks business approach leverages best commercial technology making mercury processing building blocks interoperable standardized defense processing subsystems quickly developed open system architectures osa fundamental meeting dod ’ bbp 3.0 objectives aligned mercury ’ business posture company pioneered many today ’ embedded protocols processing standards including rapidio openvpx ansi/vita 65 standard de facto embedded digital processing standard currently company investing openrfm radio frequency rf microwave processing bring interoperability rf/microwave domain openvpx digital realm openrfm standardizes profiles interfaces protocols rf microwave processing enabling sensor chain applications fully open systems compliant mercury applies open systems architectures software well hardware approach applied middleware preserves software application investments adding new capabilities tech-refreshes mercury headquartered andover massachusetts facility incorporates design engineering capability innovation center mercury innovation centers showcase company ’ sensor mission processing solutions mercury redundant scalable advanced microelectronic centers amcs amcs production defense industry subsystems amcs operated new england new york metro-area southern california trusted dmea facility southwest mercury three major product lines br • advanced microelectronic rf digital br • sensor mission processing mercury mission systems safety-critical avionics mission processing networking communication secure high-performance sensor processing storage networking br • mercury defense systems – electronic warfare secure processing test simulation mercury ’ businesses supported several dedicated international operations including toronto canada silchester united kingdom tokyo japan geneva switzerland | [] | Test |
7,595 | 3 | Codan:codan codan limited manufacturer supplier communications metal detection mining technology headquartered adelaide south australia revenue 132.3 million 2014 2017 revenue 226.1 million codan limited communications business unit parent company codan group engaged business operating segment radio communications product range sold customers 150 countries addition global service support network codan group regional sales offices washington d.c. usa victoria bc canada chicago il usa farnham uk beijing china dubai united arab emirates company maintains quality assurance systems approved standard company established 1959 three friends university adelaide alastair wood ian wall jim bettison company established electronics instrument lighting company limited eilco renaming codan 1970 codan listed australian stock exchange 2003 expanded military technology 2006 2005 ceo mike heard denied codan knowingling supplied technology al-quaeda operative 2001 mike heard acted company ceo 1990s held position retirement 2010 2009 codan established military security division usa 30 june 2012 codan limited sold satellite communications assets cpi international holding corp wholly owned subsidiary cpi international inc cpi 2016 codan defence electronics established leverage core competencies military radio countermine technology codan designs manufactures range hf equipment including transceivers base portable mobile modems power supplies amplifiers antennas accessories also provides hf solutions ranging basic voice communication data email fax chat gps tracking interoperability according fed mil standards codan hf transceivers initially developed provide communications people living working travelling central australia codan supplier hf radio products aid humanitarian markets since 1980 markets include public private security sectors well significant recreational vehicle user market australia codan military hf radio transceivers comply mil-std-188-141b ale jitc certified fed-std-1045 ale interoperable military grade radios provide frequency hopping voice encryption codan supplier us army provided around 3000 transceivers support security rebuilding programs afghanistan iraq 13 september 2011 dsei industry conference codan announced branding change hf radio division renaming division radio communications reflect broader focus company integrated radio communications systems 11 june 2012 eurosatory international defence security tradeshow codan radio communications announced launch codan envoy – software-defined radio enables users add new capabilities radio software updates 7 august 2012 codan announced acquisition daniels electronics limited daniels leading designer manufacturer supplier land mobile radio communications lmr solutions north america since launched tactical solutions stratus p25/lte hivenet p25 transportable repeaters secure mobile voice operations minelab specialises advanced electronic technologies including detection equipment military humanitarian de-mining projects also produce metal detectors consumer market company manufacturing distribution customer service operations adelaide australia cork ireland naperville usa iso 9001:2000 quality endorsed company minelab established 1985 acquired codan march 2008 minetec established technology service partner mining industry company provides integrated safety productivity communications solutions surface underground mining operations including advanced tracking mine operations management collision avoidance systems | [] | Test |
7,596 | 2 | Steve_Sakoman:steve sakoman steve sakoman american computing executive retired apple computer 2005 independent consultant originally worked hewlett-packard manufacturing engineer project manager industry first battery-powered portable ms-dos pc hp 110 sakoman moved apple computer 1984 would oversee hardware groups responsible apple ii macintosh product lines 1987 formed team behind apple newton realize vision world first pda sakoman left apple 1990 newton shipped set inc. former apple executive jean-louis gassée led development original bebox personally developed beos support brooktree video-capture devices eventually worked company chief operating officer time ran webcam inside offices using codycam application 1994 moved silicon graphics director consumer products technologies group included work nintendo 64 graphics system returned 1996 palmsource acquired 2001 sakoman took role chief products officer key member team behind palm os 6 sakoman rejoined apple 2003 vice-president software technology reporting avie tevanian sakoman also set gutentalk 2004 site discuss ebooks specially formatted pdas hand-held readers | [
3764,
7010,
3001
] | Test |
7,597 | 4 | Norton_Internet_Security:norton internet security norton internet security developed symantec corporation computer program provides malware prevention removal subscription period uses signatures heuristics identify viruses features included product personal firewall email spam filtering phishing protection release 2015 line summer 2014 symantec officially retired norton internet security 14 years chief norton product superseded norton security rechristened adaptation norton 360 security suite symantec distributed product download boxed compact disc cd copy oem software retailers also distributed usb flash drive norton internet security held 61 market share united states retail security suite category first half 2007 study competitors terms market share included security suites ca inc. trend micro kaspersky lab august 1990 symantec acquired peter norton computing peter norton norton company developed various applications dos including antivirus symantec continued development acquired technologies marketed name norton tagline symantec norton crossed-arm pose registered u.s. trademark featured norton product packaging however pose later moved spine packaging later dropped altogether users 2006 later versions upgrade latest version norton software without buying new subscription upgraded product retains number days left user subscription releases named year internal version numbers well internal version number advanced 15.x 2008 edition match norton antivirus release year 2013 20.x release product dropped year name although still referenced places norton internet security 2000 released january 10 2000 symantec first foray beyond virus protection content control filters release followed alliance internet provider excite home antivirus vendor mcafee.com provide internet subscribers mcafee new firewall software mcafee personal firewall version 2000s firewall based atguard wrq filters traffic packet level block activex controls java applets functionalities include cookie removal banner ad blocking zdnet found ad blocker removed graphics ads breaking pages adjusting settings fixed problem however process complicated zdnet noted lack information presented concerning attacks firewall blocked norton liveupdate downloads installs program updates family edition adds parental controls parental controls backed quality control team 10 searching web inappropriate content found content categorized subject matter placed blacklist 36,000 sites designed administrator add blocked sites however pre-supplied blacklist viewed edited since hard coded administrators block certain subject matters another option block sites create whitelist allowed sites family edition also block transmission specified personal information information replaced letter x however cnn noted x-rated sites retrieved personal information queried search engine version 2.0 released june 12 2000 version 2001 2.5 released september 18 2000 adding support windows addition windows 9x series windows nt windows 2000 following attacks iloveyou anna kournikova script viruses version block malicious scripts without virus signatures analyzing behavior firewall scans internet-enabled applications creates access rules based knowledge base maintained symantec installation pc magazine testing installation took 24 minutes complete 750 mhz pentium iii 92 internet-enabled applications using firewall users determine whether accept cookies java applets activex controls global per-site basis new feature intrusion detection autoblock detect port scans block intrusion attempts program provides notifications intrusion attempts stating severity level providing access threat details alternatively firewall put computer stealth essentially hiding system users configure security level affecting number notifications testing conducted pc magazine using shields symantec security check found firewall successfully stealthed ports hiding computer view leak test conducted see firewall ability detect outbound connections attempt detected suite offered block attempts family edition like prior version includes parental controls information filtering feature parental controls come list objectionable sites separated 32 categories list updated every two weeks norton liveupdate using list alone norton blocks sites present list consequently norton may block sites next update parents customize list adding removing sites list allowed sites created restrict children specific sites version uses application blocking rather protocol port filtering control internet access children restricted applications used access internet parental controls profile set child settings automatically configured based age group whether child teenager adult administrator internet usage violations noted report presented parents pc magazine found enabling parental controls added minute computer boot time version 3.0 released march 19 2001 version 2002 announced august 28 2001 family edition dropped parental controls information filtering bundled release installation noted quick simple pc magazine cnet installation requires reboot afterwards security assistant guides users questionnaire best configure settings problem cnet encountered upgrading prior release loss customized settings pc magazine found default settings aimed avoiding frequent notifications somewhat permissive windows 95 support also dropped running full scan complies list internet-enabled applications users set permissions accept norton default settings firewall detects blocks port scans logs intrusion attempts version run trace attackers however symantec planning online tool ensure rogue programs masquerade trustworthy applications norton verifies programs list digital signatures known programs update tracker warns users hackers attempt gain access users computers firewall blocked access attempts shields port checker version includes wizard simplify firewall setup accommodate multiple computers sharing internet connection release norton prevent specified personal information transmitted via compatible instant messenger client e-mail websites ad-blocking includes ad trashcan users place ads slipped past ad-filtering professional edition announced december 11 2001 marketing aimed towards business owners version features norton intrusion detection intercepts suspicious connections attacks code red worm intrusion detection focuses windows-based attacks central management also present version administrators configure firewall productivity settings client computers productivity settings allow administrators block newsgroups websites advertisements suite integrates xp user accounts settings personalized user version 2003 announced september 16 2002 scheduled available purchase later month version adds norton spam alert reduce spam filtering scans whole message context rather looking keywords ensure accuracy pop3 client must used message identified spam norton inserts identifier default spam alert subject line using mail client users create rule delete move flagged messages users also create strings text spam alert look classifying e-mail pc magazine testing spam alert mistakenly classified 2.8 percent legitimate e-mail spam 47 percent spam slipped past filter although false positive rate low feature fare well finding actual spam updated main interface green red indicators show features active need attention firewall several updated features version block traffic button present main interface blocks incoming outgoing internet traffic another new feature visual tracker graphically maps attacks back origin firewall blocked port scans conducted cnet stealthing port following nimda code red worms version scans incoming outgoing traffic suspicious data exchanges routinely updated database feature ported norton internet security 2002 professional edition connection offending computer automatically severed traffic matches database item symantec announced professional edition november 19 2002 data recovery tools version allow users recover deleted malware-damaged files inclusion data erasure tool allows users delete files minimizing chance recovery web cleanup removes browser cache files history cookies maintain dial-up connections connection keep alive simulates online activity periods user inactivity norton productivity control enables users filter internet content block newsgroups used user access manager multiple filtering profiles created assigned different users announced september 8 2003 version 2004 adds adware spyware keylogger protection pc magazine found added protection weak spyware samples norton detected significant number removed completely requiring manual removal norton also little prevent spyware infections norton antispam renamed spam filtering feature set spam rules viewed edited whitelists blacklists senders created users may also create spam definitions antispam integrates outlook outlook express eudora allowing users tag e-mail spam on-the-fly e-mail identified spam either quarantined default however feature configured delete messages automatically cnet testing antispam correctly identified 94 percent spam messages product activation introduced release installation users allowed 15-day grace period activate copy norton internet security 2004 program work deadline without 24-character product key product key used activate copy norton internet security ties alphanumeric code based computer hardware configuration users may activate product five times product key however licensing terms dictate users allowed install norton internet security 2004 one computer symantec introduced version 2005 august 17 2004 version sometimes referred tagline antispyware edition since spyware detection integrated norton default enabled found threats listed separating ones already dealt ones requiring user interaction detailed information provided link symantec website however pc pro pc magazine noted lengthy scan times full scan took 24 minutes half hour respectively pc pro testing norton detected 61 percent spyware samples compared average 68 percent tested products removal rates average 72 percent versus average 68 percent norton blocked reinstallation score 48 percent compared group average 43 percent overall norton ranked fifth among tested products pc magazine testing norton installed slowly infected systems failed install one altogether contacting symantec resolve issue new features include internet worm protection block worms scan ip addresses open ports also blocks inbound ports based known suspected exploits using signatures heuristics addition feature follows msblast 2003 sasser 2004 worms exploited vulnerability microsoft windows operating systems response emerging privacy threats — 75 percent threats last 12 months attempted steal confidential information — version adds phishing protection using firewall component users create whitelist sites confidential information transmitted users alerted information transmitted site list outbreak alert feature warns users major threats classified symantec users press fix button applies set changes close vulnerabilities blocking necessary ports used propagating worm browser privacy suppress information website generally receive visitors browser operating system used feature also block advertisements privacy control warn users sending confidential information also configured block transmission allows users specify information sent via im e-mail item-specific exceptions allow users control data sent however pc pro found flaw information filtering feature way information formatted list confidential information affect effectiveness example entering last six digits credit card number stop numbers leaking grouped four digits pc magazine also noted fact anyone login computer view database private information reason symantec recommends entering last portion sensitive information norton antispam scans e-mails spoofed urls deals offending e-mail spam e-mails also blocked based language however default filter allows languages antispam sync list allowed senders pop3 address books users train spam filter pointing valid e-mail marked spam vice versa support yahoo mail hotmail added release norton internet security 2006 debuted september 26 2005 new main interface norton protection center aggregates information central location security status shown secure computer tasks e-mail internet browsing context features enabled protection center also recognize third-party software protecting computer new interface advertises additional products symantec categories protection data protection read coverage user purchases installs norton systemworks additional system tray icon created protection center installation noted lengthy pc magazine especially malware-infected systems spyware detection tweaked since last release updated better identify keyloggers pc magazine testing norton successfully detected 11 spyware threats removed two pc magazine give norton credit even manual removal required suite also removed three four commercial keyloggers attempting install spyware clean system norton blocked 11 two four commercial keyloggers cases block installation however norton call scan spyware installed pc pro testing norton detected 78 percent spyware removed 82 percent blocked 65 percent installing norton antispam discontinued separate product symantec available norton internet security feature block e-mail unknown senders automatically blocks messages suspicious elements invisible text html forms phishing urls improve accuracy norton analyzes outgoing e-mails messages whose categorization corrected users hitting spam spam buttons pc magazine testing feature marked one ten valid e-mail spam let one every six spam messages inbox 400 messages used program allowed process messages week pc pro testing feature performed better blocking 96 percent spam false positive rate 0.2 percent norton recommends disabling windows firewall avoid redundant alerts firewall stealthed significant ports pc magazine testing attacking firewall unsuccessful pc magazine unable stop service terminate process disable firewall using simulated mouse clicks firewall also passed pc pro tests successfully stealthing ports features include bloodhound technology looks virus-like behavior better find zero day viruses security inspector looks common vulnerabilities including insecure user account passwords browser insecurities advertisement blocking rewrites website html prevent advertisements displayed parental controls optional component block certain programs accessing internet im clients restrict newsgroup access restrictions assigned different windows users accounts sites classified 31 categories four profiles assigned block different categories sites supervisors define exceptions add global blocked sites block access sites user-created whitelist pc magazine pc pro noted exclusion time-based restrictions information filtering controlled per-user basis windows 98 compatibility dropped release 2007 version announced september 12 2006 tabbed interface allows users access norton protection center program settings without separate tray icons windows open symantec revised norton internet security made version modularized reduced suite memory usage 10–15 megabytes scan times 30–35 percent another result spam filtering parental controls separate components install installed features consume 100 mb disk space anti-phishing integrates internet explorer analyzes sites examining website url title form page layout visible text links uses blacklist detect phishing sites users blocked access suspected phishing sites however presented option continue pc magazine testing feature blocked 22 24 phishing sites internet explorer 7 recognized 17 24 sites pc pro testing feature successfully blocked access every phishing site tested spam filtering longer includes language feature symantec claims less useful current spam created false positives tested 1,500 messages pc magazine norton let half spam inbox five percent valid mail marked spam version utilizes symantec veritas vxms technology better identify rootkits vxms allows norton find inconsistencies among files within directories files volume level startup application manager allows users prevent applications launching login release drops support windows 2000 compatible windows vista upon release update firewall makes decisions lessen chance weakened misinformed decision applications known safe allowed internet access vice versa malicious applications unknown ones analyzed blocked exhibit malicious behavior pc magazine pc pro testing firewall incorrectly block safe applications internet access malware blocked firewall pc magazine testing reflected results firewall also stealthed ports exploits blocked intrusion prevention system prevents threats leveraging vulnerabilities system updated whenever vulnerability identified windows-based computers attempts disable firewall unsuccessful registry changes process termination simulated mouse clicks failed disabling windows services effect firewall since works kernel driver level version automatically adjusts configuration different networks based physical address gateway rather ip addresses pc magazine testing norton detected 15 16 spyware samples 13 16 removed eight commercial keyloggers suite removed samples clean system norton blocked 14 16 spyware samples installing stopped seven eight keyloggers installing 2008 version announced august 28 2007 adding support windows vista 64-bit new features include sonar norton identity safe browser defender sonar monitors applications malicious behavior identity safe supersedes information filtering function instead blocking personal information leaving computer stores personal information fill webforms password protected checks website authenticity filling forms browser defender inspects blocks suspicious api calls intended stop drive-by downloads network map identifies networked computers norton internet security 2008 installed remote monitoring allows checking status installations different computers problems identified red x icon using feature users also control network traffic computers also warns users using unencrypted wireless network startup application manager advertisement blocking features dropped release information filtering although superseded identity safe suite available separately used conjunction identity safe phishing protection integrates mozilla firefox testing pc magazine found norton blocked 94 percent phishing sites compared 83 percent internet explorer 7 77 percent firefox 2 cnet identified issue feature anti-phishing disabled identity safe still offers users automatically submit personal information websites including phishing sites symantec declined call flaw stating recommended use identity safe anti-phishing enabled alternatively identity safe could used firefox internet explorer built-in anti-phishing capability pc magazine found firewall put ports stealth mode firewall blocked ten 12 leak tests used see malware evade firewall control network traffic previous versions identify tests none carried malicious payload another test conducted using core impact successfully exploited one vulnerability test computer however components norton stopped exploit causing harm attempts unsuccessful either system invulnerable norton intrusion prevention system stopped attempts disable firewall unsuccessful pc magazine contrary pc pro identified 15 open ports computer norton installed pc magazine testing norton completely detected malware samples two-thirds samples traces removed norton found removed commercial keyloggers full scan took nearly hour complete though twice long 2007 version suite blocked malware installing commercial keyloggers regardless modifications made samples pc world noted norton removed 80 percent malware-associated files registry entries spam filtering imports users address books compile whitelist allowed senders addresses users send mail e-mail tagged valid mail automatically added whitelist using several thousand messages pc magazine found norton marked 40 percent valid e-mail spam 80 percent valid newsletters marked spam norton correctly identify 90 percent spam e-mail 2009 version released sale september 9 2008 symantec set several goals version 2009 development complete installations minute footprint 100 mb average installation times range eight ten minutes previous 2008 version 400 mb footprint goals included reducing load time computer starts 20–30 seconds 10 seconds file scanning times technology allowing norton skip certain trusted files technology works basis piece software runs significant proportion computers safe public beta released july 14 reduction memory consumption made prompted fact 40 percent people contacting symantec support 512 mb ram beta uses 6 mb memory compared 11 mb prior version reduce scan times norton insight uses data norton community participants avoid scanning files found statistically significant number computers citing npd group study finding 39 percent consumers switching antiviruses blamed performance cpu usage meter available within final product allow users find cause high cpu usage whether norton another program version features frequent updates change called norton pulse updates rather deliver update every eight hours 2008 version pulse updates delivered five fifteen minutes silent mode automatically suspends alerts updates program enters mode manually enabled suite activities take place computer idle terminate user activity registered final release 16.5 bundles spam filtering used free download symantec release also bundles norton safe web identifies malicious websites compatible internet explorer firefox norton safe web color codes search results famous search engine google yahoo safety norton safe web toolbar also includes ask.com search box search box share code ask toolbar instead box redirects queries ask search engine norton safe web compatible internet explorer firefox norton safe web benchmarking conducted passmark software highlights 2009 version 52 second install time 32 second scan time 7 mb memory utilization symantec funded benchmark test provided scripts used benchmark participating antivirus software tests conducted windows vista running dual core processor pc magazine found suite added 15 seconds boot time baseline 60 seconds norton added less 5 percent time takes complete file operations 25 percent time taken unzip zip set files pc magazine testing norton removed traces 40 percent malware similar test specifically using commercial keyloggers norton able remove keyloggers beating tested products norton blocked attempts install malware clean system modifications made samples fool norton norton able block installation commercial keyloggers phishing protection blocked 90 percent verified phishing websites pc magazine testing internet explorer 7 caught 75 percent firefox caught 60 percent norton stealthed ports according pc magazine port scans unsuccessful firewall blocked exploit attempts core impact malware blocking removal garnered good results pc magazine testing one malware samples contained within folder removed folder opened last one removed executed modifications made samples affect detection similar test specifically using commercial keyloggers norton successfully detect removing threats norton almost completely removed 40 percent malware samples related executables norton also able remove commercial keyloggers product version 2010 released officially september 8 2009 version features technology code named project quorum introduces reputation-based threat detection keep 200 million attacks month many symantec claims evade signature based detection new approach relies norton community watch participants send information applications running computers safe applications exhibit common attributes known origin known publishers conversely new malware may unknown publisher among attributes using data reputation score calculated used infer likelihood unknown application safe malicious facets quorum parental controls spam filtering norton internet security 2010 bundles free subscription onlinefamily.norton pc magazine found improvement parental controls bundled prior releases spam filtering uses technologies symantec acquired brightmail two filters used find spam locally installed one check symantec servers see message known spam pc magazine testing valid e-mail marked spam however 11 percent spam still made inbox significant improvement prior releases another improvement product improved heuristic feature called sonar 2 leverages reputation data judge program malicious clean norton insight also expanded showing users number norton community participants certain program installed impact system resources long released information program origin graph resource usage also provided new feature codenamed autospy helps users understand norton malware found malware actions norton resolution presented user previous releases removed threats sight quietly warned users potentially confusing users deceived downloading rogue security software another addition product new flip screen compatible graphics card main display flips show opposite side main interface consisting chart cpu memory usage timeline security events without one flip screen link replaced back link opens back windows separate window product also adds search engine labeled safe search custom search allows user filter unsafe sites get insight keep track http cookies malware removal blocking performed well setting meeting records pc magazine testing achieved detection rate 98 highest 12 tested antivirus products exception blocking commercial keyloggers norton made average score file operations took 2 percent longer file compression extraction test took 4 percent longer area norton introduced significant delay system booting beta version suite added 31 percent boot time significantly longer prior versions according norton performance comparison website norton internet security scans 31 percent faster 70 percent lighter installs 76 percent faster leading anti-virus product according av-comparatives norton internet security best product 2009 bronze award 98.6 detection rate 2010 norton internet security 2010 blocked 99/100 internet threats infecting user computer norton internet security 2011 released beta testing april 21 2010 changes include new user interface improved scanning internet sites malware 2011 version symantec also released application scans user facebook feed malware links application require valid subscription test sponsored symantec norton internet security 2011 security suite ever achieve 100 percent protection score new third-party test dennis labs improved reputation scan provides user easy understand interface files stored user computer marking trusted good poor bad final version norton internet security 2011 released august 31 2010 new features version 2011 also include norton rescue tools tools include norton bootable recovery tool norton power eraser december 9 2010 symantec released 18.5 version norton liveupdate however update later pulled due numerous reports norton forums update causing system instability freeze ups system scans full quick scans issue affects customers users affected update advised uninstall product run norton removal tool reinstall 18.1 version http //www.norton.com/nis11 symantec later fixed bugs re-released update following acquisition verisign security norton parent company symantec several verisign features incorporated 2011 edition new product features new norton logo uses verisign checkmark formerly seen verisign logo well several new icon changes norton safe web norton identity safe features released 19.1.0.28 september 6 2011 norton internet security 2012 brought new features one new features included new release download insight 2.0 monitors files safety also stability given file means file stable windows 7 unstable windows xp xp users notified file instability enhanced removal tools tightly integrated better cleanup already infected systems triggered new powerful version norton power eraser restarts system locate remove fake antivirus software fake antivirus software deeply embedded threats otherwise hard remove new tool called norton management helps manage different computers devices equipped norton software single location changes release include sonar 4 google chrome compatibility identity safe safe web ability store passwords notes cloud however license agreement guarantee passwords stored securely provides remedy cloud vault compromised user interface also simplified three buttons third button opens advanced complicated menu user able manage settings access different product features cpu meter removed norton 2011 also makes return advanced screen combining netbook desktop line norton internet security integrates bandwidth metering controls product traffic usage takes minimum necessary ideal networks limited traffic also user interface window adjusts accordingly size computer screen version norton internet security includes several easter eggs pressing shift+1 2 3 4 would change theme default background plain black ray animals floral respectively also holding control win key alt pressing performance button activate crazy flip make window flip head heels effect would continue main window closed reopened furthermore scans longer scheduled windows task scheduler symantec proprietary one performs tasks computer idle i.e. user away computer version 20 2013 began version-less approach dropping 20xx naming convention automatically update new releases become available notable changes include new user interface better suited touchscreen devices social networking protection intends protect threats targeted social networks also first release officially support windows 8 version released october 7 2013 became last version marketed symantec norton internet security along norton antivirus norton 360 replaced norton security version 22.5 update released june 2015 includes restyled user interface windows 10 support september 2014 norton internet security folded norton security part symantec streamlined norton line symantec released special edition norton internet security optimized netbooks available download symantec website usb thumb drive symantec states netbook edition optimized netbooks main display optimized provide support 800 x 480 screen resolution addition non-critical tasks delayed netbook battery furthermore netbook edition contains complimentary access norton secure online backup parental control protect children surf web norton internet security version 1.0 mac released november 1 2000 identify remove windows mac viruses features include firewall advertisement blocking browser parental controls ability prevent confidential information transmitted outside computer users prompted information able transmitted incorporation aladdin systems iclean allows users purge browser cache cookies browsing history within norton interface operating system requirements call mac os 8.1 hardware requirements call 24 mb ram 12 mb disk space powerpc processor norton internet security version 2.0 mac released date unknown know please provide version 2.0 also ties whois database allowing users trace attacking computers users inform network administrators attacking computers corrective actions running mac os 8.1 9 powerpc processor 24 mb ram 25 mb free space required mac os x 10.1 powerpc g3 processor 128 mb ram 25 mb free space required norton internet security version 3.0 mac released date unknown know please provide subsequent release version 3.0 maintained feature set found version 2.0 firewall allocates internet access needed rather relying user input using predefined rules compatibility os 8 dropped running os 9.2 powerpc processor 24 mb ram 25 mb free space required os x 10.1.5 10.3 powerpc g3 128 mb ram 150 mb free space required however version 3.0 compatible mac os x 10.4 tiger version 4.0 released december 18 2008 symantec also markets bundle version 4.0 2009 version windows intended users microsoft windows mac os x installed iclean dropped release firewall blocks access malicious sites using blacklist updated symantec prevent attackers leveraging insecurities mac installed software exploit protection introduced release phishing protection introduced release well operating system requirements call mac os x 10.4.11 higher powerpc intel core processor 256 mb ram 150 mb free space required features norton internet security underwent considerable changes performance symantec rewrote code 2009 release norton products two running processes using 15 mb ram according passmark security benchmark 2012 norton antivirus norton internet security lightest suites available av-comparatives.org also tested products gave similar results pc magazine recognized 2011 2012 lines fastest strongest protection pcworld tests security software put norton internet security 2009 first place 2011 test conducted pc world norton internet security winner dennis technology labs tests sponsored symantec confirmed performance effectiveness norton 2011 2012 lines symantec compliance federal bureau investigation fbi whitelisted magic lantern keylogger actively developed fbi purpose magic lantern obtain passwords encrypted e-mail part criminal investigation magic lantern first reported media bob sullivan msnbc november 20 2001 ted bridis associated press magic lantern deployed e-mail attachment attachment opened trojan horse installed suspect computer trojan horse activated suspect uses pgp encryption often used increase security sent e-mail messages activated trojan horse log pgp password allows fbi decrypt user communications symantec major antivirus vendors whitelisted magic lantern rendering antivirus products including norton internet security incapable detecting concerns include uncertainties magic lantern full potential whether hackers could subvert purposes outside jurisdiction law graham cluley technology consultant sophos said way knowing written fbi even ’ know whether used fbi commandeered third party another reaction came marc maiffret chief technical officer cofounder eeye digital security customers paying us service protect forms malicious code us law enforcement job make exceptions law enforcement malware tools fbi spokesman paul bresson response question whether magic lantern needed court order deployed said like technology projects tools deployed fbi would used pursuant appropriate legal process proponents magic lantern argue technology would allow law enforcement efficiently quickly decrypt messages protected encryption schemes unlike predecessor carnivore implementing magic lantern require physical access suspect computer would necessitate court order older versions norton hard slow uninstall leaving many traces sometimes completing errors however 2009 versions symantec featured uninstaller removes products better quickly usually less minute norton removal tool well known instrument removes norton products completely without trace tool downloaded symantec website symantec reports norton 2010 range products feature cleaner uninstall over-installs recommended update route 2011 link norton internet security 2008 installed users may encounter incompatibilities upgrading windows xp service pack 3 windows vista service pack 1 users report numerous invalid registry keys added tool named fixcss.exe resulting empty device manager missing devices wireless network adapters symantec initially blamed microsoft incompatibilities since accepted partial responsibility dave cole symantec vice president general manager acknowledged users running norton products experiencing problems said numbers small cole also said symantec done extensive testing products windows xp sp3 issue encountered cole blamed microsoft related xp sp3 microsoft recommended users contact windows customer support resolve problem symantec issued fix intended users upgrading symantec also recommends disabling tamper protection component 2008 release dubbed symprotect tool remove added registry entries also available symantec sarah hicks symantec vice president consumer product management voiced concern windows vista 64-bit patchguard feature patchguard designed microsoft ensure integrity kernel part operating system interacts hardware rootkits often hide operating system kernel complicating removal mike dalton european president mcafee said decision build wall around kernel assumption ca n't breached ridiculous claiming microsoft preventing security vendors effectively protecting kernel promoting security product windows live onecare hicks said symantec mind competition onecare symantec later published white paper detailing patchguard instructions obtain patchguard exploit negotiations investigations antitrust regulators microsoft decided allow security vendors access kernel creating special api instructions | [
1809,
3932,
6802,
385,
7536,
1838,
4689,
6107,
5401,
6456,
405,
6823,
7193,
5773,
6149,
2617,
88,
5452,
91,
806,
4398,
1931,
2296,
4783,
7646,
496,
7275,
5144,
142,
3394,
5856,
6560,
7289,
4091,
7683,
6235,
7309,
6951,
875,
6962,
1249,
... | Test |
7,598 | 1 | HeidiSQL:heidisql heidisql free open-source administration tool mysql forks well microsoft sql server postgresql codebase originally taken ansgar becker mysql-front 2.5 software due sold mysql-front branding unrelated party becker chose heidisql replacement name suggested friend tribute heidi klum reinforced becker nostalgia heidi girl alps version written java jheidi designed work mac linux computers discontinued march 2010 favor wine support ansgar becker began development mysql front-end 1999 naming project mysql-front used direct api layer written matthias fichtner interface mysql servers contained databases private development continued 2003 version 2.5 2004 period inactivity becker sold mysql-front branding nils hoyer continued development cloning original software april 2006 becker open-sourced application sourceforge renaming project heidisql heidisql re-engineered use newer popular database-interface layer zeoslib debuted version 3.0 database layer replaced single-unit approach october 2009 becker later extended supporting database servers support microsoft sql server added march 2011 7.0 release since 8.0 release heidisql offers gui 22 languages english translations contributed users various countries via transifex postgresql support introduced march 2014 9.0 release early 2018 slightly extended v9.5 release published microsoft store heidisql following gui features capabilities | [
7957,
5717,
6879,
4759,
7715,
1359,
5126,
5571,
6279,
4708,
4167,
3652,
6755,
6386,
5956,
1128,
4363,
5780,
6056,
1695,
2259
] | Test |
7,599 | 7 | GameSpy_Technology:gamespy technology gamespy technology also known gamespy industries inc. division glu mobile developer gamespy technology product suite middleware tools software services use computer video game industry gamespy technology acquired glu mobile 2012 company service shut may 2014 gamespy shut gamespy technology consisted array portable c sdks plug hosted web services provided following functionality game engines | [
6788,
4759,
2681,
578
] | Test |
7,600 | 4 | ZeroAccess_botnet:zeroaccess botnet zeroaccess trojan horse computer malware affects microsoft windows operating systems used download malware infected machine botnet remaining hidden using rootkit techniques zeroaccess botnet discovered least around may 2011 zeroaccess rootkit responsible botnet spread estimated present least 9 million systems estimates size botnet vary across sources antivirus vendor sophos estimated botnet size around 1 million active infected machines third quarter 2012 security firm kindsight estimated 2.2 million infected active systems bot spread zeroaccess rootkit variety attack vectors one attack vector form social engineering user persuaded execute malicious code either disguising legitimate file including hidden additional payload executable announces example bypassing copyright protection keygen second attack vector utilizes advertising network order user click advertisement redirects site hosting malicious software third infection vector used affiliate scheme third party persons paid installing rootkit system december 2013 coalition led microsoft moved destroy command control network botnet attack ineffective though c c seized peer-to-peer command control component unaffected meaning botnet could still updated system infected zeroaccess rootkit start one two main botnet operations bitcoin mining click fraud machines involved bitcoin mining generate bitcoins controller estimated worth 2.7 million us dollars per year september 2012 machines used click fraud simulate clicks website advertisements paid pay per click basis estimated profit activity may high 100,000 us dollars per day costing advertisers 900,000 day fraudulent clicks typically zeroaccess infects master boot record mbr infected machine may alternatively infect random driver c \windows\system32\drivers giving total control operating system also disables windows security center firewall windows defender operating system zeroaccess also hooks tcp/ip stack help click fraud software also looks tidserv malware removes finds | [
704,
2173,
3932,
2912,
376,
3277,
2923,
3281,
7186,
2577,
5401,
744,
6823,
2587,
51,
3323,
5779,
7600,
4025,
1528,
2632,
4759,
2991,
1173,
6526,
6904,
6541,
6194,
7657,
2678,
3038,
7294,
3047,
6569,
2693,
862,
7307,
6589,
5187,
4110,
19... | Test |
7,601 | 2 | IPad_Mini_2:ipad mini 2 ipad mini 2 stylized marketed ipad mini 2 previously marketed ipad mini retina display second-generation ipad mini tablet computer produced marketed apple inc design almost identical first generation ipad mini features internal revisions addition a7 system-on-a-chip 2,048 × 1,536 resolution retina display ipad mini 2 nearly hardware larger sibling ipad air apple released ipad mini 2 space gray silver colors november 12 2013 successor ipad mini 3 unveiled october 16 2014 featuring internals adding touch id differing storage sizes additional gold color ipad mini 2 discontinued march 21 2017 following press announcement new lower cost ipad replaces ipad air 2 ipad mini 2 first ipad mini support six major versions ios ios 7 ios 12 ipad mini 2 announced keynote yerba buena center arts october 22 2013 theme keynote named 'we still lot cover ipad mini 2 originally marketed ipad mini retina display however successor ipad mini 3 announced october 16 2014 apple started marketing former device ipad mini 2 ipad mini 2 comes ios 7 operating system released september 18 2013 jony ive designer ios 7 new elements described update bringing order complexity highlighting features refined typography new icons translucency layering physics gyroscope-driven parallaxing major changes design design ios 7 os x mavericks version 10.9 noticeably depart skeuomorphic elements green felt game center wood newsstand leather calendar favor flat colourful design act hotspot carriers sharing internet connection wi-fi bluetooth usb also access apple app store digital application distribution platform ios service allows users browse download applications itunes store developed xcode ios sdk published apple app store garageband imovie iphoto iwork apps pages keynote numbers available ipad mini 2 bluetooth function attaches wireless keyboard headset allows user access wireless keyboard used apple pages writing program needs editing ipad mini 2 comes several pre-installed applications including siri safari mail photos video music itunes app store maps notes calendar game center photo booth contacts like ios devices ipad sync content data mac pc using itunes although ios 5 later managed backed without computer although tablet designed make phone calls cellular network users use headset built-in speaker microphone place phone calls wi-fi cellular using voip application skype device dictation application using voice recognition technology iphone 4s enables users speak ipad types say screen though ipad must internet connection available via wi-fi cellular network due feature reliance apple servers translate speech ipad mini 2 ibooks application originally optional app though since release ios 8 comes pre-installed displays books epub-format content downloaded ibooks store several major book publishers including penguin books harpercollins simon schuster macmillan committed publishing books device despite direct competitor amazon kindle barnes noble nook amazon.com barnes noble offer e-reader apps ipad siri intelligent personal assistant knowledge navigator included application uses natural language user interface answer questions make recommendations perform actions delegating requests set web services apple claims software adapts user individual preferences time personalizes results ios 7 adds new male female voices new system setting functionalities redesign match rest operating system integration twitter wikipedia bing photos facebook comes integrated apple native apps facebook features directly accessed within native apps calendar sync facebook events use facebook like button within apple app store june 2 2014 announced ipad mini 2 would receive ios 8 update june 13 2016 announced ipad mini 2 support ios 10 update june 5 2017 also announced ipad mini 2 support ios 11 update apple announced ipad mini 2 support ios 12 update together apple a7 cousins make first ipad mini support six major versions ios ios 7 ios 12 longest supported ipad mini june 2019 apple announced drop support ipad mini 2 release ipados along a7 cousins ipad mini 2 sized 7.9-inch screen largely design first generation ipad mini 1st generation one notable change inclusion retina display matching screen resolution full-sized retina ipad models mini 2 features resolution ipad air makes mini 2 screen even pixel dense compared larger sibling slate-colored back panel first-generation ipad mini discontinued favor space gray lighter grey tone whilst silver color option still remained ipad mini 2 shares hardware components ipad air iphone 5s notably 64-bit apple a7 system-on-chip apple m7 motion processor mini 2 a7 system-on-chip clocked slightly slower otherwise one ipad air iphone 5s three released q4 2013 mini 2 uses home button predecessor therefore support touch id feature added succeeding ipad mini 3 mini 2 also includes 5 megapixel rear-facing camera 1.2 mp facetime hd front-facing camera support 802.11n estimated 10 hours battery life previous generations ipad hardware four buttons one switch ipad mini 2 device portrait orientation home button face device display returns user home screen wake/sleep button top edge device two buttons upper right side device performing volume up/down functions switch whose function varies according device settings functioning either switch device silent mode lock/unlock orientation screen addition wifi version weighs 331 grams cellular model weighs 341 grams – slightly respective predecessors display responds sensors ambient light sensor adjust screen brightness 3-axis accelerometer sense orientation switch portrait landscape modes unlike iphone ipod touch built-in applications work three orientations portrait landscape-left landscape-right ipad built-in applications support screen rotation four orientations including upside-down consequently device intrinsic native orientation relative position home button changes audio playback ipad mini 2 stereo two speakers located either side lightning connector ipad mini 2 originally available 16 32 64 128gb internal flash memory expansion option however announcement ipad mini 3 october 16 2014 64 128gb versions ipad mini 2 discontinued september 7 2016 16gb model discontinued well final model 32gb discontinued march 21 2017 following unveiling new lower-cost ipad apple also sells camera connection kit sd card reader used transfer photos videos ipad mini 2 models connect wireless lan offer dual band wi-fi support also manufactured either without capability communicate cellular network tablet cellular model comes two variants support nano-sims quad-band gsm penta-band umts dual-band cdma ev-do rev b. additionally one variant also supports lte bands 1 2 3 4 5 7 8 13 17 18 19 20 25 26 variant supports lte bands 1 2 3 5 7 8 18 19 20 td-lte bands 38 39 40 apple ability handle many different bands one device allowed offer first time single ipad variant supports cellular bands technologies deployed major north american wireless providers time device introduction mini 2 praised packing essentially hardware larger expensive ipad air significantly compact lighter featuring even pixel-dense screen keeping resolution despite smaller display 100 usd cheaper air mini 2 essentially rendered obsolete similarly-priced ipad 2 ipad 4 remained apple ipad lineup first year mini 2 availability budget alternative ipad air writing techradar gareth beavis awarded ipad mini 2 rating 4.5 5 beavis praises retina display a7 chip performance states design still best tablet category however criticize price increase website anandtech anand lal shimpi highly compliments design increased speed ipad mini 2 lamenting limited color palette stating ... ’ shame tradeoff exists two ipads especially given good apple srgb coverage nearly displays despite criticisms quality camera jeffrey van camp digital trends gave tablet score 4.5 5 writes ipad mini 2 favorite tablet 2013 powerful 64-bit a7 processor high-resolution ‘ retina ’ screen finishes job apple started first ipad mini addressing main complaints original mini under-powered processor low-resolution display like contemporary ipads mini 2 rear camera photo quality mediocre compared iphones ipad mini 2 also considerably expensive closest android competitor nexus 7 although mini 2 significantly powerful better build quality well apple larger tablet-specific app selection established ecosystem ipad mini 2 criticized thicker heavier original ipad mini also criticized taking longer time charge | [
6788,
3940,
7890,
5732,
722,
1094,
4320,
2926,
4690,
5037,
734,
5752,
405,
6125,
2954,
1123,
7572,
6482,
6847,
6142,
2609,
1895,
4373,
7226,
4376,
2978,
5091,
4749,
5450,
3346,
6165,
4389,
5463,
102,
5469,
4768,
3001,
2284,
3008,
5477,
... | Test |
7,602 | 2 | Windows_Meeting_Space:windows meeting space windows meeting space codenamed windows shared view also referred windows collaboration peer-to-peer collaboration program developed microsoft windows vista replacement older windows netmeeting application however features microphone support ability set audio video conferences removed meeting space enables application sharing collaborative editing desktop sharing file sharing projecting simple text-based ink-based instant messaging across 10 users connected network across internet meeting space ability automatically set ad hoc wireless network connection network internet available also enables participants invite people meeting sessions one first applications new peer-to-peer infrastructure windows vista hence requires ipv6 meeting space available editions windows vista functionality unavailable starter edition home basic edition allows users join sessions meeting space exist edition windows 7 microsoft recommended microsoft office live meeting replacement meeting space result microsoft peer-to-peer collaboration efforts—with emphasis mobile computing—discussed windows hardware engineering conference 2004 windows vista codenamed longhorn time reported windows vista would enable users create ad hoc wireless networks file sharing discover people connected nearby meeting space relies functionality services meeting space demonstrated jim allchin darryn dieken professional developers conference pdc 2005 projected shared powerpoint presentation allchin stated demonstration illustrate functions application itself—development complete time—but illustrate select capabilities peer-to-peer framework windows vista later interview paul thurrott allchin expressed desire developers create applications supporting peer-to-peer capabilities starting session workspace contains presentation area displayed list notes also shown list users local subnet collaboration session started automatically detected using people near functionality based ws-discovery peer-to-peer networking implementation windows vista users outside local subnet must sent e-mail file invitation participate applications shared session local session application shared windows meeting space switches presentation mode participants see presenter working collaboratively edit review shared application instance | [
7879,
3937,
3263,
378,
2198,
6096,
1475,
7553,
7195,
5410,
7564,
2953,
422,
6844,
6136,
2245,
435,
5442,
4377,
5090,
3340,
6164,
4759,
1534,
6885,
7619,
2999,
5475,
6528,
2290,
4774,
1181,
3711,
5134,
7272,
1571,
5850,
140,
6558,
6575,
... | Test |
7,603 | 4 | ValidSoft:validsoft validsoft security software company providing telecommunications-based multi-factor authentication identity transaction verification technology company founded 2003 current ceo patrick carroll company provides business-to-business mobile security cloud security products including multi-factor authentication platform called smart secure mobile architecture real-time transactions uses mobile telecommunication channels devices includes proprietary voice biometric engine solutions designed reduce electronic fraud safeguard consumer privacy using internet mobile banking credit/debit card mobile fixed line telephony channels validsoft products designed verify authenticity parties transaction mutual authentication ensure fidelity telecommunication channels secure communications confirm integrity transactions transaction verification | [
3794,
6515,
7865
] | Validation |
7,604 | 4 | Key_ring_file:key ring file key ring file contains multiple public keys certificate authority ca key ring file necessary secure sockets layer ssl connection web securely stored server hosts website contains public/private key pair particular website also contains public/private key pairs various certificate authorities trusted root certificate various certification authorities entity website administrator send certificate signing request csr ca ca returns signed certificate entity certificate received ca stored key ring | [
6795,
6049,
363
] | Test |
7,605 | 2 | Transaction_Processing_Facility:transaction processing facility transaction processing facility tpf ibm real-time operating system mainframe computers descended ibm system/360 family including zseries system z9 tpf delivers fast high-volume high-throughput transaction processing handling large continuous loads essentially simple transactions across large geographically dispersed networks industrial-strength transaction processing systems notably ibm cics ims tpf specialty extreme volume large numbers concurrent users fast response times example visa credit card transaction processing peak holiday shopping season tpf passenger reservation application pars international version ipars used many airlines one tpf major optional components high performance specialized database facility called tpf database facility tpfdf close cousin tpf transaction monitor alcs developed ibm integrate tpf services common mainframe operating system mvs z/os tpf evolved airlines control program acp free package developed mid-1960s ibm association major north american european airlines 1979 ibm introduced tpf replacement acp — priced software product new name suggests greater scope evolution non-airline related entities tpf traditionally ibm system/370 assembly language environment performance reasons many tpf assembler applications persist however recent versions tpf encourage use c. another programming language called sabretalk born died tpf ibm announced delivery current release tpf dubbed z/tpf v1.1 september 2005 significantly z/tpf adds 64-bit addressing mandates use 64-bit gnu development tools gcc compiler dignus systems/c++ systems/c supported compilers z/tpf dignus compilers offer reduced source code changes moving tpf 4.1 z/tpf current users include sabre reservations visa inc. authorizations american airlines american express authorizations dxc technology shares reservations formerly eds hpes holiday inn central reservations amtrak marriott international travelport galileo apollo worldspan axess japan gds citibank air canada trenitalia reservations delta air lines reservations operations japan airlines tpf capable running multiprocessor systems one cpu within lpar cpus referred instruction streams simply i-streams running lpar one i-stream tpf said running tightly coupled tpf adheres smp concepts concept numa-based distinctions memory addresses exist depth cpu ready list measured incoming transaction received queued i-stream lowest demand thus maintaining continuous load balancing among available processors cases loosely coupled configurations populated multiprocessor cpcs central processing complex i.e physical machine packaged one system cabinet smp takes place within cpc described whereas sharing inter-cpc resources takes place described loosely coupled tpf architecture memory except 4kb-sized prefix area shared among i-streams instances memory-resident data must kept separated i-stream programmer typically allocates storage area number subsections equal number i-streams accesses desired i-stream associated area taking base address allocated area adding product i-stream relative number times size subsection tpf capable supporting multiple mainframes size — single i-stream multiple i-stream connecting operating common database currently 32 ibm mainframes may share tpf database system operation would called 32-way loosely coupled simplest loosely coupled system would two ibm mainframes sharing one dasd direct access storage device case control program would equally loaded core program record dasd could potentially accessed either mainframe order serialize accesses data records loosely coupled system practice known record locking must used means one mainframe processor obtains hold record mechanism must prevent processors obtaining hold communicate requesting processors waiting within tightly coupled system easy manage i-streams via use record hold table however lock obtained offboard tpf processor dasd control unit external process must used historically record locking accomplished dasd control unit via rpq known llf limited locking facility later ellf extended llf ellf replaced multipathing lock facility mplf run clustered loosely coupled z/tpf requires either mplf disk control units alternative locking device called coupling facility records absolutely must managed record locking process processor shared tpf record accesses done using record type ordinal defined record type tpf system 'fred gave 100 records ordinals processor shared scheme record type 'fred ordinal 5 would resolve exactly file address dasd — clearly necessitating use record locking mechanism processor shared records tpf system accessed via exactly file address resolve exactly location processor unique record one defined processor expected loosely coupled complex record type 'fred perhaps 100 ordinals however user 2 processors examines file address record type 'fred ordinal 5 resolves note different physical address used tpf general-purpose operating system gpos tpf specialized role process transaction input messages return output messages 1:1 basis extremely high volume short maximum elapsed time limits tpf built-in graphical user interface functionality tpf never offered direct graphical display facilities implement host would considered unnecessary potentially harmful diversion real-time system resources tpf user interface command-line driven simple text display terminals scroll upwards mouse-driven cursors windows icons tpf prime cras computer room agent set — best thought operator console character messages intended mode communications human users work accomplished via use command line similar unix without x several products available connect prime cras provide graphical interface functions tpf operator tpf operations server graphical interfaces end users desired must provided external systems systems perform analysis character content see screen scrape convert message to/from desired graphical form depending context specialized purpose operating system tpf host compiler/assembler text editor implement concept desktop one might expect find gpos tpf application source code commonly stored external systems likewise built offline starting z/tpf 1.1 linux supported build platform executable programs intended z/tpf operation must observe elf format s390x-ibm-linux using tpf requires knowledge command guide since support online command directory man /help facility users might accustomed commands created shipped ibm system administration tpf called functional messages -- commonly referred z-messages prefixed letter z letters reserved customers may write commands tpf implements debugging distributed client-server mode necessary system headless multi-processing nature pausing entire system order trap single task would highly counter-productive debugger packages developed 3rd party vendors took different approaches break/continue operations required tpf host implementing unique communications protocols used traffic human developer running debugger client server-side debug controller well form function debugger program operations client side two examples 3rd party debugger packages step step trace bedford associates cmstpf tpf/gi ztpfgi tpf software inc.. neither package wholly compatible ibm offering ibm debugging client offering packaged ide called ibm tpf toolkit tpf highly optimized permit messages supported network either switched another location routed application specific set programs permit extremely efficient accesses database records historically data tpf system fit fixed record core block sizes 381 1055 4k bytes due part physical record sizes blocks located dasd much overhead saved freeing part operating system breaking large data entities smaller ones file operations reassembling read operations since ibm hardware i/o via use channels channel programs tpf would generate small efficient channel programs i/o — name speed since early days also placed premium size storage media — memory disk tpf applications evolved powerful things using little resource today much limitations removed fact legacy support smaller-than-4k dasd records still used advances made dasd technology read/write 4k record efficient 1055 byte record advances increased capacity device longer premium placed ability pack data smallest model possible tpf also program segments allocated 381 1055 4k byte-sized records different points history segment consisted single record typically comprehensive application requiring perhaps tens even hundreds segments first forty years tpf history segments never link-edited instead relocatable object code direct output assembler laid memory internally self-referential relocatable symbols resolved entire image written file later loading system created challenging programming environment segments related one another could directly address control transfer implemented enter/back system service acp/tpf earliest days circa 1965 memory space severely limited gave rise distinction file-resident core-resident programs -- frequently used application programs written memory never removed core-residency rest stored file read demand backing memory buffers released post-execution introduction c language tpf version 3.0 first implemented conformant segment conventions including absence linkage editing scheme quickly demonstrated impractical anything simplest c programs tpf 4.1 truly fully linked load modules introduced tpf compiled z/os c/c++ compiler using tpf-specific header files linked iewl resulting z/os-conformant load module manner could considered traditional tpf segment tpf loader extended read z/os-unique load module file format lay file-resident load modules sections memory meanwhile assembly language programs remained confined tpf segment model creating obvious disparity applications written assembler written higher level languages hll z/tpf 1.1 source language types conceptually unified fully link-edited conform elf specification segment concept became obsolete meaning program written source language -- including assembler -- may size furthermore external references became possible separate source code programs segments could directly linked together shared object value point critical legacy applications benefit improved efficiency simple repackaging -- calls made members single shared object module much shorter pathlength run time compared calling system enter/back service members shared object may share writeable data regions directly thanks copy-on-write functionality also introduced z/tpf 1.1 coincidentally reinforces tpf reentrancy requirements concepts file- core- residency also made obsolete due z/tpf design point sought programs resident memory times since z/tpf maintain call stack high-level language programs gave hll programs ability benefit stack-based memory allocation deemed beneficial extend call stack assembly language programs optional basis ease memory pressure ease recursive programming z/tpf executable programs packaged elf shared objects historically step previous core blocks— memory— also 381 1055 4 k bytes size since memory blocks size overhead obtaining memory found systems discarded programmer merely needed decide size block would fit need ask tpf would maintain list blocks use simply hand first block available list physical memory divided sections reserved size 1055 byte block always came section returned overhead needed add address appropriate physical block table list compaction data collection required applications got advanced demands memory increased c became available memory chunks indeterminate large size required gave rise use heap storage memory management routines ease overhead tpf memory broken frames— 4 kb size 1 mb z/tpf application needs certain number bytes number contiguous frames required fill need granted | [
1807,
3599,
4291,
4662,
4297,
4670,
5021,
13,
3271,
7172,
3276,
3626,
5041,
7546,
5396,
7550,
3298,
402,
4336,
405,
1855,
4347,
65,
3664,
6849,
771,
4366,
4733,
5783,
6853,
5088,
6500,
785,
1516,
2266,
788,
3682,
7950,
1522,
7611,
4759,... | Test |
7,606 | 9 | PostScript_Printer_Description:postscript printer description postscript printer description ppd files created vendors describe entire set features capabilities available postscript printers ppd also contains postscript code commands used invoke features print job ppds function drivers postscript printers providing unified interface printer capabilities features example generic ppd file models hp color laserjet contains specifies printer understands postscript level 2 color device forth ppd describe allowable paper sizes memory configurations minimum font set printer even specify tree-based user interface printer-specific configuration ppd also often called postscript page description instead printer description postscript concept page devices postscript page description configuration read saved ppd file cups uses ppd drivers postscript printers even extended concept allow postscript printing non-postscript printing devices directing output cups filter file longer standard ppd rather cups-ppd cups clients usually read current ppd file server every time new print job created microsoft windows also uses ppd files converts binary .bpd file format using normally stored c \windows\system32\spool\drivers\w32x86\3 x86 system c \windows\system32\spool\drivers\x64\3 64 bit system updating ppd files requires removing reinstalling printer mime type cups variant ppd application/vnd.cups.ppd | [
2815,
4759,
4780,
7223,
6016,
1303
] | Test |
7,607 | 2 | MAPI:mapi messaging application programming interface mapi api microsoft windows allows programs become email-aware mapi designed independent protocol usually used communicate microsoft exchange server mapi uses functions loosely based x.400 xapia standard includes facilities access message transports message stores directories simple mapi smapi subset 12 functions enable developers add basic messaging functionality extended mapi emapi allows complete control messaging system client computer includes creation management messages plus management client mailbox service providers simple mapi included microsoft windows part outlook express/windows mail full extended mapi included office outlook exchange addition extended mapi client interface programming calls made indirectly simple mapi api client interface common messaging calls cmc api client interface object-based cdo library interface three methods easier use designed less complex messaging-enabled -aware applications simple mapi cmc removed exchange 2003 mapi originally designed microsoft company founded ms mail team 1987 acquired consumers software 1991 obtain network courier messaging product reworked sold ms pc mail microsoft mail pc networking basic api ms pc mail later known mapi version 0 mapi0 differentiate true mapi full extended mapi interface required interfacing messaging-based services client applications outlook example several non-microsoft e-mail server product vendors created mapi service providers allow products accessed via outlook notable examples include axigen mail server kerio connect scalix zimbra hp openmail ibm lotus notes zarafa/kopano bynari mapi also service provider interface sorts microsoft used interface ms mail email system based xenix internal use extended mapi main e-mail data access method used outlook interface microsoft exchange via mapi service providers shipped outlook microsoft released full details mapi/rpc protocol since august 2007 mapi protocol colloquial name mapi/rpc times microsoft also called exchange rpc outlook-exchange transport protocol microsoft provides sample mapi/rpc-based application called mfcmapi assist developers also widely used diagnostics tool developers microsoft exchange administrators original implementation designed use local network lan outlook anywhere feature extended external internet-facing interface mapi/http introduced 2014 exchange 2013 sp1 replaced 'normal http-based stack several open-source software projects started working implementing mapi libraries including | [
7149,
6420,
714,
720,
1460,
2928,
7907,
5747,
743,
2953,
6840,
422,
1900,
4017,
6504,
4022,
4751,
4026,
7607,
1526,
3687,
4759,
2283,
5479,
7263,
5486,
5850,
150,
6933,
519,
3052,
4448,
3407,
1232,
2702,
7687,
1989,
4848,
2373,
4129,
80... | Test |
7,608 | 7 | Smartsheet:smartsheet smartsheet software service saas application collaboration work management developed marketed smartsheet inc used assign tasks track project progress manage calendars share documents manage work using spreadsheet-like user interface smartsheet used collaborate project timelines documents calendars tasks work according idg part office productivity part project management part document sharing ... trying central hub people work smartsheet combines functionality microsoft excel project access sharepoint competes microsoft project 10 million users 85,000 organizations according forbes smartsheet relatively simple user interface interface centers smartsheets similar spreadsheets typically found microsoft excel smartsheet rows expanded collapsed see individual tasks large-scale project progress respectively tasks sorted deadline priority person assigned spreadsheet contains dates smartsheet create calendar view row smartsheet may files attached emails stored within discussion board associated new smartsheet created notifications pushed staff populate rows columns information updated smartsheets tracking task project data-point updated automatically service also alerts task deadline coming keeps track document versions smartsheet import data microsoft office google applications software integrates services like salesforce.com dropbox amazon web services also smartsheet mobile app android iphone operating systems smartsheet sold subscription basis free version smartsheet first introduced 2006 according company co-founder brent frei initial adoption slow software difficult use end first year 10,000 users company began making changes software 2008 eventually cutting 60 percent features purpose making user-friendly following 2010 launch redesign adoption grew 1 million users 20,000 organizations 2012 integration microsoft office 365 microsoft azure added 2014 october account map tool introduced uses algorithm visualize flow work across groups employees august 2014 version 2.0 smartsheet ios app introduced made spreadsheet-like user interface focus app user interface whereas previously mobile interface different spreadsheet-oriented desktop version 2015 smartsheet started introducing closer integrations microsoft office products part thanks changes microsoft making products work better third-party software january 2015 smartsheet added support microsoft identity management software azure active directory allowed users log products like excel smartsheet login users also make changes smartsheets directly microsoft outlook 2016 smartsheet introduced sights configurable dashboard shows metrics team performing key performance indicators smartsheet inc. publicly-listed company develops markets smartsheet application 2017 760 employees headquartered bellevue washington company founded summer 2006 shortly co-founder brent frei sold prior company onyx software initially funded mostly frei year founding smartsheet raised 4 million funding nine employees early 2012 raised 8.2 million funding three rounds hired first salesperson smartsheet software redesigned 2010 company revenues grew 100 percent year four consecutive years raised 26 million funding december 2012 another 35 million may 2014 2017 company raised additional 52.1 million funding 2018 announced smartsheet acquired converse.ai scotland-based company develops software creating business automation bots company began trading new york stock exchange april 27 2018 | [
2489,
7037,
5064,
330
] | Test |
7,609 | 2 | AVFoundation:avfoundation avfoundation framework objective-c interface provides high-level services working time-based audiovisual media apple operating systems ios macos tvos watchos first introduced ios 2.2 seen significant changes ios 4 ios 5 ios 6 starting mac os x lion default media framework macos platform | [
3940,
713,
4690,
734,
405,
6832,
3989,
2597,
3322,
1502,
5786,
4740,
1897,
6505,
2627,
1171,
5109,
2284,
1178,
6188,
1187,
2300,
1562,
6909,
6548,
502,
6557,
2679,
6565,
2329,
3050,
163,
6582,
5535,
5191,
8051,
7335,
3445,
569,
7000,
62... | Test |
7,610 | 0 | Categorial_grammar:categorial grammar categorial grammar term used family formalisms natural language syntax motivated principle compositionality organized according view syntactic constituents generally combine functions according function-argument relationship versions categorial grammar analyze sentence structure terms constituencies opposed dependencies therefore phrase structure grammars opposed dependency grammars categorial grammar consists two parts lexicon assigns set types also called categories basic symbol type inference rules determine type string symbols follows types constituent symbols advantage type inference rules fixed specification particular language grammar entirely determined lexicon categorial grammar shares features simply typed lambda calculus whereas lambda calculus one function type formula_1 categorial grammar typically two function types one type applied left one right example simple categorial grammar might two function types formula_2 formula_3 first formula_2 type phrase results phrase type formula_5 followed right phrase type formula_6 second formula_7 type phrase results phrase type formula_5 preceded left phrase type formula_6 notation based upon algebra fraction multiplied i.e concatenated denominator yields numerator concatenation commutative makes difference whether denominator occurs left right concatenation must side denominator cancel first simplest kind categorial grammar called basic categorial grammar sometimes ab-grammar ajdukiewicz bar-hillel given set primitive types formula_10 let formula_11 set types constructed primitive types basic case least set formula_12 formula_13 formula_14 think purely formal expressions freely generated primitive types semantics added later authors assume fixed infinite set primitive types used grammars making primitive types part grammar whole construction kept finite basic categorial grammar tuple formula_15 formula_16 finite set symbols formula_10 finite set primitive types formula_18 relation formula_19 lexicon relates types symbols formula_20 since lexicon finite specified listing set pairs like formula_21 grammar english might three basic types formula_22 assigning count nouns type formula_23 complete noun phrases type formula_24 sentences type formula_25 adjective could type formula_26 followed noun whole phrase noun similarly determiner type formula_27 forms complete noun phrase followed noun intransitive verbs type formula_28 transitive verbs type formula_29 string words sentence overall type formula_25 example take string bad boy made mess determiners boy mess nouns bad adjective made transitive verb lexicon formula_32 formula_33 formula_34 formula_35 formula_36 sequence types string formula_37 find functions appropriate arguments reduce according two inference rules formula_38 formula_39 formula_40 br formula_41 br formula_42 br formula_43 br formula_44 br formula_45 fact result formula_25 means string sentence sequence reductions shows must parsed bad boy made mess categorial grammars form function application rules equivalent generative capacity context-free grammars thus often considered inadequate theories natural language syntax unlike cfgs categorial grammars lexicalized meaning small number mostly language-independent rules employed syntactic phenomena derive lexical entries specific words another appealing aspect categorial grammars often easy assign compositional semantics first assigning interpretation types basic categories associating derived categories appropriate function types interpretation constituent simply value function argument modifications handle intensionality quantification approach used cover wide variety semantic phenomena lambek grammar elaboration idea concatenation operator types several inference rules mati pentus shown still generative capacity context-free grammars lambek calculus type concatenation operator formula_47 formula_12 formula_13 formula_50 lambek calculus consists several deduction rules specify type inclusion assertions derived following rules upper case roman letters stand types upper case greek letters stand sequences types sequent form formula_51 read string type formula_52 consists concatenation strings types formula_53 type interpreted set strings formula_54 may interpreted formula_55 includes subset horizontal line means inclusion line implies one line process begun axiom rule antecedents says type includes math axiom \quad | [
5782,
2882,
4660
] | Test |
7,611 | 2 | GeckOS:geckos geckos discontinued experimental operating system mos 6502 compatible processors system offers unix-like functionality including preemptive multitasking multithreading semaphores signals binary relocation tcp/ip networking via slip 6502 standard library geckos includes native support commodore pet 32 kb 96 kb models commodore 64 cs/a65 homebrew system due platform independent nature kernel code geckos advertised extremely easy os port alternative 6502 platforms binary compatibility lunix operating system attained lib6502 shared library used due lack mmu small fixed-location stack 6502 multitasking somewhat limited os supports maximum four tasks shared stack space used increased sixteen tasks stack snapshotting enabled although done expense system speed | [
1339,
1522,
7325,
7605,
280,
2818,
4759,
190,
4670,
5021,
8066,
4397,
13,
8167,
5644,
3271,
5116,
6984,
299,
3626,
7142,
3533,
5571,
2300,
5041,
7827,
4786,
578,
7550,
4244,
5232,
1992,
405,
6367,
6922,
8115,
5161,
5865,
7396,
65,
861,
... | Test |
7,612 | 4 | David_Lowman:david lowman david daniel lowman former national security agency employee expert witness case overturned hirabayashi v. united states author posthumously published book magic untold story u.s. intelligence evacuation japanese residents west coast world war ii lowman career officer national security agency 1970s lowman worked declassification world war ii japanese cable traffic decrypted magic program based reading cables criticized commission wartime relocation internment civilians conclusion military necessity relocating japanese-americans internment camps 1985 court case brought gordon hirabayashi clear wartime conviction refusing report relocation lowman testified united states government intercepted decrypted signal traffic japan directing officials united states organize spy networks using japanese-americans agents court decided favor hirabayashi lowman died april 1999 lowman book magic untold story u.s. intelligence evacuation japanese residents west coast world war ii published posthumously 2001 magic argued internment japanese americans justified based intercepted communications indicated spy network operating american west coast book published lee allen retired army lieutenant colonel activist convinced smithsonian institution revise downward estimates medals honors awarded japanese-american soldiers world war ii allen also wrote book foreword claimed japanese-americans world war ii evacuation life government care provided much needed relief trials threats faced west coast magic particularly criticized civil liberties act 1988 offered reparations surviving japanese-american internees writing military review richard milligan concluded magic refutes accepted history evacuation solely result national leaders 'racism war hysteria lack political publishers weekly agreed book discussion decrypted japanese communications makes solid case intelligence community faith credibility contributed significantly government decision also noted book actually refute claims racism digressing instead technical details bitter critique 1988 decision compensate former prisoners jonathan kirsch los angeles times praised book intellectually honest enough allow us come conclusions particularly inclusion rebuttal general counsel commission wartime relocation internment civilians also suggested possible read magic intercepts come away entirely different impression evidence | [] | Test |
7,613 | 7 | RightScale:rightscale rightscale company sells software service cloud computing management multiple providers company based santa barbara california thorsten von eicken former professor computer science cornell university left manage systems architecture expertcity startup company became citrix online joined rightscale ceo michael crandell rightscale vice president engineering rafael saavedra rightscale received 4.5 million venture capital april 2008 13 million december 2008 25 million september 2010 july 18 2012 rightscale announced acquisition scotland-based planforcloud.com formerly shopforcloud.com provides free cloud cost forecasting service rightscale introduced cloud maturity model release second annual state cloud report april 25 2013 report findings based rightscale survey 625 decision makers categorized according cloud maturity model analysis segmentation companies based varying degrees cloud adoption company raised 15.6 million february 2013 september 26 2018 flexera software acquired rightscale undisclosed amount november 5 2012 rightscale announced expanding existing relationship cloud hosting provider rackspace integrate openstack february 2013 rightscale became first cloud management company resell google compute engine public cloud services april 15 2013 rightscale announced would provide enterprise support windows azure conjunction microsoft announcement general availability release windows azure infrastructure services | [
4211,
5894,
4217,
2988,
370,
632,
189,
289,
1634,
3091,
6262,
7165,
3954,
7722,
3958,
6806,
22,
3627,
1550,
5927,
2212,
6906,
5135,
7741,
320,
1757,
3028,
5940,
2317,
7838,
842,
3309,
754,
5064,
330,
7114,
4627,
2961,
2430,
4636,
7037,
... | Test |
7,614 | 4 | Capture_the_flag:capture flag capture flag ctf traditional outdoor game two teams flag marker objective capture team flag located team base bring safely back base enemy players tagged players home territory depending rules may game become members opposite team sent back territory frozen place jail freed member team capture flag requires playing field sort indoor outdoor versions field divided two clearly designated halves known territories players form two teams one territory side flag often piece fabric object small enough easily carried person night time games might use flashlights glowsticks lanterns flags sometimes teams wear dark colors night make difficult opponents see one team opposing team flag territory may tagged opposing team flag objective game players venture opposing team territory grab flag return territory without tagged flag defended mainly tagging opposing players attempt take within territory players safe meaning tagged opposing players cross opposing team territory vulnerable flag usually placed visibly obvious location rear team territory difficult version flag hidden place seen one angle also might challenge involved example flag could hidden leaves tall tree players see flag knock bring base different versions capture flag different rules handling flag happens tagged players player tagged may eliminated game entirely game forced join opposing team sent back territory placed jail without guard according number people team jail predesignated area group territory exists holding tagged players normally towards back group territory tagged players may confined jail limited predetermined time common form game involves option jailbreak version players tagged remain jail indefinitely however players team may free jail means jailbreak jailbreaks accomplished player running territory enemy jail action may depending rules free jailed players simply physically touched one performing jailbreak variants teammates got tagged jailed 3 times kicked game next round general freed players obligated return directly territory attempting offensive action i.e. attempting grab flag return side freed players usually acquire free walk-backs safe tagging reach home territory player performing jail break hand neither safe restricted performing actions attempting grab flag generally moving enemy territory sometimes players jail form chains teammate tags one person chain everyone free simply leaving jail without freed considered poor sportsmanship severely frowned upon often leading expulsion game players one team jailed meaning teammate free jail team time want find team flag rules handling flag also vary game game deal mostly disposition flag failed attempt capturing one variant player tagged carrying flag returned original place another variant flag left location player tagged latter variant makes offensive play easier flag tend course game moved closer dividing line territories games possible players throw flag teammates long flag stays play without hitting ground allowed players pass flag captured one player 're safe tagged unless trip sometimes flag holder may safe even home territory obtain flags thus ending game option return side hand teammate carry side versions may throw flag hand running game player returns territory enemy flag teams flags also general rule flag carrier may attempt free teammates jail alterations may include one flag ctf defensive team offensive team games three flags case latter one win flags captured one another variation players put bandannas pockets six inches sticking instead tagging opponents must pull opponent bandanna pocket matter player bandanna pulled 're captured must depending preferences players go jail return base returning play version team territory small base team flag kept win one team must flags base urban settings game played indoors enclosed area walls similar walls hockey rink also spot sticking back opposing ends connected playing area flag placed urban variation legal checking hockey style legal checking boards allowed player commits foul illegal check placed penalty box specified amount time depending severity foul player deliberately injures opponent expelled rest game throwing flag allowed variation long flag caught hits ground flag thrown teammate hits ground caught flag placed spot throw player throws flag blocked intercepted player opposing team flag placed back base uncommon airsoft paintball nerf water warriors play ctf typically territories versions players hit must sit predetermined amount time returning play respawning 2014 kickstarter users fully funded campaign starlux games capture flag redux update would allow played night dark campaign raised 7,000 100 backers new game uses glowing orbs flags led bracelets identify teams light-up markers show boundaries jails kit comes 2 glowing orbs 8 jail markers 7 territory lights 16 led glow bracelets eight team 12 cards explain game variation one guidebook english spanish 2018 heavy.com featured game roundup 62 best games tweens toybuzz.org regularly includes game gift guides plasticandplush.com describes capture flag redux good example one successful kickstarter projects ’ widely available online retail aside software video games apps used urban capture flag first time classic game reimagined retail product stealing sticks similar game played british isles united states australia however instead flag number sticks items coats hats placed goal far end side playing field area capture flag players sent prison tagged opponents side may freed teammates player may take one opponents sticks time first team take opponents sticks side wins 1984 scholastic published bannercatch apple ii commodore computers edutainment game recognizable capture-the-flag mechanics bannercatch allows two humans alternating two characters game world play capture flag increasingly difficult team four ai bots bannercatch game world divided quadrants home enemy two no-mans land areas hold jails successful capture requires bringing enemy flag one team home quadrant players captured enemy territory no-mans land holding flag captured players must rescued designated jail one members team fallen flags remain dropped time-out period elapses flag returns one several starting locations home territory 2d map also features walls trees moving river enabling wide variety strategies special locations play area allow humans query game state flag status using binary messages 1992 richard carr released ms-dos based game called capture flag turn-based strategy game real time network modem play play-by-mail based around traditional outdoor game game required players merely move one characters onto square opponent flag opposed bringing back friendly territory difficulties implementing artificial intelligence computer player would needed bring enemy flag home intercept opposing characters carrying flag computer security capture flag ctf type wargame computer security competition ctf contests usually designed serve educational exercise give participants experience securing machine well conducting reacting sort attacks found real world i.e. bug bounty programs professional settings reverse-engineering network sniffing protocol analysis system administration programming cryptanalysis skills required prior ctf contests def con three main styles capture flag competitions attack/defense hardware challenges jeopardy attack/defense style competition team given machine small network defend isolated network teams scored success defending assigned machine success attacking team machines depending nature particular ctf game teams may either attempting take opponent flag machine teams may attempting plant flag opponent machine two prominent attack/defense ctf held every year def con largest hacker conference nyu-csaw cyber security awareness week largest student cyber-security contest hardware challenges usually involve getting unknown piece hardware figure bypass part security e.g using debugging ports using side-channel attack jeopardy -style competitions usually involve multiple categories problems contains variety questions different point values difficulties teams attempt earn points competition time frame example 24 hours directly attack rather race style game play encourages taking time approach challenges prioritizes quantity correct submissions timing fourth type ctf commonly referred king hill koth king hill similar attack/defend instead everyone machine small network defend preconfigured ones require teams exploit team successfully taken machine focus shifts defending machine teams attacks score usually determined score reporting service machine reports team token one team able gain access remove teams token insert thus making king hill capture flag among games made recent comeback among adults part urban gaming trend includes games like pac-manhattan fugitive manhunt game played city streets players use cellphones communicate news games spreads virally use blogs mailing lists urban capture flag played cities throughout north america one long running example occurs northrop mall university minnesota fridays typical attendance ranging 50 several hundred | [
768,
2289,
3100,
501,
4521,
6380,
1584,
3140,
1805
] | Test |
7,615 | 3 | Alien_Syndrome:alien syndrome two players control two soldiers named ricky mary fight way large eight-way scrolling levels rescuing comrades held aliens rescued certain number hostages exit opens pass order fight end-of-level guardian monstrosity defeated able move onto next stage alien syndrome features two player simultaneous gameplay pickups assist player including better weapons maps current level 1988 game ported master system msx amiga atari st amstrad cpc commodore 64 famicom/nintendo entertainment system published tengen without nintendo license later game ported zx spectrum 1989 game gear 1992 sharp x68000 1992 latter arcade perfect port original arcade version game reviewed july 1987 issue computer video games clare edgeley described one gripping games played months praising aliens like horror atmosphere chilling sounds special effects graphics gameplay stated first time atmosphere sheer addictiveness shoot 'em transported another planet concluded fantastic master system version game reviewed 1989 dragon getting 2 5 stars game also converted polygonal graphics ps2 part sega ages re-release program included us version sega classics collection removed european version receive lower age certificate version updated controls adding use analog sticks similar seen sheriff smash tv original arcade game also included unlockable sonic ultimate genesis collection sequel name alien syndrome released wii psp july 24 2007 | [
1237,
6380
] | Test |
7,616 | 2 | BartPE:bartpe bartpe bart preinstalled environment discontinued tool customizes windows xp windows server 2003 lightweight environment similar windows preinstallation environment could run live cd live usb drive bartpe system image created using pe builder freeware program created bart lagerweij requires legal copy windows xp windows server 2003 additional applications included image using plugins often resides live cd usb drive bartpe allows user boot windows even hardware software fault disabled installed operating system internal hard drive – instance recover files also used scan remove rootkits computer viruses spyware infected boot files reset lost administrator password pe builder also known bart pe builder software used create bartpe system images windows preinstallation environment bartpe operates loading system registry files ram writing registry changes back boot media thus operating systems require hard drive network access also allows run non-writable media cd-rom since instance bartpe new installation bartpe boot disk needs original windows setup files order operate bart pe builder application interprets condenses files windows setup cd create bartpe installation build windows xp pro home edition cd preinstalled windows xp version without cd additional applications included bartpe setup use plugins plugin contains setup information specific application included media installed along windows bartpe boot currently hundred plugins available addition dozen-odd included default bartpe since bartpe represents totally independent operating environment obvious application examples involve backup restoration diagnosis error-correction systems malfunctioning primary storage drives plugin programs nominally added capacity bartpe media bartpe known certain incompatibilities windows xp cds shipped dell pcs dell versions include changes windows setup files cause bartpe build process fail two patches currently available correct known problems one replace setupreg.hiv load standard iastor.sys bartpe create windows vista windows 7 live dvds | [
448,
2452,
458,
4759,
5637,
6256,
1536,
3180,
4398,
3271,
6528,
3187,
2472,
4687,
1097,
5401,
5313,
6823,
224,
7660,
8118,
3048,
6136,
3907,
4183,
5781,
2885,
5794,
7685,
3585,
4377,
1992,
444,
788,
447
] | Validation |
7,617 | 4 | SUPERAntiSpyware:superantispyware superantispyware software application detect remove spyware adware trojan horses rogue security software computer worms rootkits parasites potentially harmful software applications although detect various types malware superantispyware designed replace antivirus software superantispyware virus definitions updated several times week generally receive build update month company claims specifically designed compatible security applications kaspersky therefore used even applications incompatible anti-spyware products product available freeware personal use limited functions automatic update scheduling limited repairing functions 2011 superantispyware received dismal rating pc magazine complained real-time protection lowest detection rate lowest score malware removal test freeware commercial version received 4 5 star average user rating cnet download.com website 16 july 2011 superantispyware acquired support.com transaction structured acquisition assets cash purchase price 8.5 million employees including founder industry leader nick skrepetos joined acquirer | [
1395,
4759,
5571,
6823,
4492
] | Test |
7,618 | 1 | Paradox_(database):paradox database paradox relational database management system currently published corel corporation originally released ms-dos ansa software updated borland bought company mid 1991 borland began process acquire ashton-tate competing dbase product line windows version planned release borland 1992 delayed january 1993 time microsoft access windows available paradox last updated 2008 paradox dos relational database management system originally written richard schwartz robert shostak released belmont california-based company ansa software 1985 new york times described among first emerging generation software making extensive use artificial intelligence techniques noted paradox could read competing ashton tate dbase files september 1987 borland purchased ansa software including paradox/dos 2.0 software notable classic versions 3.5 4.5 versions 3.5 evolutions 1.0 version 4.0 4.5 retooled borland c++ windowing toolkit used different extended memory access scheme paradox/dos successful dos-based database late 1980s early 1990s time dbase xbase clones foxpro clipper dominated market notable competitors clarion dataease dataflex features distinguished paradox/dos – copiously illustrated well laid explanations written common english paradox windows distinctly different product paradox dos produced different team programmers paradox windows applications programmed different programming language called objectpal although key features dos product qbe database engine ports keeping dos code major break compatibility pal objectpal shift gui design metaphor forms reports objectpal changes controversial forced since pal based keystroke recording actions equivalent windows object-based language based ideas hypercard used place keystroke recording forms reports designers used device independent scaling including ability work zoomed mode detailed layout mouse right-click used access forms reports properties inspired xerox alto smalltalk way almost universal windows programs objectpal like hypercard associated visual objects also revealed right click property inspection layout tools could pinned stay screen idea borrowed next fairly widely adopted windows approximately first year development object-oriented code written c aided macros turbo c++ available point remaining parts code written c++ product manager shipping version 1.0 joe duncan development qa team totaled 30 people paradox windows quattro pro windows closely related project started development using beta versions windows 3.0 spring 1990 paradox/windows ended delayed year beyond original plan shipping early 1993 reasons many entirely surprising major rewrite oo language new tools shifting gui paradigm essentially first version operating system still big problem company microsoft managed ship access couple months ahead paradox windows major marketing win microsoft 1990 borland also started work internal dbase clone dos windows written assembler planned ship 1992 early 1992 became clear ashton-tate difficulties developing windows versions products borland switched plans instead acquiring company anointing internal project official successor part ashton-tate acquisition interbase database decided paradox/w able work interbase well paradox engine led creation idapi engine based around interbase acquisition also shifted focus paradox historically competed dbase markets paradox/w originally designed improve competitive position developer-oriented market dbase acquired longer desirable emphasis shifted towards ease-of-use market however product could changed match emphasis occurred later releases late stage making product somewhat overly complex entry level market microsoft first desktop database program microsoft access good job addressing market got first debuted comdex november 1992 response borland acquisition ashton-tate microsoft acquired foxpro incorporated rushmore technology access jet engine significantly improve performance microsoft access offered many features easier end users developers implement including intuitive query interface using windows links fields rather paradox text tagging fields qbe access basic programming language similar pal objectpal access paradox significantly differed way presented results queries access showed records query completed without overhead creating output table paradox showed results records retrieved answer table created performance difference significant large datasets negatively impacted paradox/w taking cue borland low price quattro pro spreadsheet debut microsoft excel microsoft access debuted 99 price undercut traditional dbms prices paradox dos paradox windows dbase around 799 negatively impacted borland firm borland management team 85 market share desktop database market severely underestimated threat microsoft microsoft access still paradox/w sold well meanwhile borland going serious problems caused ashton-tate acquisition many product lines discontinued corporate reorganization consolidation painful even worse internal dbase project center acquisition rationale eventually cancelled technical reasons leaving borland collapse revenues serious need develop missing dbase windows hurry borland lost strength fight multiple marketing battles needed range products paradox minimally marketed developers since company decided would hold replacement dbase eventually came 1994 late company make matters worse dbase dos clone foxbase copied dbase closely windows version product developed without existing dbase windows model one dbase dos strengths multi-vendor support lost various windows xbase products borland visual dbase windows could n't run microsoft foxbase windows programs vice versa faced fragmented market need rewrite programs take advantage windows little incentive xbase users stay loyal product 'd used dos 1995 microsoft bundled access microsoft office professional suite word excel powerpoint effectively killed end-user desktop database market standalone products despite solid follow-on versions improvements usability entry-level users paradox faded market included sale borland products wordperfect turn resold wordperfect got financial products current time writing paradox windows wordperfect quattro pro windows owned corel sold part office suite dbase windows came late significant player windows market dbase programmers migrated microsoft foxbase similar database tool borland retained interbase/idapi server focused efforts delphi tools years gave influential small part data-oriented developer market corel acquired certain rights develop market paradox mid-1990s released corel paradox 8 1997 association computing machinery acm began putting information corel paradox version 8 1998 paradox also bundled professional version corel wordperfect office suite subsequent releases included office professional edition versions 9 10 11 12 x3 x4 x5 x6 x7 x8 x9 strong paradox user base mainly centered paradox community associated newsgroups although many fans objectpal programming language paradox/windows pal/dos scripts could easily migrated object event models completely different forcing developers using pal completely rewrite database applications | [
4290,
1909,
3255,
7248,
7634,
3307,
5852,
6380,
6386,
519,
5252,
2515,
5784,
1792,
5450,
7145
] | Validation |
7,619 | 2 | Microsoft_Store_(digital):microsoft store digital microsoft store formerly known windows store digital distribution platform owned microsoft started app store windows 8 windows server 2012 primary means distributing universal windows platform uwp apps windows 10 microsoft merged distribution platforms windows marketplace windows phone store xbox video xbox music eventually xbox store microsoft store making unified distribution point apps digital videos digital music console games e-books included 2019 content available free charge store 2015 669,000 apps available store categories containing largest number apps games entertainment books reference education majority app developers one app similar platforms mac app store google play microsoft store curated apps must certified compatibility content addition user-facing microsoft store client store also developer portal developers interact microsoft takes 30 sale price apps prior january 1 2015 cut reduced 20 developer profits reached 25,000 microsoft previously maintained similar digital distribution system software known windows marketplace allowed customers purchase software online marketplace tracked product keys licenses allowing users retrieve purchases switching computers windows marketplace discontinued november 2008 microsoft first announced digital distribution service windows presentation build developer conference september 13 2011 details announced conference revealed store would able hold listings certified traditional windows apps well called metro-style apps time tightly-sandboxed software based microsoft design guidelines constantly monitored quality compliance consumers windows store intended way obtain metro-style apps announced alongside developer preview release windows 8 windows store become available consumer preview released february 2012 updates apps published store july 1 2019 available windows 8 rtm users per microsoft lifecycle policies windows 8 unsupported since 2016 updated version windows store introduced windows 8.1 home page remodeled display apps focused categories popular recommended top free paid special offers expanded details ability apps automatically update also added windows 8.1 update also introduced notable presentation changes including increasing top app lists return 1000 apps instead 100 apps 'picks section changing default sorting reviews 'most popular updates apps published store july 1 2023 available windows 8.1 windows 10 released updated version windows store merged microsoft distribution platforms windows marketplace windows phone store xbox video xbox music unified store front windows 10 platforms offering apps games music film tv series themes ebooks september 2017 microsoft began re-brand windows store microsoft store new icon carrying microsoft logo xbox store merged new version platform web apps traditional desktop software packaged distribution windows store desktop software distributed windows store packaged using app-v system allow sandboxing february 2018 microsoft announced progressive web apps would begin available microsoft store microsoft would automatically add selected quality progressive web apps bing crawler allow developers submit progressive web apps microsoft store windows store available windows server 2012 installed default unavailable windows server 2016 however line-of-business uwp apps uwp apps acquired microsoft store business formerly windows store business installed sideloading microsoft store primary means distributing windows store apps users although sideloading apps outside store supported out-of-box sideloading support windows 8 available enterprise edition windows 8 running computers joined windows domain sideloading windows rt windows 8 pro windows 8 enterprise computers without domain affiliation requires purchase additional licenses volume licensing windows 10 removes requirement allowing users freely enable disable sideloading initially microsoft took 30 cut app sales reached us 25,000 revenue cut dropped 20 january 1 2015 reduction cut 25,000 removed microsoft takes 30 cut app purchases regardless overall sales third-party transactions also allowed microsoft take cut early 2019 microsoft lets app developers get 95 app revenues microsoft take 5 user download app direct url individual developers able register 19 usd companies 99 usd 2015 669,000 apps available store including apps windows nt windows phone uwp apps work platforms categories containing largest number apps games entertainment books reference education majority app developers one app free paid apps distributed microsoft store paid apps ranging cost us 0.99 999.99 developers 120 countries submit apps microsoft store apps may support 109 languages long support one 12 app certification languages april 2 2019 microsoft announced sale e-books microsoft store ceased due drm licenses renewed books become inaccessible july 2019 microsoft automatically refund users purchased books via service similar windows phone store microsoft store regulated microsoft applicants must obtain microsoft approval app becomes available store prohibited apps include following types app forbidden microsoft indicated remotely disable and/or remove apps users systems security legal reasons case paid apps refunds may issued done microsoft initially banned pegi 18 -rated content store europe however critics noted made content policies stricter intended pegi 18-rated games rated mature u.s. esrb system next lowest highest rating adults guidelines amended december 2012 remove discrepancy addition user facing microsoft store client store also developer portal developers interact windows developer portal following sections app microsoft store provides developer tools tracking apps store one track downloads financials crashes adoption ratings dashboard also presents detailed breakdown users market age region well charts number downloads purchases average time spent app dashboard also allows developer claim app name one year name returned available pool | [
3603,
4293,
7879,
3937,
3263,
2550,
5726,
4675,
378,
6428,
2198,
7169,
3958,
6096,
5386,
6440,
1475,
4697,
5747,
6110,
7553,
745,
3303,
7555,
7195,
5410,
7564,
2233,
2953,
53,
2594,
6839,
422,
6844,
425,
2245,
5781,
432,
435,
781,
5442,... | Train |
7,620 | 7 | Pilot_job:pilot job computer science pilot job type multilevel scheduling resource acquired application application schedule work resource directly rather going local job scheduler might lead queue waits work unit term comes condor high-throughput computing system condor glideins provides functionality examples pilot jobs bigjob implemented saga swift coasters part swift parallel scripting system falkon lightweight task execution framework htcaas pilot jobs often used systems queues part purpose sense avoid multiple waits queues often found parallel computing systems pilot jobs usually part distributed application many times associated many-task computing | [
4905
] | Test |
7,621 | 2 | Windows_Driver_Kit:windows driver kit windows driver kit wdk software toolset microsoft enables development device drivers microsoft windows platform includes documentation samples build environments tools driver developers complete toolset driver development also need following compiler visual studio windows sdk windows hlk previously wdk known windows driver development kit ddk supported windows driver model wdm development got current name microsoft released windows vista added following previously separated tools kit installable file system kit ifs kit driver test manager dtm though dtm later renamed removed wdk ddk windows 2000 earlier versions include compiler instead need install visual c++ separately compile drivers version windows xp ddk later wdk include command line compiler compile drivers one reasons microsoft gave including compiler quality drivers would improve compiled version compiler used compile windows visual c++ targeted application development different product cycle frequent changes wdk 8.x later series goes back require installing matched version visual studio separately time integration complete edit build debug driver within visual studio directly note windows nt ddk windows 98 ddk windows 2000 ddk longer made available download microsoft java-related settlements made microsoft sun microsystems | [
4759,
7619,
7715,
7971,
2283,
4936,
8183,
8085,
2840,
7080,
5571,
8094,
4697,
5747,
5234,
3303,
930,
53,
941,
422,
7029,
425,
1684,
5694,
5252,
2341,
2702,
7687,
2530,
4017,
2085
] | Train |
7,622 | 4 | Nilsimsa_Hash:nilsimsa hash nilsimsa anti-spam focused locality-sensitive hashing algorithm originally proposed cmeclax remailer operator 2001 reviewed ernesto damiani et al 2004 paper titled open digest-based technique spam detection goal nilsimsa generate hash digest email message digests two similar messages similar comparison cryptographic hash functions sha-1 md5 making small modification document substantially change resulting hash document paper suggests nilsimsa satisfies three requirements subsequent testing range file types identified nilsimsa hash significantly higher false positive rate compared similarity digest schemes tlsh ssdeep sdhash nilsimsa similarity matching taken consideration jesse kornblum developing fuzzy hashing 2006 used algorithms spamsum andrew tridgell 2002 several implementations nilsimsa exist open-source software | [
4734
] | Test |
7,623 | 4 | MAC_flooding:mac flooding computer networking media access control attack mac flooding technique employed compromise security network switches attack works forcing legitimate mac table contents switch forcing unicast flooding behavior potentially sending sensitive information portions network normally intended go switches maintain mac table maps individual mac addresses network physical ports switch allows switch direct data physical port recipient located opposed indiscriminately broadcasting data ports ethernet hub advantage method data bridged exclusively network segment containing computer data specifically destined typical mac flooding attack switch fed many ethernet frames containing different source mac addresses attacker intention consume limited memory set aside switch store mac address table effect attack may vary across implementations however desired effect attacker force legitimate mac addresses mac address table causing significant quantities incoming frames flooded ports flooding behavior mac flooding attack gets name launching successful mac flooding attack malicious user use packet analyzer capture sensitive data transmitted computers would accessible switch operating normally attacker may also follow arp spoofing attack allow retain access privileged data switches recover initial mac flooding attack mac flooding also used rudimentary vlan hopping attack prevent mac flooding attacks network operators usually rely presence one features network equipment | [
6574,
5181,
4836,
4208,
3504
] | Test |
7,624 | 4 | Greylisting:greylisting greylisting method defending e-mail users spam mail transfer agent mta using greylisting temporarily reject email sender recognize mail legitimate originating server try delay sufficient time elapsed email accepted server employing greylisting temporarily rejects email unknown suspicious sources sending 4xx reply codes please call back later defined simple mail transfer protocol smtp fully capable smtp implementations expected maintain queues retrying message transmissions cases legitimate mail may delayed still get temporary rejection issued different stages smtp dialogue allowing implementation store less data incoming message trade-off work bandwidth exact matching retries original messages rejecting message content received allows server store choice headers and/or hash message body addition whitelisting good senders greylister provide exceptions greylisting generally overridden fully validated tls connection matching certificate large senders often pool machines send resend email ip addresses most-significant 24 bits /24 treated equivalent cases spf records used determine sending pool similarly e-mail systems use unique per-message return-paths example variable envelope return path verp mailing lists sender rewriting scheme forwarded e-mail bounce address tag validation backscatter protection etc exact match sender address required every e-mail systems delayed greylisting systems try avoid delay eliminating variable parts verp using sender domain beginning local-part sender address greylisting effective mass email tools used spammers queue reattempt mail delivery normal regular mail transport agent delaying delivery also gives real-time blackhole lists similar lists time identify flag spam source thus subsequent attempts likely detected spam mechanisms greylisting delay main advantage user point view greylisting requires additional user configuration server utilizing greylisting configured appropriately end user notice delay first message given sender long sending email server identified belonging whitelisted group earlier messages mail sender repeatedly greylisted may worth contacting mail system administrator detailed headers delayed mail mail administrator point view benefit twofold greylisting takes minimal configuration get running occasional modifications local whitelists second benefit rejecting email temporary 451 error actual error code implementation dependent cheap system resources spam filtering tools intensive users cpu memory stopping spam hits filtering processes far fewer system resources used biggest disadvantage greylisting unrecognized servers destroys near-instantaneous nature email users come expect mail unrecognized servers typically delayed 15 minutes could delayed days poorly configured sending systems explaining users become accustomed immediate email delivery probably convince mail server uses greylisting behaving correctly particular problem websites require account created email address confirmed used – user greylisting mailserver attempts reset credentials website uses email confirmation password resets sending mta site poorly configured greylisting may delay initial email link extreme cases delivery delay imposed greylister exceed expiry time password reset token delivered email cases manual intervention may required whitelist website mailserver email containing reset token used expires mail server greylisted duration time initial delay re-transmission variable – something greylisting server control visibility smtp says retry interval least 30 minutes give-up time needs least 4–5 days actual values vary widely different mail server software modern greylisting applications postgrey unix-like operating systems automatically whitelist senders prove capable recovering temporary errors note irrespective reputed spamminess sender implementation also generally include ability manually whitelist mailservers one 2007 analysis greylisting considers totally undesirable due delay mail unreliable greylisting becomes widespread junkmailers adapt systems get around conclusion purpose greylisting reduce amount spam server spam-filtering software needs analyze resource-intensively save money servers reduce spam reaching users conclusion greylisting annoying much annoying spam current smtp specification rfc 5321 clearly states smtp client retains responsibility delivery message section 4.2.5 mail transmitted immediately must queued periodically retried sender section 4.5.4.1 mtas therefore queue retry messages small number typically handled whitelisting exception lists also legitimate mail might get delivered retry comes different ip address original attempt source email server farm goes kind relay service likely server original one make next attempt network fault tolerance ips belong completely unrelated address blocks thereby defying simple technique identifying significant part address since ip addresses different recipient server fail recognize series attempts related refuse turn continue message ages queue number servers large enough problem partially bypassed proactively identifying exceptions server farms likewise exception configured multihomed hosts hosts using dhcp extreme case sender could legitimately use different ipv6 address outbound smtp connection sender server subjected greylisting might also reattempt delivery another receiving mailserver receiving domain one mx record may cause problems hosts implement greylisting policy share database | [
4926,
2100,
293,
6908,
2578,
4072,
5416,
4443,
2510,
1781,
4734
] | Test |
7,625 | 5 | 3G-324M:3g-324m 3g-324m 3gpp umbrella protocol video telephony 3g mobile networks 3g-324m protocol operates established circuit switched connection two communicating peers 3g-324m umbrella specification enable conversational multimedia communication circuit switched cs networks adopted 3gpp 3g-324m based itu-t h.324 specification multimedia conferencing circuit switched networks 3g-324m composed following sub-protocols 3g-324m specification using circuit switched network allows delay sensitive conversational multimedia services 3g-324m agnostic actual circuit switched network uses run easily umts well td-scdma networks 3g-324m proven solution conversational multimedia based services packet-based wireless networks deliver inherent overhead ber sensitivity variant routing delays 3g-324m operating circuit switched channel two communication peers guarantees fixed-delay quality service multimedia communications combining circuit switched 3g-324m services packet-based sip services presence leverage strength networks enable new types differentiated innovative mobile 3g services audio codec video codec | [
7170
] | Test |
7,626 | 5 | Internet_Key_Exchange:internet key exchange computing internet key exchange ike sometimes ikev1 ikev2 depending version protocol used set security association sa ipsec protocol suite ike builds upon oakley protocol isakmp ike uses x.509 certificates authentication ‒ either pre-shared distributed using dns preferably dnssec ‒ diffie–hellman key exchange set shared session secret cryptographic keys derived addition security policy every peer connect must manually maintained internet engineering task force ietf originally defined ike november 1998 series publications request comments known rfc 2407 rfc 2408 rfc 2409 rfc 4306 updated ike version two ikev2 december 2005 rfc 4718 clarified open details october 2006 rfc 5996 combined two documents plus additional clarifications updated ikev2 published september 2010 later update upgraded document proposed standard internet standard published rfc 7296 october 2014 parent organization ietf internet society isoc maintained copyrights standards freely available internet community ipsec implementations consist ike daemon runs user space ipsec stack kernel processes actual ip packets user-space daemons easy access mass storage containing configuration information ipsec endpoint addresses keys certificates required kernel modules hand process packets efficiently minimum overhead—which important performance reasons ike protocol uses udp packets usually port 500 generally requires 4–6 packets 2–3 round trips create sa security association sides negotiated key material given ipsec stack instance could aes key information identifying ip endpoints ports protected well type ipsec tunnel created ipsec stack turn intercepts relevant ip packets appropriate performs encryption/decryption required implementations vary interception packets done—for example use virtual devices others take slice firewall etc ikev1 consists two phases phase 1 phase 2 ike phase one purpose establish secure authenticated communication channel using diffie–hellman key exchange algorithm generate shared secret key encrypt ike communications negotiation results one single bi-directional isakmp security association sa authentication performed using either pre-shared key shared secret signatures public key encryption phase 1 operates either main mode aggressive mode main mode protects identity peers hash shared key encrypting aggressive mode ike phase two ike peers use secure channel established phase 1 negotiate security associations behalf services like ipsec negotiation results minimum two unidirectional security associations one inbound one outbound phase 2 operates quick mode originally ike numerous configuration options lacked general facility automatic negotiation well-known default case universally implemented consequently sides ike exactly agree type security association wanted create – option option – connection could established complications arose fact many implementations debug output difficult interpret facility produce diagnostic output ike specifications open significant degree interpretation bordering design faults dead-peer-detection case point giving rise different ike implementations able create agreed-upon security association many combinations options however correctly configured might appear either end need intent overhaul ike protocol described appendix rfc 4306 following issues addressed ietf ipsecme working group standardized number extensions goal modernizing ikev2 protocol adapting better high volume production environments extensions include ike supported part ipsec implementation windows 2000 windows xp windows server 2003 windows vista windows server 2008 isakmp/ike implementation jointly developed cisco microsoft microsoft windows 7 windows server 2008 r2 partially support ikev2 rfc 7296 well mobike rfc 4555 vpn reconnect feature also known agile vpn several open source implementations ipsec associated ike capabilities linux libreswan openswan strongswan implementations provide ike daemon configure i.e. establish sas klips xfrm/netkey kernel-based ipsec stacks xfrm/netkey linux native ipsec implementation available version 2.6 berkeley software distributions also ipsec implementation ike daemon importantly cryptographic framework openbsd cryptographic framework ocf makes supporting cryptographic accelerators much easier ocf recently ported linux significant number network equipment vendors created ike daemons ipsec implementations license stack one another number implementations ikev2 companies dealing ipsec certification interoperability testing starting hold workshops testing well updated certification requirements deal ikev2 testing icsa labs held latest ikev2 interoperability workshop orlando fl march 2007 13 vendors around world following open source implementations ikev2 currently available leaked nsa presentations released der spiegel indicate ike exploited unknown manner decrypt ipsec traffic isakmp researchers discovered logjam attack state breaking 1024-bit diffie–hellman group would break 66 vpn servers 18 top million https domains 26 ssh servers researchers claim consistent leaks.. claim refuted eyal ronen adi shamir paper critical review imperfect forward secrecy paul wouters libreswan article 66 vpn ’ fact broken ipsec vpn configurations allow negotiation multiple configurations subject mitm-based downgrade attacks offered configurations ikev1 ikev2 avoided careful segregation client systems onto multiple service access points stricter configurations | [
5194,
3434,
5637,
2644,
6984,
298,
6533,
4237,
8093,
578,
38,
6367,
6208,
7785,
1118,
2681,
5067,
2327,
3572,
516,
3821,
1130,
1783,
6049,
6575,
2885,
4746,
3680,
3426
] | Test |
7,627 | 4 | Computer_security_compromised_by_hardware_failure:computer security compromised hardware failure computer security compromised hardware failure branch computer security applied hardware objective computer security includes protection information property theft corruption natural disaster allowing information property remain accessible productive intended users secret information could retrieved different ways article focus retrieval data thanks misused hardware hardware failure hardware could misused exploited get secret data article collects main types attack lead data theft computer security comprised devices keyboards monitors printers thanks electromagnetic acoustic emanation example components computer memory network card processor thanks time temperature analysis example monitor main device used access data computer shown monitors radiate reflect data environment potentially giving attackers access information displayed monitor video display units radiate known compromising emanations tempest radiation code word u.s. government programme aimed attacking problem electromagnetic broadcast data significant concern sensitive computer applications eavesdroppers reconstruct video screen content radio frequency emanations radiated harmonic video signal shows remarkable resemblance broadcast tv signal therefore possible reconstruct picture displayed video display unit radiated emission means normal television receiver preventive measures taken eavesdropping video display unit possible distances several hundreds meters using normal black-and-white tv receiver directional antenna antenna amplifier even possible pick information types video display units distance 1 kilometer sophisticated receiving decoding equipment used maximum distance much greater displayed monitor reflected environment time-varying diffuse reflections light emitted crt monitor exploited recover original monitor image eavesdropping technique spying distance data displayed arbitrary computer screen including currently prevalent lcd monitors technique exploits reflections screen optical emanations various objects one commonly finds close proximity screen uses reflections recover original screen content objects include eyeglasses tea pots spoons plastic bottles even eye user attack successfully mounted spy even small fonts using inexpensive off-the-shelf equipment less 1500 dollars distance 10 meters relying expensive equipment allowed conduct attack 30 meters away demonstrating similar attacks feasible side street close building many objects may found usual workplace exploited retrieve information computer display outsider particularly good results obtained reflections user eyeglasses tea pot located desk next screen reflections stem eye user also provide good results however eyes harder spy distance fast-moving objects require high exposure times using expensive equipment lower exposure times helps remedy problem reflections gathered curved surfaces close objects indeed pose substantial threat confidentiality data displayed screen fully invalidating threat without time hiding screen legitimate user seems difficult without using curtains windows similar forms strong optical shielding users however aware risk may willing close curtains nice day reflection object computer display curved mirror creates virtual image located behind reflecting surface flat mirror virtual image size located behind mirror distance original object curved mirrors however situation complex computer keyboards often used transmit confidential data passwords since contain electronic components keyboards emit electromagnetic waves emanations could reveal sensitive information keystrokes electromagnetic emanations turned constitute security threat computer equipment figure presents keystroke retrieved material necessary approach acquire raw signal directly antenna process entire captured electromagnetic spectrum thanks method four different kinds compromising electromagnetic emanations detected generated wired wireless keyboards emissions lead full partial recovery keystrokes best practical attack fully recovered 95 keystrokes ps/2 keyboard distance 20 meters even walls keyboard specific fingerprint based clock frequency inconsistencies determine source keyboard compromising emanation even multiple keyboards model used time four different kinds way compromising electromagnetic emanations described key pressed released held keyboard sends packet information known scan code computer protocol used transmit scan codes bidirectional serial communication based four wires vcc 5 volts ground data clock clock data signals identically generated hence compromising emanation detected combination signals however edges data clock lines superposed thus easily separated obtain independent signals falling edge transition attack limited partial recovery keystrokes significant limitation gtt falling edge transition attack improved recover almost keystrokes indeed two traces exactly one data rising edge attackers able detect transition fully recover keystrokes harmonics compromising electromagnetic emissions come unintentional emanations radiations emitted clock non-linear elements crosstalk ground pollution etc determining theoretically reasons compromising radiations complex task harmonics correspond carrier approximately 4 mhz likely internal clock micro-controller inside keyboard harmonics correlated clock data signals describe modulated signals amplitude frequency full state clock data signals means scan code completely recovered harmonics keyboard manufacturers arrange keys matrix keyboard controller often 8-bit processor parses columns one-by-one recovers state 8 keys matrix scan process described 192 keys keys may used instance modern keyboards use 104/105 keys arranged 24 columns 8 rows columns continuously pulsed one-by-one least 3μs thus leads may act antenna generate electromagnetic emanations attacker able capture emanations easily recover column pressed key even signal fully describe pressed key still gives partial information transmitted scan code i.e column number note matrix scan routine loops continuously key pressed still signal composed multiple equidistant peaks emanations may used remotely detect presence powered computers concerning wireless keyboards wireless data burst transmission used electromagnetic trigger detect exactly key pressed matrix scan emanations used determine column belongs techniques target keyboards table sums technique could used find keystroke different kind keyboard paper called compromising electromagnetic emanations wired wireless keyboards martin vuagnoux sylvain pasini tested 12 different keyboard models ps/2 usb connectors wireless communication different setups semi-anechoic chamber small office adjacent office flat building table presents results attacks emanations caused human typing attracted interest recent years particular works showed keyboard acoustic emanations leak information exploited reconstruct typed text pc keyboards notebook keyboards vulnerable attacks based differentiating sound emanated different keys attack takes input audio signal containing recording single word typed single person keyboard dictionary words assumed typed word present dictionary aim attack reconstruct original word signal attack taking input 10-minute sound recording user typing english text using keyboard recovering 96 typed characters attack inexpensive hardware required parabolic microphone non-invasive require physical intrusion system attack employs neural network recognize key pressed combines signal processing efficient data structures algorithms successfully reconstruct single words 7-13 characters recording clicks made typing keyboard sound clicks differ slightly key key keys positioned different positions keyboard plate although clicks different keys sound similar human ear average 0.5 incorrect recognitions per 20 clicks shows exposure keyboard eavesdropping using attack attack efficient taking 20 seconds per word standard pc 90 better success rate finding correct word words 10 characters success rate 73 words tested practice human attacker typically determine text random attacker also identify occasions user types user names passwords short audio signals containing single word seven characters long considered means signal seconds long short words often chosen password dominant factors affecting attack success word length importantly number repeated characters within word procedure makes possible efficiently uncover word audio recordings keyboard click sounds recently extracting information another type emanations demonstrated acoustic emanations mechanical devices dot-matrix printers extracting private information watching somebody typing keyboard might seem easy task becomes extremely challenging automated however automated tool needed case long-lasting surveillance procedures long user activity human able reconstruct characters per minute paper clearshot eavesdropping keyboard input video presents novel approach automatically recovering text typed keyboard based solely video user typing automatically recognizing keys pressed user hard problem requires sophisticated motion analysis experiments show human reconstructing sentences requires lengthy hours slow-motion analysis video attacker might install surveillance device room victim might take control existing camera exploiting vulnerability camera control software might simply point mobile phone integrated camera laptop keyboard victim working public space balzarotti analysis divided two main phases figure first phase analyzes video recorded camera using computer vision techniques frame video computer vision analysis computes set keys likely pressed set keys certainly pressed position space characters results phase analysis noisy second phase called text analysis required goal phase remove errors using language context-sensitive techniques result phase reconstructed text word represented list possible candidates ranked likelihood acoustic emanations attack recovers dot-matrix printer processing english text printing possible based record sound printer makes microphone close enough attack recovers 72 printed words 95 knowledge text done microphone distance 10 cm printer upfront training phase picture attack b picture fully automated uses combination machine learning audio processing speech recognition techniques including spectrum features hidden markov models linear classification fundamental reason reconstruction printed text works emitted sound becomes louder needles strike paper given time correlation number needles intensity acoustic emanation training phase conducted words dictionary printed characteristic sound features words extracted stored database trained characteristic features used recognize printed english text task trivial major challenges include timing attacks enable attacker extract secrets maintained security system observing time takes system respond various queries ssh designed provide secure channel two hosts despite encryption authentication mechanisms uses ssh weaknesses interactive mode every individual keystroke user types sent remote machine separate ip packet immediately key pressed leaks inter-keystroke timing information users ’ typing picture represents command su processed ssh connection simple statistical techniques suffice reveal sensitive information length users ’ passwords even root passwords using advanced statistical techniques timing information collected network eavesdropper learn significant information users type ssh sessions time takes operating system send packet keypress general negligible comparing interkeystroke timing also enables eavesdropper learn precise interkeystroke timings users ’ typing arrival times packets data remanence problems affect obvious areas ram non-volatile memory cells also occur areas device hot-carrier effects change characteristics semiconductors device various effects examined alongside obvious memory-cell remanence problems possible analyse recover data cells semiconductor devices general long theory vanished electromigration means physically move atom new locations physically alter device another type attack involves relocation metal atoms due high current densities phenomenon atoms carried along electron wind opposite direction conventional current producing voids negative electrode hillocks whiskers positive electrode void formation leads local increase current density joule heating interaction electrons metal ions produce thermal energy producing electromigration effects external stress removed disturbed system tends relax back original equilibrium state resulting backflow heals electromigration damage long term though cause device failure less extreme cases simply serves alter device operating characteristics noticeable ways example excavations voids leads increased wiring resistance growth whiskers leads contact formation current leakage example conductor exhibits whisker growth due electromigration shown figure one example exhibits void formation case severe enough led complete failure shown figure contrary popular assumption drams used modern computers retain contents several seconds power lost even room temperature even removed motherboard many products cryptographic security-related computations using secret keys variables equipment operator must able read alter usual solution secret data kept volatile memory inside tamper-sensing enclosure security processors typically store secret key material static ram power removed device tampered temperatures −20 °c contents sram ‘ frozen ’ interesting know period time static ram device retain data power removed low temperatures increase data retention time sram many seconds even minutes maximillian dornseif presented technique slides let take control apple computer thanks ipod attacks needed first generic phase ipod software modified behaves master firewire bus ipod full read/write access apple computer ipod plugged firewire port firewire used audio devices printers scanners cameras gps etc generally device connected firewire full access read/write indeed ohci standard firewire standard reads device connected firewire read write data computer memory example device increase computational power processors generally equipped cache memory decreases memory access latency figure shows hierarchy processor memory first processor looks data cache l1 l2 memory data processor looking called cache-miss pictures show processor fetch data two cache levels unfortunately caches contain small portion application data introduce additional latency memory transaction case miss involves also additional power consumption due activation memory devices memory hierarchy miss penalty already used attack symmetric encryption algorithms like des basic idea proposed paper force cache miss processor executing aes encryption algorithm known plain text attacks allow unprivileged process attack process running parallel processor despite partitioning methods memory protection sandboxing virtualization carefully measuring amount time required perform private key operations attackers may able find fixed diffie-hellman exponents factor rsa keys break cryptosystems vulnerable system attack computationally inexpensive often requires known ciphertext attack treated signal detection problem signal consists timing variation due target exponent bit noise results measurement inaccuracies timing variations due unknown exponent bits properties signal noise determine number timing measurements required attack timing attacks potentially used cryptosystems including symmetric functions simple generic processor backdoor used attackers means privilege escalation get privileges equivalent given running operating system also non-privileged process one non-privileged invited domain running top virtual machine monitor get privileges equivalent virtual machine monitor loïc duflot studied intel processors paper cpu bugs cpu backdoors consequences security explains processor defines four different privilege rings numbered 0 privileged 3 least privileged kernel code usually running ring 0 whereas user-space code generally running ring 3 use security-critical assembly language instructions restricted ring 0 code order escalate privilege backdoor attacker must backdoors loïc duflot presents simple modify behavior three assembly language instructions simple specific activation conditions unlikely accidentally activated recent inventions begun target types processor-based escalation attacks | [
6507,
4472,
1254,
3680,
7442,
651,
5571,
5666,
1023,
6922,
3895,
8013,
2054,
6756,
60,
515,
8024,
1314,
5429,
7214,
6774,
7499,
2614,
6778,
1989,
1607,
84,
4105,
1805
] | Test |
7,628 | 5 | Amaya_(web_editor):amaya web editor amaya formerly amaya world discontinued free open source wysiwyg web authoring tool browsing abilities created structured editor project inria french national research institution later adopted world wide web consortium w3c testbed web standards role took arena web browser since last release january 2012 inria w3c stopped supporting project active development ceased amaya relatively low system requirements even comparison web browsers era active development period considered lightweight browser amaya originated direct descendant grif wysiwyg sgml editor created early 1980s html editor symposia based grif developed sold french software company grif sa last change code amaya feb 22 2013 used test-bed new web technologies supported major browsers amaya first client supported rdf annotation schema using xpointer browser available linux windows nt 95 mac os x amigaos sparc solaris aix osf/1 amaya formerly called tamaya tamaya name type tree represented logo later discovered tamaya also trademark used french company developers chose drop first letter make amaya | [
4655,
4296,
6802,
5378,
2205,
7537,
6809,
393,
3291,
2574,
2577,
6452,
4352,
4725,
5433,
1136,
6858,
2973,
4743,
2261,
84,
87,
445,
1152,
1525,
4759,
5821,
3363,
5127,
6540,
3383,
8006,
8009,
3043,
1970,
6221,
520,
3057,
3060,
3412,
803... | Test |
7,629 | 7 | Bunchball:bunchball bunchball provides cloud-based software service gamification product intended help companies improve customer loyalty online engagement using game mechanics bunchball founded rajat paharia 2005 raised 17.5 million funding 2005 rajat paharia founded bunchball approached companies like facebook myspace dating websites proposition integrating social games bunchball received initial financing sunil singh ceo informance international payman pouladdej angel investor october 2006 company closed 2 million series investment round granite ventures adobe ventures 2007 nbc hired bunchball develop community website called dunder mifflin infinity popular comedy show office 2007 bunchball transitioned social gaming launched nitro allows organizations implement game mechanics social networks mobile applications websites january 2008 bunchball received additional 4 million series b funding round return investors granite ventures adobe ventures time announcement bunchball 28 employees june 2010 bunchball closed 6.5 million series c funding round triangle peak partners northport investments correlation ventures granite ventures bunchball 60 employees raised 21 million date bunchball nitro gamification platform aims motivate online user engagement contains set game mechanics including badges team points leader boards websites social communities mobile applications desktop enterprise applications currently generates 70 million unique users 2.3 billion actions month march 2012 bunchball released updated version nitro code-named flamethrower bunchball nitro salesforce motivates sales teams adding gamification salesforce.com jive gamification module add-on module jive social business platform powered bunchball nitro gives users set missions complete exposes critical piece functionality within jive platform nitro ibm connections helps businesses train new users keep existing users engaged within ibm connections application using nitro platform businesses employ gamification techniques like completing missions earning rewards engage users ibm connections 2007 40,000 people generated 1 million page views dunder mifflin infinity separate nbc universal website bunchball developed dunder mifflin infinity gives users experience employee dunder mifflin fictional company featured show 2009 usa network hired bunchball “ gamify ” website psych television show page views surged 16 million last season 9 million season average visitor came 4 5 times per month compared twice month previous season stayed site 22 minutes visit 14 minutes december 2010 bunchball nitro powered playboy ’ facebook app called miss social month-long competition women aspired playboy due competition playboy saw 85 percent rate re-engagement 60 percent improvement revenues one month next since starting app december playboy ’ active user base grown 80,000 2011 bunchball partnered los angeles kings gamify fan website | [
2961,
330,
7037
] | Validation |
7,630 | 4 | Pharming:pharming pharming cyber attack intended redirect website traffic another fake site pharming conducted either changing hosts file victim computer exploitation vulnerability dns server software dns servers computers responsible resolving internet names real ip addresses compromised dns servers sometimes referred poisoned pharming requires unprotected access target computer altering customer home computer rather corporate business server term pharming neologism based words farming phishing phishing type social-engineering attack obtain access credentials user names passwords recent years pharming phishing used gain information online identity theft pharming become major concern businesses hosting ecommerce online banking websites sophisticated measures known anti-pharming required protect serious threat antivirus software spyware removal software protect pharming malicious domain-name resolution result compromises large numbers trusted nodes participate name lookup vulnerable points compromise near leaves internet instance incorrect entries desktop computer hosts file circumvents name lookup local name ip address mapping popular target malware rewritten legitimate request sensitive website direct user fraudulent copy desktops often better targets pharming receive poorer administration internet servers worrisome host-file attacks compromise local network router since routers specify trusted dns clients join network misinformation spoil lookups entire lan unlike host-file rewrites local-router compromise difficult detect routers pass bad dns information two ways malconfiguration existing settings wholesale rewrite embedded software aka firmware many routers allow administrator specify particular trusted dns place one suggested upstream node e.g. isp attacker could specify dns server control instead legitimate one subsequent resolutions would go bad server scenario involving malicious javascript changes router dns server called drive-by pharming demonstrated stamm ramzan jakobsson december 2006 technical report alternatively many routers ability replace firmware i.e internal software executes device complex services like malware desktop systems firmware replacement difficult detect stealthy implementation appear behave manufacturer firmware administration page look settings appear correct etc approach well executed could make difficult network administrators discover reconfiguration device appears configured administrators intend actually redirects dns traffic background pharming one many attacks malicious firmware mount others include eavesdropping active man middle attacks traffic logging like misconfiguration entire lan subject actions pharming approaches academic interest however ubiquity consumer grade wireless routers presents massive vulnerability administrative access available wirelessly devices moreover since routers often work default settings administrative passwords commonly unchanged even altered many guessed quickly dictionary attacks since consumer grade routers n't introduce timing penalties incorrect login attempts administrative access granted router settings including firmware may altered attacks difficult trace occur outside home small office outside internet 15th january 2005 domain name large new york isp panix hijacked point website australia financial losses known domain later restored 17th january icann review blames melbourne known arq group result failure melbourne obtain express authorization sic registrant accordance icann inter-registrar transfer policy january 2008 symantec reported drive-by pharming incident directed mexican bank dns settings customer home router changed receipt e-mail appeared legitimate spanish-language greeting-card company term pharming controversial within field conference organized anti-phishing working group phillip hallam-baker denounced term marketing neologism designed convince banks buy new set security services | [
3932,
5272,
2451,
96,
3964,
4237,
3633,
3794,
661,
2513,
429,
5619,
1993,
3426
] | Train |
7,631 | 3 | Software_incompatibility:software incompatibility software incompatibility characteristic software components systems operate satisfactorily together computer different computers linked computer network may components systems intended operate cooperatively independently software compatibility characteristic software components systems operate satisfactorily together computer different computers linked computer network possible software components systems may compatible one environment incompatible another consider sequential programs form particular program might use printer resource file resource b order print file several programs p1 p2 p3 ... operate time first one execute block others resources released programs execute turn problem makes difference whether uni-processor multi-processor system used allocation resources determines order execution note however programmers general constrained write programs particular way even guidelines may differ guidelines variant previous program may resources b previous example – simply dummy variables otherwise programs identical several programs q1 q2 q3 run time using resources problem however several ps set run time several qs deadlock condition arise note deadlock need arise may neither p q proceed one kind example programs may demonstrate incompatibility another example different kind would one software component provides service another incompatibility could simple change order parameters software component requesting service component providing service would kind interface incompatibility might considered bug could hard detect systems interface incompatibilities easily detected build stage particularly strongly typed systems others may hard find may detected run time others may almost impossible detect without detailed program analysis consider following example variant q q nowiki /nowiki similar behaviour following differences p never calls q set 100 using q nowiki /nowiki instead compatible computation however p calls q set 100 using q nowiki /nowiki instead lead non-terminating computation assume f x numeric value component q nowiki /nowiki defined may cause problem behaviour p calls q nowiki /nowiki 101 results computation incorrect may cause program failure p calls q nowiki /nowiki 102 results unpredictable failure may arise possibly due divide zero errors arithmetic overflow p calls q nowiki /nowiki y= 103 event p uses result division operation divide zero failure may occur example shows one program p1 may always compatible another q1 constructed programs q1 q1 nowiki /nowiki p1 q sometimes incompatible p1 q1 nowiki /nowiki always incompatible sometimes programs p q running computer presence one inhibit performance particularly happen computer uses virtual memory result may disk thrashing occurs one programs significantly reduced performance form incompatibility occur p q intended cooperate also occur p q completely unrelated happen run time example might p program produces large output files happen stored main memory q anti-virus program scans many files hard disk memory cache used virtual memory possible two programs interact adversely performance drastically reduced programs p q performance compatibility may depend environment run may substantially incompatible run computer limited main memory yet may possible run satisfactorily machine memory programs may performance incompatible almost environment | [
1710,
7071,
4212,
1254,
2633,
5784,
7499,
2773,
8066
] | Validation |
7,632 | 7 | Corosync_Cluster_Engine:corosync cluster engine corosync cluster engine open source implementation totem single ring ordering membership protocol originally derived openais project licensed new bsd license mission corosync effort develop release support community-defined open source cluster corosync cluster engine group communication system additional features implementing high availability within applications project provides four c api features software designed operate udp/ip infiniband networks software composed executive binary uses client-server communication model libraries service engines loadable modules called service engines loaded corosync cluster engine use services provided corosync service engine internal api services provided corosync service engine internal api additionally corosync provides several default service engines used via c apis project formally announced july 2008 via conference paper ottawa linux symposium source code openais refactored core infrastructure components placed corosync sa forum apis kept openais second version corosync published 2012 quorum subsystem changed integrated daemon version available since fedora 17 rhel7 | [
6489,
3915,
827,
5571,
1435
] | Test |
7,633 | 4 | Cryptographic_key_types:cryptographic key types cryptographic key string data used lock unlock cryptographic functions including authentication authorization encryption cryptographic keys grouped cryptographic key types according functions perform consider keyring contains variety keys keys might various shapes sizes one thing certain generally serve separate purpose one key might used start automobile another might used open safety deposit box automobile key work open safety deposit box vice versa analogy provides insight cryptographic key types work keys categorized respect used properties possess cryptographic key categorized according used properties example key might one following properties symmetric public private keys may also grouped pairs one private one public key referred asymmetric key pair asymmetric keys differ symmetric keys algorithms use separate keys encryption decryption symmetric key ’ algorithm uses single key processes multiple keys used asymmetric algorithm process takes longer produce symmetric key algorithm would however benefits lay fact asymmetric algorithm much secure symmetric key algorithm symmetric key key needs transmitted receiver always possibility key could intercepted tampered asymmetric key message and/or accompanying data sent received using public key however receiver sender would use personal private key access message and/or accompanying data thus asymmetric keys suited use transmitting confidential messages data authentication required assurance message tampered receiver possession public key ’ corresponding private key ability decode message public key sent back forth recipients private key remains fixed one location sent back forth keeps safe intercepted transmission cryptographic keys may also keys designate used long-term static archived use used single session ephemeral latter generally applies use ephemeral key agreement key key types designed last long crypto-periods one two years shorter crypto-period designed different key types may used data encryption keys symmetric authentication keys private key-transport keys key-wrapping keys authorization keys rng keys page shows classification key types point view key management key management system key labeled one type key never used different purpose according nist sp 800-57 revision 4 following types keys exist | [
6049,
4945,
5149,
2566,
6036,
2896,
3794
] | Test |
7,634 | 1 | DataEase:dataease dataease relational database management system rdbms considered rapid application development tool developing relationally-organized data-intensive software applications personal computers dataease created early 1980s software developers arun gupta joseph busch first version software released 1981 software solutions inc principals sold company sapphire international corporation united kingdom 1991 sapphire continues develop market product two distinct product arcs dataease history dataease dos dataease windows originally called datamaster dataease early hallmark ease non-programmers found could rapidly develop useful software applications dataease design emphasized visual design screen forms reports hiding almost arcane details properties underlying data structure addition complex data management processes would typically require multitude complex steps complete traditional programming tools handled automatically transparently user made changes his/her application example editing existing form user removed field added another indexed another changed data type yet another necessary steps required reflect changes data structure underlying form automatically non-destructively applied form saved report writing similarly streamlined user simply defined access desired data using simple procedural language known dataease query language dql prompting script editor permitted user instantly create dql script prior knowledge dql syntax remains one dataease overlooked beneficial features one required memorize details application components dql syntactical construction prior writing valid dql script employees salary 50000 yearsofservice 4 lastreviewgrade 85 addition simplified definition data forms reports procedures dataease dos provided facilities defining application user access navigational menus multi-format importing data sources data exporting data backup restoration system documentation user help backing restoring data integrating external programs application dataease dos applications provided record-level locking meaning could accessed simultaneously many users dataease dos gained eclectic following among application developers responsible managing proprietary business processes corporate world dataease resource guide published dataease international late 1980s lists approximately two hundred commercially available applications spanning specialized domains waste management law enforcement indeed many corporate users deployed business-critical applications using dataease including organizations nasa ford motor co. citimortgage fka lomas financial corporation american automobile club dataease dos distributed worldwide according information provided sapphire international peaked installed base approximately 2 million seats despite fact sapphire ceased distribution dataease dos 2003 significant number dataease dos applications remained active use worldwide 2008 dataease dos recognized number prestigious industry awards including dataease windows dfw rapid application development tool constructing windows database applications dataease windows abandoned many intuitive features dataease dos ancestor dataease windows product designed positioned address needs technical programmer due belief time soon data would stored sql-based client-server platforms dataease would evolve sql development tool dataease windows initially released 1994 follow dataease express lacked dql procedural language user interface overhauled automatic creation data structures along screens forms abandoned despite fact dataease windows incorporated automated migration tool de dos 4.53 ability directly acquire tables data dfd5 many long-time dataease dos users found difficult break hierarchical cui paradigm make best use new tools windows product dataease windows acceptance existing dataease dos users therefore significantly hindered delayed decision move instead upgraded recent dos versions found could share data windows versions achieve full windows application forms report layouts re-created scratch dfw even though business rules could imported tables dql could imported also either cutting pasting 'dos report facility dfw version 5.5 difficulty still remained application designed work-flow single-tasking dos environment frequently unsuited multi-session windows environment difficulty considerable expense posed task re-writing applications forced many otherwise-satisfied dataease users reconsider choice dataease platform conversely new users dataease windows previous experience found effective tool important systems written using second half 1990s since dataease version 7 2006 interoperability abandoned restrictive product development good 'windows citizen 2008 new dataease development team appointed leadership ulrik krohn take dataease new era eventually culminate completely web based product dataease 7.2 officially launched july 1 2009 version first use 64 bit operating system extensively reworked contain 1,000 improvements fixes release 7.2 also marked time dataease international ltd. became independent product company solely focused product development dataease services continue provided sapphire group dataease 7.3 scheduled end year dataease 8 promises web community dataease dos character based community completely web based full interoperability windows first dataease since dos improved interactive dql/oml/brl editing dataease 8 make easy make transaction intensive advanced web-based applications | [
7618,
4653
] | Validation |
7,635 | 2 | Inquisitor_(hardware_testing_software):inquisitor hardware testing software inquisitor software suite used hardware diagnostics stress testing certification benchmarking platform available three formats released terms version 3 gnu general public license inquisitor free software inquisitor started early 2004 closed project developed mikhail yakshin alt linux maxselect russian hardware vendor first versions closed-source although effort made open components versions 1 2 fully developed in-house fully adopted maxselect multiple branches versions concentrated server-based enterprise testing optimized mostly notebook hardware 2005 special abridged version inquisitor suite developed distribution live cds live cds supplied maxselect products every buyer stress test newly bought hardware ensure runs stable august 2007 legal complications solved inquisitor announced open source platform platform used implement various linux-based solutions deal hardware testing monitoring benchmarking july 2008 version 3.0 released public minimal steps undertaken purposes testing benchmarking called tests inquisitor implemented simple unix shell scripts run binary programs collects results simplest form test outputs binary result success failure advanced api supplied benchmarks output results inquisitor distribution includes following tests | [
5200,
1629,
7246,
3444,
7251,
474,
7075,
1941,
314,
5232,
2758,
1663,
2864,
6209,
6761,
425,
2063,
343,
4824,
5523,
2522,
5259,
1893,
5530,
5704,
6317,
3751,
7587,
7954,
6244,
788
] | Validation |
7,636 | 5 | Radius_Values:radius values remote authentication dial user service radius networking protocol provides centralized authentication authorization accounting aaa management computers connect use network service attributes radius use defined rfc 2865 .5 | [] | Test |
7,637 | 5 | Transmission_Control_Protocol:transmission control protocol transmission control protocol tcp one main protocols internet protocol suite originated initial network implementation complemented internet protocol ip therefore entire suite commonly referred tcp/ip tcp provides reliable ordered error-checked delivery stream octets bytes applications running hosts communicating via ip network major internet applications world wide web email remote administration file transfer rely tcp applications require reliable data stream service may use user datagram protocol udp provides connectionless datagram service emphasizes reduced latency reliability may 1974 vint cerf bob kahn described internetworking protocol sharing resources using packet switching among network nodes authors working gérard le lann incorporate concepts french cyclades project new network central control component model transmission control program incorporated connection-oriented links datagram services hosts monolithic transmission control program later divided modular architecture consisting transmission control protocol internet protocol resulted networking model became known informally tcp/ip although formally variously referred department defense dod model arpanet model eventually also internet protocol suite 2004 vint cerf bob kahn received turing award foundational work tcp/ip transmission control protocol provides communication service intermediate level application program internet protocol provides host-to-host connectivity transport layer internet model application need know particular mechanisms sending data via link another host required ip fragmentation accommodate maximum transmission unit transmission medium transport layer tcp handles handshaking transmission details presents abstraction network connection application typically network socket interface lower levels protocol stack due network congestion traffic load balancing unpredictable network behaviour ip packets may lost duplicated delivered order tcp detects problems requests re-transmission lost data rearranges out-of-order data even helps minimize network congestion reduce occurrence problems data still remains undelivered source notified failure tcp receiver reassembled sequence octets originally transmitted passes receiving application thus tcp abstracts application communication underlying networking details tcp used extensively many internet applications including world wide web www email file transfer protocol secure shell peer-to-peer file sharing streaming media tcp optimized accurate delivery rather timely delivery incur relatively long delays order seconds waiting out-of-order messages re-transmissions lost messages therefore particularly suitable real-time applications voice ip applications protocols like real-time transport protocol rtp operating user datagram protocol udp usually recommended instead tcp reliable stream delivery service guarantees bytes received identical order sent since packet transfer many networks reliable tcp achieves using technique known positive acknowledgement re-transmission requires receiver respond acknowledgement message receives data sender keeps record packet sends maintains timer packet sent sender re-transmits packet timer expires receiving acknowledgement timer needed case packet gets lost corrupted ip handles actual delivery data tcp keeps track segments individual units data transmission message divided efficient routing network example html file sent web server tcp software layer server divides file segments forwards individually internet layer network stack internet layer software encapsulates tcp segment ip packet adding header includes among data destination ip address client program destination computer receives tcp software transport layer re-assembles segments ensures correctly ordered error-free streams file contents receiving application transmission control protocol accepts data data stream divides chunks adds tcp header creating tcp segment tcp segment encapsulated internet protocol ip datagram exchanged peers term tcp packet appears informal formal usage whereas precise terminology segment refers tcp protocol data unit pdu datagram ip pdu frame data link layer pdu processes transmit data calling tcp passing buffers data arguments tcp packages data buffers segments calls internet module e.g ip transmit segment destination tcp tcp segment consists segment header data section tcp header contains 10 mandatory fields optional extension field options pink background table data section follows header contents payload data carried application length data section specified tcp segment header calculated subtracting combined length tcp header encapsulating ip header total ip datagram length specified ip header tcp protocol operations may divided three phases connections must properly established multi-step handshake process connection establishment entering data transfer phase data transmission completed connection termination closes established virtual circuits releases allocated resources tcp connection managed operating system resource represents local end-point communications internet socket lifetime tcp connection local end-point undergoes series state changes establish connection tcp uses three-way handshake client attempts connect server server must first bind listen port open connections called passive open passive open established client may initiate active open establish connection three-way 3-step handshake occurs point client server received acknowledgment connection steps 1 2 establish connection parameter sequence number one direction acknowledged steps 2 3 establish connection parameter sequence number direction acknowledged full-duplex communication established connection termination phase uses four-way handshake side connection terminating independently endpoint wishes stop half connection transmits fin packet end acknowledges ack therefore typical tear-down requires pair fin ack segments tcp endpoint side sent first fin responded final ack waits timeout finally closing connection time local port unavailable new connections prevents confusion due delayed packets delivered subsequent connections connection half-open case one side terminated end side terminated longer send data connection side terminating side continue reading data side terminates well also possible terminate connection 3-way handshake host sends fin host b replies fin ack merely combines 2 steps one host replies ack host tcp stacks may implement half-duplex close sequence linux hp-ux host actively closes connection still read incoming data stack already received link host sends rst instead fin section 4.2.2.13 rfc 1122 allows tcp application sure remote application read data former sent—waiting fin remote side actively closes connection remote tcp stack distinguish connection aborting rst data loss rst cause remote stack lose data received application protocols using tcp open/close handshaking application protocol open/close handshaking may find rst problem active close example program flow like tcp/ip stack like described guarantee data arrives application unread data arrived end implementations allocate entry table maps session running operating system process tcp packets include session identifier endpoints identify session using client address port whenever packet received tcp implementation must perform lookup table find destination process entry table known transmission control block tcb contains information endpoints ip port status connection running data packets exchanged buffers sending receiving data number sessions server side limited memory grow new connections arrive client must allocate random port sending first syn server port remains allocated whole conversation effectively limits number outgoing connections client ip addresses application fails properly close unrequired connections client run resources become unable establish new tcp connections even applications endpoints must also allocate space unacknowledged packets received unread data key features set tcp apart user datagram protocol tcp uses sequence number identify byte data sequence number identifies order bytes sent computer data reconstructed order regardless packet reordering packet loss may occur transmission sequence number first byte chosen transmitter first packet flagged syn number arbitrary fact unpredictable defend tcp sequence prediction attacks acknowledgements acks sent sequence number receiver data tell sender data received specified byte acks imply data delivered application merely signify receiver responsibility deliver data reliability achieved sender detecting lost data retransmitting tcp uses two primary techniques identify loss retransmission timeout abbreviated rto duplicate cumulative acknowledgements dupacks single packet say packet 100 stream lost receiver acknowledge packets 100 uses cumulative acks hence receiver acknowledges packet 99 receipt another data packet duplicate acknowledgement used signal packet loss sender receives three duplicate acknowledgements retransmits last unacknowledged packet threshold three used network may reorder packets causing duplicate acknowledgements threshold demonstrated avoid spurious retransmissions due reordering sometimes selective acknowledgements sacks used give explicit feedback packets received greatly improves tcp ability retransmit right packets whenever packet sent sender sets timer conservative estimate packet acked sender receive ack transmits packet timer reset every time sender receives acknowledgement means retransmit timer fires sender received acknowledgement long time typically timer value set formula_1 formula_2 clock granularity case retransmit timer fired still acknowledgement received next timer set twice previous value certain threshold among things helps defend man-in-the-middle denial service attack tries fool sender making many retransmissions receiver overwhelmed sender infers data lost network using one two techniques described retransmits data sequence numbers allow receivers discard duplicate packets properly sequence reordered packets acknowledgments allow senders determine retransmit lost packets assure correctness checksum field included see checksum computation section details checksumming tcp checksum weak check modern standards data link layers high bit error rates may require additional link error correction/detection capabilities weak checksum partially compensated common use crc better integrity check layer 2 tcp ip used ppp ethernet frame however mean 16-bit tcp checksum redundant remarkably introduction errors packets crc-protected hops common end-to-end 16-bit tcp checksum catches simple errors end-to-end principle work tcp uses end-to-end flow control protocol avoid sender send data fast tcp receiver receive process reliably mechanism flow control essential environment machines diverse network speeds communicate example pc sends data smartphone slowly processing received data smartphone must regulate data flow overwhelmed tcp uses sliding window flow control protocol tcp segment receiver specifies receive window field amount additionally received data bytes willing buffer connection sending host send amount data must wait acknowledgement window update receiving host receiver advertises window size 0 sender stops sending data starts persist timer persist timer used protect tcp deadlock situation could arise subsequent window size update receiver lost sender send data receiving new window size update receiver persist timer expires tcp sender attempts recovery sending small packet receiver responds sending another acknowledgement containing new window size receiver processing incoming data small increments may repeatedly advertise small receive window referred silly window syndrome since inefficient send bytes data tcp segment given relatively large overhead tcp header final main aspect tcp congestion control tcp uses number mechanisms achieve high performance avoid congestion collapse network performance fall several orders magnitude mechanisms control rate data entering network keeping data flow rate would trigger collapse also yield approximately max-min fair allocation flows acknowledgments data sent lack acknowledgments used senders infer network conditions tcp sender receiver coupled timers tcp senders receivers alter behavior flow data generally referred congestion control and/or network congestion avoidance modern implementations tcp contain four intertwined algorithms slow-start congestion avoidance fast retransmit fast recovery rfc 5681 addition senders employ retransmission timeout rto based estimated round-trip time rtt sender receiver well variance round trip time behavior timer specified rfc 6298 subtleties estimation rtt example senders must careful calculating rtt samples retransmitted packets typically use karn algorithm tcp timestamps see rfc 1323 individual rtt samples averaged time create smoothed round trip time srtt using jacobson algorithm srtt value finally used round-trip time estimate enhancing tcp reliably handle loss minimize errors manage congestion go fast high-speed environments ongoing areas research standards development result number tcp congestion avoidance algorithm variations maximum segment size mss largest amount data specified bytes tcp willing receive single segment best performance mss set small enough avoid ip fragmentation lead packet loss excessive retransmissions try accomplish typically mss announced side using mss option tcp connection established case derived maximum transmission unit mtu size data link layer networks sender receiver directly attached furthermore tcp senders use path mtu discovery infer minimum mtu along network path sender receiver use dynamically adjust mss avoid ip fragmentation within network mss announcement also often called mss negotiation strictly speaking mss negotiated originator receiver would imply originator receiver negotiate agree upon single unified mss applies communication directions connection fact two completely independent values mss permitted two directions data flow tcp connection situation may arise example one devices participating connection extremely limited amount memory reserved perhaps even smaller overall discovered path mtu processing incoming tcp segments relying purely cumulative acknowledgment scheme employed original tcp protocol lead inefficiencies packets lost example suppose bytes sequence number 1,000 10,999 sent 10 different tcp segments equal size second segment sequence numbers 2,000 2,999 lost transmission pure cumulative acknowledgment protocol receiver send cumulative ack value 2,000 sequence number immediately following last sequence number received data say received bytes 3,000 10,999 successfully thus sender may resend data starting sequence number 2,000 alleviate issue tcp employs selective acknowledgment sack option defined 1996 rfc 2018 allows receiver acknowledge discontinuous blocks packets received correctly addition sequence number immediately following last sequence number last contiguous byte received successively basic tcp acknowledgment acknowledgement specify number sack blocks sack block conveyed left edge block first sequence number block right edge block sequence number immediately following last sequence number block block contiguous range receiver correctly received example receiver would send ack segment cumulative ack value 2,000 sack option header sequence numbers 3,000 11,000 sender would accordingly retransmit second segment sequence numbers 2,000 2,999 tcp sender interpret out-of-order segment delivery lost segment tcp sender retransmit segment previous out-of-order packet slow data delivery rate connection duplicate-sack option extension sack option defined may 2000 rfc 2883 solves problem tcp receiver sends d-ack indicate segments lost tcp sender reinstate higher transmission-rate sack option mandatory comes operation parties support negotiated connection established sack uses tcp header option see tcp segment structure details use sack become widespread—all popular tcp stacks support selective acknowledgment also used stream control transmission protocol sctp efficient use high-bandwidth networks larger tcp window size may used tcp window size field controls flow data value limited 2 65,535 bytes since size field expanded scaling factor used tcp window scale option defined rfc 1323 option used increase maximum window size 65,535 bytes 1 gigabyte scaling larger window sizes part necessary tcp tuning window scale option used tcp 3-way handshake window scale value represents number bits left-shift 16-bit window size field window scale value set 0 shift 14 direction independently sides must send option syn segments enable window scaling either direction routers packet firewalls rewrite window scaling factor transmission causes sending receiving sides assume different tcp window sizes result non-stable traffic may slow problem visible sites behind defective router tcp timestamps defined rfc 1323 1992 help tcp determine order packets sent tcp timestamps normally aligned system clock start random value many operating systems increment timestamp every elapsed millisecond however rfc states ticks proportional two timestamp fields tcp timestamps used algorithm known protection wrapped sequence numbers paws see rfc 1323 details paws used receive window crosses sequence number wraparound boundary case packet potentially retransmitted answers question sequence number first 4 gb second timestamp used break tie also eifel detection algorithm rfc 3522 uses tcp timestamps determine retransmissions occurring packets lost simply order recent statistics show level timestamp adoption stagnated ~40 owing windows server dropping support since windows server 2008 tcp timestamps enabled default linux kernel. disabled default windows server 2008 2012 2016 possible interrupt abort queued stream instead waiting stream finish done specifying data urgent tells receiving program process immediately along rest urgent data finished tcp informs application resumes back stream queue example tcp used remote login session user send keyboard sequence interrupts aborts program end signals often needed program remote machine fails operate correctly signals must sent without waiting program finish current transfer tcp out-of-band data designed modern internet urgent pointer alters processing remote host n't expedite processing network gets remote host two slightly different interpretations protocol means single bytes oob data reliable assuming reliable one least commonly used protocol elements tends poorly implemented normally tcp waits 200 ms full packet data send nagle algorithm tries group small messages single packet wait creates small potentially serious delays repeated constantly file transfer example typical send block would 4 kb typical mss 1460 2 packets go 10 mbit/s ethernet taking ~1.2 ms followed third carrying remaining 1176 197 ms pause tcp waiting full buffer case telnet user keystroke echoed back server user see screen delay would become annoying setting socket option codice_1 overrides default 200 ms send delay application programs use socket option force output sent writing character line characters rfc defines codice_2 push bit message receiving tcp stack send data immediately receiving application way indicate control user space using berkeley sockets controlled protocol stack tcp may attacked variety ways results thorough security assessment tcp along possible mitigations identified issues published 2009 currently pursued within ietf using spoofed ip address repeatedly sending purposely assembled syn packets followed many ack packets attackers cause server consume large amounts resources keeping track bogus connections known syn flood attack proposed solutions problem include syn cookies cryptographic puzzles though syn cookies come set vulnerabilities sockstress similar attack might mitigated system resource management advanced dos attack involving exploitation tcp persist timer analyzed phrack 66 push ack floods variants attacker able eavesdrop tcp session redirect packets hijack tcp connection attacker learns sequence number ongoing communication forges false segment looks like next segment stream simple hijack result one packet erroneously accepted one end receiving host acknowledges extra segment side connection synchronization lost hijacking might combined address resolution protocol arp routing attacks allow taking control packet flow get permanent control hijacked tcp connection impersonating different ip address difficult prior rfc 1948 initial sequence number easily guessable allowed attacker blindly send sequence packets receiver would believe come different ip address without need deploy arp routing attacks enough ensure legitimate host impersonated ip address bring condition using denial-of-service attacks initial sequence number chosen random attacker eavesdrop predict size next packet sent cause receiver accept malicious payload without disrupting existing connection attacker injects malicious packet sequence number payload size next expected packet legitimate packet ultimately received found sequence number length packet already received silently dropped normal duplicate packet—the legitimate packet vetoed malicious packet unlike connection hijacking connection never desynchronized communication continues normal malicious payload accepted tcp veto gives attacker less control communication makes attack particularly resistant detection large increase network traffic ack storm avoided evidence receiver something amiss single duplicate packet normal occurrence ip network sender vetoed packet never sees evidence attack another vulnerability tcp reset attack tcp udp use port numbers identify sending receiving application end-points host often called internet sockets side tcp connection associated 16-bit unsigned port number 0-65535 reserved sending receiving application arriving tcp packets identified belonging specific tcp connection sockets combination source host address source port destination host address destination port means server computer provide several clients several services simultaneously long client takes care initiating simultaneous connections one destination port different source ports port numbers categorized three basic categories well-known registered dynamic/private well-known ports assigned internet assigned numbers authority iana typically used system-level root processes well-known applications running servers passively listening connections typically use ports examples include ftp 20 21 ssh 22 telnet 23 smtp 25 http ssl/tls 443 http 80 registered ports typically used end user applications ephemeral source ports contacting servers also identify named services registered third party dynamic/private ports also used end user applications less commonly dynamic/private ports contain meaning outside particular tcp connection network address translation nat typically uses dynamic port numbers internet-facing public side disambiguate flow traffic passing public network private subnetwork thereby allowing many ip addresses ports subnet serviced single public-facing address tcp complex protocol however significant enhancements made proposed years basic operation changed significantly since first specification rfc 675 1974 v4 specification rfc 793 published september 1981 rfc 1122 host requirements internet hosts clarified number tcp protocol implementation requirements list 8 required specifications 20 strongly encouraged enhancements available rfc 7414 among list rfc 2581 tcp congestion control one important tcp-related rfcs recent years describes updated algorithms avoid undue congestion 2001 rfc 3168 written describe explicit congestion notification ecn congestion avoidance signaling mechanism original tcp congestion avoidance algorithm known tcp tahoe many alternative algorithms since proposed including tcp reno tcp vegas fast tcp tcp new reno tcp hybla tcp interactive itcp research effort tcp extensions allows applications subscribe tcp events register handler components launch applications various purposes including application-assisted congestion control multipath tcp mptcp ongoing effort within ietf aims allowing tcp connection use multiple paths maximize resource usage increase redundancy redundancy offered multipath tcp context wireless networks enables simultaneous utilization different networks brings higher throughput better handover capabilities multipath tcp also brings performance benefits datacenter environments reference implementation multipath tcp developed linux kernel multipath tcp used support siri voice recognition application iphones ipads macs tcp cookie transactions tcpct extension proposed december 2009 secure servers denial-of-service attacks unlike syn cookies tcpct conflict tcp extensions window scaling tcpct designed due necessities dnssec servers handle large numbers short-lived tcp connections tcpcrypt extension proposed july 2010 provide transport-level encryption directly tcp designed work transparently require configuration unlike tls ssl tcpcrypt provide authentication provides simple primitives application first tcpcrypt ietf draft published implementations exist several major platforms tcp fast open extension speed opening successive tcp connections two endpoints works skipping three-way handshake using cryptographic cookie similar earlier proposal called t/tcp widely adopted due security issues tcp fast open published rfc 7413 2014 proposed may 2013 proportional rate reduction prr tcp extension developed google engineers prr ensures tcp window size recovery close slow-start threshold possible algorithm designed improve speed recovery default congestion control algorithm linux 3.2+ kernels tcp originally designed wired networks packet loss considered result network congestion congestion window size reduced dramatically precaution however wireless links known experience sporadic usually temporary losses due fading shadowing hand interference radio effects strictly congestion erroneous back-off congestion window size due wireless packet loss may congestion avoidance phase conservative decrease window size causes radio link underutilized extensive research combating harmful effects conducted suggested solutions categorized end-to-end solutions require modifications client server link layer solutions radio link protocol rlp cellular networks proxy-based solutions require changes network without modifying end nodes number alternative congestion control algorithms vegas westwood veno santa cruz proposed help solve wireless problem one way overcome processing power requirements tcp build hardware implementations widely known tcp offload engines toe main problem toes hard integrate computing systems requiring extensive changes operating system computer device one company develop device alacritech packet sniffer intercepts tcp traffic network link useful debugging networks network stacks applications use tcp showing user packets passing link networking stacks support so_debug socket option enabled socket using setsockopt option dumps packets tcp states events socket helpful debugging netstat another utility used debugging many applications tcp appropriate one problem least normal implementations application access packets coming lost packet retransmitted copy lost packet received causes problems real-time applications streaming media real-time multiplayer games voice ip voip generally useful get data timely fashion get data order historical performance reasons storage area networks sans use fibre channel protocol fcp fibre channel connections also embedded systems network booting servers serve simple requests huge numbers clients e.g dns servers complexity tcp problem finally tricks transmitting data two hosts behind nat using stun similar systems far simpler without relatively complex protocol like tcp way generally tcp unsuitable user datagram protocol udp used provides application multiplexing checksums tcp handle streams retransmission giving application developer ability code way suitable situation replace methods like forward error correction interpolation stream control transmission protocol sctp another protocol provides reliable stream oriented services similar tcp newer considerably complex tcp yet seen widespread deployment however especially designed used situations reliability near-real-time considerations important venturi transport protocol vtp patented proprietary protocol designed replace tcp transparently overcome perceived inefficiencies related wireless data transport tcp also issues high-bandwidth environments tcp congestion avoidance algorithm works well ad-hoc environments data sender known advance environment predictable timing based protocol asynchronous transfer mode atm avoid tcp retransmits overhead udp-based data transfer protocol udt better efficiency fairness tcp networks high bandwidth-delay product multipurpose transaction protocol mtp/ip patented proprietary software designed adaptively achieve high throughput transaction performance wide variety network conditions particularly tcp perceived inefficient tcp runs ipv4 method used compute checksum defined rfc 793 checksum field 16 bit one complement one complement sum 16-bit words header text segment contains odd number header text octets checksummed last octet padded right zeros form 16-bit word checksum purposes pad transmitted part segment computing checksum checksum field replaced zeros words appropriate padding 16-bit words added using one complement arithmetic sum bitwise complemented inserted checksum field pseudo-header mimics ipv4 packet header used checksum computation shown table source destination addresses ipv4 header protocol value 6 tcp cf list ip protocol numbers tcp length field length tcp header data measured octets tcp runs ipv6 method used compute checksum changed per rfc 2460 pseudo-header mimics ipv6 header computation checksum shown many tcp/ip software stack implementations provide options use hardware assistance automatically compute checksum network adapter prior transmission onto network upon reception network validation may relieve os using precious cpu cycles calculating checksum hence overall network performance increased feature may cause packet analyzers unaware uncertain use checksum offload report invalid checksums outbound packets yet reached network adapter occur packets intercepted transmitted network adapter packets transmitted network adaptor wire valid checksums issue also occur monitoring packets transmitted virtual machines host virtual device driver may omit checksum calculation optimization knowing checksum calculated later vm host kernel physical hardware | [
4289,
7148,
5722,
8,
10,
7169,
7170,
1462,
7177,
1474,
5760,
7209,
7214,
7217,
7220,
79,
1512,
84,
4382,
2984,
4387,
99,
2993,
106,
1540,
1542,
1543,
121,
4414,
4415,
1559,
5847,
5850,
7284,
7297,
5880,
7315,
1612,
3073,
4468,
3085,
3... | Test |
7,638 | 1 | Data_access_layer:data access layer data access layer dal computer software layer computer program provides simplified access data stored persistent storage kind entity-relational database acronym prevalently used microsoft environments example dal might return reference object terms object-oriented programming complete attributes instead row fields database table allows client user modules created higher level abstraction kind model could implemented creating class data access methods directly reference corresponding set database stored procedures another implementation could potentially retrieve write records file system dal hides complexity underlying data store external world example instead using commands insert delete update access specific table database class stored procedures could created database procedures would called method inside class would return object containing requested values insert delete update commands could executed within simple functions like registeruser loginuser stored within data access layer also business logic methods application mapped data access layer example instead making query database fetch users several tables application call single method dal abstracts database calls applications using data access layer either database server dependent independent data access layer supports multiple database types application becomes able use whatever databases dal talk either circumstance data access layer provides centralized location calls database thus makes easier port application database systems assuming 100 database interaction done dal given application object-relational mapping tools provide data layers fashion following active record model orm/active-record model popular web frameworks | [
5014,
6604,
3172,
2054
] | Train |
7,639 | 7 | Diskless_node:diskless node diskless node diskless workstation workstation personal computer without disk drives employs network booting load operating system server computer may also said act diskless node disks unused network booting used diskless nodes computers acting sometimes known network computers hybrid clients hybrid client may either mean diskless node may used particular sense mean diskless node runs applications remotely thin client computing architecture advantages diskless nodes include lower production cost lower running costs quieter operation manageability advantages example centrally managed software installation many universities large organizations pcs used similar configuration applications stored remotely executed locally—again manageability reasons however diskless nodes still boot local hard drive diskless nodes process data thus using cpu ram run software store data persistently—that task handed server distinct thin clients significant processing happens remotely server—the software runs thin client thin i.e relatively small simple client software handles simple input/output tasks communicate user drawing dialog box display waiting user input collective term encompassing thin client computing technological predecessor text terminals text-only centralized computing thin clients text terminals require powerful central processing facilities servers order perform significant processing tasks clients diskless nodes seen compromise fat clients ordinary personal computers centralized computing using central storage efficiency requiring centralized processing making efficient use powerful processing power even slowest contemporary cpus would tend sit idle much time centralized computing model operating system os diskless node loaded server using network booting cases removable storage may used initiate bootstrap process usb flash drive bootable media floppy disk cd dvd however firmware many modern computers configured locate server begin bootup process automatically without need insert bootable media network auto-booting preboot execution environment pxe bootstrap protocol bootp network protocols commonly used find server files booting device standard full-size desktop pcs able network-booted manner add-on network card includes undi boot rom diskless network booting commonly built-in feature desktop laptop pcs intended business use since used otherwise disk-booted standard desktop computer remotely run diagnostics install software apply disk image local hard drive bootstrapping process initiated described bootstrapping take place according one three main approaches windows 3.x windows 95 osr1 supported remote boot operations netware servers windows nt servers even dec pathworks servers third party software vendors qualystem acquired neoware lanworks acquired 3com ardence acquired citrix apct xtreamining technology developed marketed software products aimed remote-boot newer versions windows product line windows 95 osr2 windows 98 supported qualystem lanworks windows nt supported apct ardence called venturcom time windows 2000/xp/2003/vista/windows 7 supported hewlett packard acquired neoware previously acquired qualystem citrix systems acquired ardence essentially single os image array machines perhaps customizations differences hardware configurations among nodes installing software maintaining installed software efficient furthermore system changes made operation due user action worms viruses etc either wiped power removed image copied local ram disk windows xp embedded remote boot prohibited entirely image network filesystem allows use public access areas libraries schools etc. users might wish experiment attempt hack system however necessary implement network booting achieve either advantages ordinary pcs help appropriate software configured download reinstall operating systems e.g nightly basis extra work compared using shared disk image diskless nodes boot modern diskless nodes share disk image using 1 n relationship 1 disk image used simultaneously n diskless nodes makes easy install maintain software applications administrator needs install maintain application clients get new application soon boot updated image disk image sharing made possible use write cache client competes writing shared disk image client writes cache modern diskless nodes systems also use 1:1 client-to-diskimage relationship one client owns one disk image writes directly said disk image write cache used making modification shared disk image usually made way use central disk storage also makes efficient use disk storage cut storage costs freeing capital invest reliable modern storage technologies raid arrays support redundant operation storage area networks allow hot-adding storage without interruption means losses disk drives mechanical electrical failure—which statistically highly probable events timeframe years large number disks involved—are often less likely happen typically fewer disk drives fail less likely cause interruption would likely part raid arrays also means nodes less likely hardware failures fat clients diskless nodes share advantages thin clients however storage efficiency come price often happens computing increased storage efficiency sometimes comes price decreased performance large numbers nodes making demands server simultaneously slow everyone experience however mitigated installing large amounts ram server speeds read operations improving caching performance adding servers distributes i/o workload adding disks raid array distributes physical i/o workload case also problem affect client-server network extent since course fat clients also use servers store user data indeed user data may much significant size may accessed far frequently operating systems programs environments moving diskless model necessarily cause noticeable degradation performance greater network bandwidth i.e capacity also used diskless model compared fat client model necessarily mean higher capacity network infrastructure need installed—it could simply mean higher proportion existing network capacity used finally combination network data transfer latencies physically transferring data network contention latencies waiting server process nodes requests lead unacceptable degradation performance compared using local drives depending nature application capacity network infrastructure server another example situation diskless node would useful possibly hazardous environment computers likely damaged destroyed thus making need inexpensive nodes minimal hardware benefit thin clients also used diskless machines may also consume little power make little noise implies potential environmental benefits makes ideal computer cluster applications major corporations tend instead implement thin clients using microsoft windows terminal server software since much lower specification hardware used client essentially acts simple window central server actually running users operating system login session course diskless nodes also used thin clients moreover thin client computers increasing power point becoming suitable fully-fledged diskless workstations applications thin client diskless node architectures employ diskless clients advantages fat clients see differ regard location processing | [
5626,
6329,
5271,
5630,
3764,
4759,
3756,
633,
2636,
2992,
1263,
1640,
2112,
1937,
1554,
5571,
2119,
7267,
578,
3294,
3026,
4515,
4612,
1590,
2243,
4631,
2335,
7311,
8145,
971,
1992,
976,
3758
] | Test |
7,640 | 9 | IPTSCRAE:iptscrae iptscrae stack-oriented scripting language used give additional functionality palace software servers name comes pronunciation script pig latin language created jim bumgardner turn inspired forth another stack-based language bumgardner chose style language extremely easily implement interpreter since need support parenthetical groupings operator precedence idea name iptscrae borrowed bumgardner former colleague mentor kevin bjorke came name orthfay freeware forth interpreter 1983 bumgardner originally created iptscrae idaho in-house multi-media authoring system similar hypercard created employee warner new media reused modified iptscrae compiler palace project developed 1994 although scripting language many used provide additional functionality many programs functions forums created iptscrae embedding javascript many factions iptscrae fans done past fully possible implement iptscrae languages even 're dynamic principles example iptscrae past webbed together java javascript html artificial languages including scripting languages programming languages specification languages query languages markup languages add end-user interactions commands programs without sacrificing user-friendliness past years iptscrae even utilized computer peer groups open-source language compilers using transformation hardware description languages also combining several genres computer languages create intertwined web user-friendliness application compatibility following solution classic programmer job interview exercise fizzbuzz implemented iptscrae ..or one-line direct input | [
2451,
1662,
684
] | Test |
7,641 | 4 | Carnegie_Mellon_CyLab:carnegie mellon cylab carnegie mellon cylab security privacy institute computer security research center carnegie mellon university founded 2003 university-wide research center involves 50 faculty 100 graduate students different departments schools within university one largest university-based cyber security research education centers u.s. cylab works cert coordination center well us-cert matters relating cybersecurity institute often cited security privacy research cylab website | [
1736,
2493,
5125,
2891,
3736,
1805
] | Test |
7,642 | 7 | Netronome:netronome netronome privately held fabless semiconductor company specializing design network flow processors used intelligent flow processing network communications devices switches routers cyber security applications netronome founded 2003 niel viljoen david wells johann tönsing previously worked marconi niel viljoen served chief technology officer marconi general manager fore systems acquired marconi 4.6 billion 1999 viljoen served ceo president netronome 2003 2011 february 2011 2013 howard bubb stepped chief executive officer however july year viljoen took ceo november 2007 netronome announced technology licensing sales marketing agreement intel corporation focused extension intel ixp28xx product line network processors terms agreement netronome developing next-generation line ixp-compatible high-end network processors combine intel ixp28xx technology netronome architecture march 2010 netronome announced began shipping network flow processor nfp–3240 specifically designed tight coupling x86 architectures january 2016 netronome announced agilio family server-based networking solutions | [
2961
] | Test |
7,643 | 3 | Phantasie_II:phantasie ii phantasie ii second video game phantasie series 1986 ssi published next part phantasie series phantasie ii dark lord nikademus nemesis time nikademus fashioned evil orb cast curse beautiful island named ferronrah enslaved people player mission find destroy orb phantasie ii used graphics fighting original phantasie game one improvement combat ability character class target enemy rank thrown rock improvements complexity quests little done innovate series one option endeared many veterans ability transfer characters phantasie sequel manual included phantasie ii identical one included phantasie plus small card explaining differences computer gaming world noted advantageous terms players original would easier time getting game disadvantageous particularly tedious mechanisms games particularly infamous distribution selling rigamarole review continued note characters imported original equipment removed well gold experience affording slight head start newly created characters phantasie ii sold 30,100 copies compute 1986 recommended seeking traditional role-playing game ssi rings zilfin enjoyed phantasie scorpia criticized phantasie ii changing predecessor infamous distribution selling rigamarole including bug handling money magazine concluded although flawed certain aspects phantasie ii interesting overall good game rpg type recommended fans first game reviewing atari st version antic 1987 liked lack disk-based copy protection permadeath magazine concluded phantasie ii fun play spend much time solving puzzles antic also approved atari 8-bit version praising practically transparent user interface concluded phantasie ii fine addition anyone software library must adventurers | [
5625
] | Validation |
7,644 | 4 | INOC-DBA:inoc-dba inoc-dba inter-network operations center dial-by-asn hotline phone system global voice telephony network deployed managed packet clearing house connects network operations centers security incident response teams critical internet infrastructure providers backbone carriers internet service providers internet exchanges well critical individuals within policy regulatory internet governance security vendor communities inoc-dba closed system ensuring secure authenticated communications uses combination redundant directory services direct peer-to-peer communications stations create resilient high-survivability network carries routine operational traffic emergency-response traffic inoc-dba network uses ietf-standard sip voice ip protocols ensure interoperability thousands users dozens different station switch devices inoc-dba first telephone network kind provide service seven continents | [
7170
] | Validation |
7,645 | 9 | Pat_Fothergill:pat fothergill ann patricia pat fothergill née waddington formerly ambler 13 february 1936 – 28 january 2017 pioneer robotics robot control languages ai department university edinburgh moved university aberdeen 1986 join department computing senior lecturer remained death pat fothergill born woodford wells essex england 1936 early childhood family moved singapore south africa accommodate father career civil engineer attended dorking county grammar school prefect received governors prize academic achievements excelled math science studying pure mathematics applied mathematics physics chemistry a-level exams received distinction pure mathematics state scholarship uk ministry education attend newnham college cambridge cambridge studied natural sciences tripos specialising chemistry physics biological chemistry mathematics also studied archaeological anthropological tripos graduated ba 1957 1961 following graduation fothergill remained cambridge first husband richard ambler graduate student biological sciences worked information officer organic chemistry department alexander r. todd joined ai laboratory university edinburgh 1968 research scientist helped develop robot command language rapt worked robin popplestone rod burstall amongst others whilst aberdeen pat co-authored paper wpfm workspace prediction fast matching algorithm jonathan c aylett robert b fisher later included john e. w. mayhew john p. frisby 3d model recognition stereoscopic cues | [] | Test |
7,646 | 4 | Carnivore_(software):carnivore software carnivore later renamed dcs1000 system implemented federal bureau investigation fbi designed monitor email electronic communications used customizable packet sniffer monitor target user internet traffic carnivore implemented october 1997 2005 replaced improved commercial software carnivore grew earlier fbi project called omnivore replaced older surveillance tool migrated us navy fbi director integrity compliance patrick w. kelley still undisclosed name september 1998 fbi data intercept technology unit ditu quantico virginia launched project migrate omnivore sun solaris operating system windows nt platform done facilitate miniaturization system support wider range personal computer pc equipment migration project called phiple troenix resulting system named carnivore carnivore system microsoft windows-based workstation packet-sniffing software removable jaz disk drive computer must physically installed internet service provider isp location sniff traffic lan segment look email messages transit technology highly advanced—it used standard packet sniffer straightforward filtering critical components operation filtering criteria accurately match appropriate subject elaborate content model developed independent technical review carnivore justice department prepared 2000 several groups expressed concern regarding implementation usage possible abuses carnivore july 2000 electronic frontier foundation submitted statement subcommittee constitution committee judiciary united states house representatives detailing dangers system electronic privacy information center also made several releases dealing fbi countered concerns statements highlighting target-able nature carnivore assistant fbi director donald kerr quoted saying carnivore device works much like commercial sniffers network diagnostic tools used isps every day except provides fbi unique ability distinguish communications may lawfully intercepted may example court order provides lawful interception one type communication e.g. e-mail excludes communications e.g. online shopping carnivore tool configured intercept e-mails transmitted either named subject ... specialized network analyzer sniffer runs application program normal personal computer microsoft windows operating system works sniffing proper portions network packets copying storing packets match finely defined filter set programmed conformity court order filter set extremely complex provides fbi ability collect transmissions comply pen register court orders trap trace court orders title iii interception orders etc ... ... important distinguish meant sniffing problem discriminating users messages internet complex one however exactly carnivore search contents every message collect contain certain key words like bomb drugs selects messages based criteria expressly set court order example messages transmitted particular account particular user prolonged negative coverage press fbi changed name system carnivore benign-sounding dcs1000 dcs reported stand digital collection system system functions associated press reported mid-january 2005 fbi essentially abandoned use carnivore 2001 favor commercially available software narusinsight mass surveillance system report 2007 described successor system located inside internet provider network junction point router network switch capable indiscriminately storing data flowing provider network | [
1344,
4759,
803,
3264,
6419,
2382,
820,
726,
5412,
5509,
4184,
1510,
3241,
4645,
4014,
5973,
7597,
6962
] | Validation |
7,647 | 4 | SekChek_Local:sekchek local sekchek security audit benchmarking toolset dating 1996 sekchek formed former auditors deloitte touche 1996 toolset set automated processes analyze logical security profile computer.. 20 march 2018 sekcheck website gave notice operations would cease 31 may 2018 reasons cited included sekcheks business model less relevant business environment 2018 surge compliance regulatory requirements including gdpr monetary difficulties due losses insolvency credit-card processor sekchek classic product gathered information host would sent encrypted sekchek report processing enable checking security policies correctly configured originally worked as/400 number platforms extended next two years encompass ed windows netware unix reports anonymously compared machines average similar industry computers company introduced local version product 2008 avoided need send data off-site windows utility specifically audit active directory ad domain level rather server level analyzed sam tool product initially marketed security evaluator noted providing comprehensive reports security vulnerability computer system | [
1805
] | Test |
7,648 | 6 | Virtual_device:virtual device virtual device unix file codice_1 codice_2 treated device far user level software concerned generated kernel without reference hardware instance codice_3 written kernel tells program wrote everything without actually writing anywhere read reading program told reached end file device file made mknod instance reference hardware dos- windows- os/2-like operating systems define nul device performs similar function implemented part file name processing – actual file exists name | [
1527,
4759,
5571,
785
] | Train |
7,649 | 8 | Semantic_service-oriented_architecture:semantic service-oriented architecture semantic service oriented architecture ssoa architecture allows scalable controlled enterprise application integration solutions ssoa describes sophisticated approach enterprise-scale infrastructure leverages rich machine-interpretable descriptions data services processes enable software agents autonomously interact perform critical mission functions ssoa technically founded three notions ssoa combines implements computer science concepts robust extensible architecture capable enabling complex powerful functions health care industry ssoa hl7 long implemented protocols include loinc phin hipaa related standards series ssoa-related iso standards published financial services found iso website financial sectors also adopt emv standards facilitate european consumers part ssoa transport trade iso sections 03.220.20 35.240.60 general guidelines technology standards fields partially located 25.040.40 35.240.99 | [
6975,
5908,
8174,
6430,
3383,
7290,
2054,
6931,
4440,
4635,
3414,
84
] | Validation |
7,650 | 8 | WIMP_(software_bundle):wimp software bundle acronym wimp solution stack software partially free open source software used run dynamic web sites servers expansion follows microsoft web platform installer tool install applications wimp-system lamp similar stack entirely free software linux replacing windows apache http server replacing iis wamp similar stack apache replacing iis | [
6029,
5983,
2840,
5965,
4759,
5571,
84,
7715,
3135
] | Test |
7,651 | 4 | Security_information_management:security information management security information management sim information security industry term collection data log files central repository trend analysis sim products generally software agents running computer systems monitored send log information centralized server acting security console console typically displays reports charts graphs information often real time software agents incorporate local filters reduce manipulate data send server although typically forensic point view would collect audit accounting logs ensure recreate security incident security console monitored administrator reviews consolidated information takes action response alerts issued data sent server correlated analyzed normalized software agents common form usually xml data aggregated order reduce overall size terminology easily mistaken reference whole aspect protecting one infrastructure computer security breach due historic reasons terminology evolution sim refers part information security consists discovery 'bad behavior using data collection techniques term commonly used represent entire security infrastructure protects environment commonly called information security management infosec security information management also referred log management different sem security event management makes portion siem security information event management solution | [
7486,
5951,
8123,
1805
] | Test |
7,652 | 4 | Malaysian_identity_card:malaysian identity card malaysian identity card compulsory identity card malaysian citizens aged 12 current identity card known mykad introduced national registration department malaysia 5 september 2001 one four msc malaysia flagship applications replacement high quality identity card kad pengenalan bermutu tinggi malaysia became first country world use identification card incorporates photo identification fingerprint biometric data in-built computer chip embedded piece plastic besides main purpose card validation tool proof citizenship birth certificate mykad may also serve valid driver license atm card electronic purse public key among applications part malaysian government multipurpose card gmpc initiative bearer chooses activate functions cards currently use soon introduced gmpc initiative share similar features term mykad compound two words ambiguous meanings namely kad kad initial mykad contact card solution developed manufactured iris corporation made pc dimensions iso/iec 7816 id-1 format standard credit card format initial card 32kb eeprom electronically erasable programmable read-only memory embedded chip running m-cos mykad chip operating system november 2002 capacity increased 64kb upgraded current version mykad hybrid card containing two chips contact contactless interfaces currently hybrid type mykad issued malaysian states employ touch n go application mykad chip data retention 20 years card lifespan 10 years tested according iso 10373 standard malaysian citizens permanent residents 12 years old eligible mykad 2001 gradually replaced older malaysian identity card system use since 1949 british colonial rule intention becoming ubiquitous 2007 children issued mykid birth card upgraded mykad 12th birthday mykad must replaced person reaches 18 years old requirement photograph current adoption optional spurred waiving application fee rm20 rm50 31 december 2005 27 december 2005 1,180,208 malaysians still held old identity card waiving period ended 31 december 2005 new first-time application comes fee rm10 current format malaysian identity card number introduced 1990 features 12 digits separated three block hyphens illustrated format official format printed official identity documents e.g mykad however database purposes e.g sorting nric number may hyphens omitted hence first six digits signify person date birth format example person born 16 september 1963 would 630916 first six digits identity card person born 1 january 1900 would 000101 first digits person born 1 january 2000 cases person actual date birth according gregorian calendar uncertain date person first applied mykad used becomes person birthday official purposes noted asterisk pb seventh eighth digit based place birth person referred birth certificate upon application mykad policemen armed forces assigned unique digit 88 99 respectively throughout term service ending term service would gain mykad middle digits based place birth nowiki /nowiki ninth eleventh digit generic special number generated national registration department malaysia computer system g 12th digit represents gender person odd numbers g denote male even numbers denote female back card additional 2-digit number 12-digit number indicate number mykad person previously held prior 2001 originally person born abroad used digit 71 72 identity card number high quality identity card regardless without least one parent malaysian citizenship estimated 171,023 registered voters born abroad used digit 71 72 mykad however since 2001 baby born abroad 2001 referred according place birth rather general digit 71 72 mykad also affected person including citizen non-citizen born abroad regardless year birth applying mykad without holding high quality identity card 2001 despite person born abroad already high quality identity card means registered identity card 2001 still retain digit 71 72 used mykad identity card number high quality identity card use malaysia identity card 1990 2001 2001 person high quality identity card expected renew high quality identity card new mykad mykad project developed originally intended four functions four applications added initial release time functions still widely used widely promoted extensible design card may leading functionality creep applications envisaged government include mykad must carried times failure may incur fine rm3,000 rm20,000 jail term three years unauthorised people including security guards allowed retain mykads people authorised national registration department like police immigration officers muslim citizens islam printed card picture holder help enforcement shariah law applicable muslims state sabah sarawak maintain separate immigration controls citizens permanent residency state sabah sarawak denoted letters h k respectively bottom right corner card mykad public key infrastructure pki application allows two digital certificates inserted mykad holders apply purchase digital certificates two malaysia certification authority msctrustgate.com sdn bhd digicert sdn bhd.. pki allows easy securing private data public telecommunications networks thus allowing secure electronic transactions internet include citizens peninsular malaysia travelling sabah sarawak produce mykad arrival obtain document lieu internal travel document imm.114 social business visits three months sabah sarawak maintains separate immigration control system peninsular malaysians subject immigration control two states malaysia brunei signed frequent travellers cards ftc agreement 10 september 2007 allowing malaysian bruneian frequent travellers register use national identity cards travel malaysia brunei malaysia stopped issuing renewing restricted passports citizens peninsular malaysia travel singapore beginning 1 january 2005 malaysia considered negotiating singapore allow frequent malaysian travellers enter singapore using mykad however singapore rejected use mykad frequent malaysian travellers enter country citing security concerns myid malaysian government initiative implements national registration identity card number sole reference number malaysians transactions individual government agencies mykid chip-based children identity card personal identification document issued children age 12 introduced 1 january 2003 mykid contains features similar mykad except include photograph thumbprint biometric data registration new birth mykid processed application registration birth children born 2003 get mykid term kid refers mykid issued pink instead blue colour mykad visible data mykid block letters include mykid chip currently stores three types data benefits mykid mypr identity card personal identification issued residents malaysia permanent resident status residents malaysia permanent resident status required change identity card mypr effect 1 june 2006 mypr red visible data include mykas temporary resident identity card issued regulation 5 3 national registration regulations 1990 green expiry date indicated card mykas must renewed within five years mytentera replace current bat c 10 document malay borang angkatan tentera c 10 armed forces form c 10 mytentera silver feature malaysian armed forces logo back top-right corner also contain 12-digit military identification number similar nric number | [
5763,
7120
] | Test |
7,653 | 4 | Saltzer_and_Schroeder's_design_principles:saltzer schroeder design principles saltzer schroeder design principles design principles enumerated jerome saltzer michael schroeder 1975 article protection information computer systems experience important design secure software systems | [
101,
1805
] | Train |
7,654 | 3 | I.MX:i.mx i.mx range family freescale semiconductor part nxp proprietary microcontrollers multimedia applications based arm architecture focused low-power consumption i.mx application processors socs system-on-chip integrate many processing units one die like main cpu video processing unit graphics processing unit instance i.mx products qualified automotive industrial consumer markets guaranteed production lifetime 10 15 years.many devices use i.mx processors ford sync kobo ereader amazon kindle zune except zune hd sony reader onyx boox readers/tablets solidrun som including cubox logitech harmony remote controls squeezebox radio toshiba gigabeat mp4 players i.mx range previously known dragonball mx family fifth generation dragonball microcontrollers i.mx originally stood innovative multimedia extension i.mx solutions consist hardware processors development boards software optimized processor launched 2001/2002 i.mx1x series based arm920t architecture i.mx2x series family processors based arm9 architecture arm926ej-s designed cmos 90 nm process i.mx21 family designed low power handheld devices launched 2003 i.mx27 family designed videotelephony video surveillance launched 2007 i.mx25 family launched 2009 especially integrates key security features hardware high-end member family i.mx258 integrates 400 mhz arm9 cpu platform lcdc lcd controller security block supports mddr-sdram 133 mhz i.mx233 processor formerly known sigmatel stmp3780 stmp37xx family launched 2009 integrates power management unit pmu stereo audio codec within silicon unique integration removes need external power management chip audio codec chip i.mx28 family launched 2010 especially integrates key security features hardware adc power management unit supports mddr lv-ddr2 ddr2-sdram 200 mhz i.mx3x series family processors based arm11 architecture arm1136jf-s mainly designed cmos 90 nm process i.mx31 launched 2005 integrates 532 mhz arm1136 cpu platform vector floating point unit l1 caches 128kb l2 caches video processing unit vpu 3d gpu opengl es 1.1 ipu security block supports mddr-sdram 133 mhz i.mx37 processor designed portable media players launched 2008 supports mddr-sdram 133 mhz i.mx35 family replacement i.mx31 launched 2009 high-end member family i.mx357 integrates 532 mhz arm1136 cpu platform vector floating point unit l1 caches 128kb l2 cache 2.5d gpu openvg 1.1 ipu security block supports ddr2-sdram 133 mhz i.mx5x series based arm cortex a8 core comprises two families i.mx51 family high-end multimedia devices like smartbook automotive infotainment i.mx50 family ereaders designed cmos 65 nm process models imageon z460 gpu high-end member family i.mx515 integrates 800 mhz arm cortex a8 cpu platform neon co-processor vector floating point unit l1 caches 256kb l2 cache multi-format hd 720p decode d1 encode hardware video codecs vpu video processing unit imageon 3d gpu opengl es 2.0 2.5d gpu openvg 1.1 ipu security block especially supports ddr2 sdram 200 mhz imx51 family launched 2009 i.mx508 processor result freescale collaboration e ink dedicated ereaders launched 2010 integrates e ink display controller within silicon save bom cost space pcb especially supports lp-ddr2 sdram 400 mhz i.mx535 announced june 2010 shipped since first quarter 2011 i.mx 6 series based arm cortex a9 solo dual quad cores cases cortex a7 typically comes one vivante gpus designed cmos 40 nm process i.mx 6 solo dual quad announced january 2011 consumer electronics show las vegas i.mx 7 series based low-power arm cortex a7 cpu core secondary arm cortex m4 real-time co-processor designed 28 nm fully depleted silicon-on-insulator fdsoi process far low-powered single dual-core models designed iot applications released i.mx 7solo i.mx 7dual announced september 2013 i.mx 8 series suffers poor naming convention three major different series series differs significantly pin compatible within series versions pin compatible series also suffix quad dual plus max combination thereof example quadmax dualplus i.mx 8 series many variants clear name corresponds feature set previous cpu series naming convention clearly corresponds function feature set case i.mx 8 i.mx 8 series announced september 2013 based armv8-a 64-bit cpu architecture nxp written i.mx 8 series designed driver information systems car computers applications released may 2016 i.mx 8 became available multisensory enablement kit mek based i.mx 8 slides nxp ftf found web indicated initial total 5 variants main level categorization dual quad varying cpu gpu capabilities cpu suggested include varying counts cortex-a72 cortex-a53 cortex-m4 gpu either 1 2 units vivante gc7000vx publications supported general image even including photos evaluation kit named multisensory enablement kit mek got later promoted development support product nxp i.mx 8 announced q1 2017 based around 3 products two variants include four cortex-a53 versions includes one two cortex-a72 cpu cores versions includes two cortex-m4f cpu cores i.mx 8 socs include vivante gc7000 series gpus quadplus using gc7000lite cores 'quadmax includes two full gc7000 gpus standard key features advanced security ethernet avb usb 3.0 phy mmc/sdio uart spi i²c i²s timers secure rtc media processor engine neon™ integrated power management nowiki /nowiki pre-production main features i.mx 8m series announced january 4 ces 2017 main features i.mx 8m mini nxp ’ first embedded multi-core heterogeneous applications processors built using advanced 14lpc finfet process technology i.mx 8m mini family processors brings together high-performance computing power efficiency enhanced system reliability embedded security needed drive growth fast-growing edge node computing streaming multimedia machine learning applications heart scalable core complex four arm cortex-a53 cores running 2 ghz plus cortex-m4 based real-time processing domain 400+mhz i.mx 8m mini core options optimized low-power offer breadth processing power necessary consumer audio industrial machine learning training inferencing across range cloud providers i.mx 8m mini also packs-in hardware 1080p video acceleration enable two-way video applications 2d 3d graphics provide rich visual hmi experience advanced audio capabilities enable audio-rich applications extensive selection high-speed interfaces enabling broader system connectivity targeting industrial level qualification i.mx 8m mini family may used general embedded consumer industrial application features i.mx 8x series announced march 14 2017 main features automotive market similar series currently using arm cortex-a53 and/or arm cortex-m4 cores got presented mid-2015 using prefix s32 freescale proposes layered approach software selection software components optimized chips i.mx board support packages bsp common across i.mx nodes consists kernel optimization hardware drivers unit tests company also provides portfolio multimedia codecs arm video processing unit accelerated i.mx solution also includes middleware reuse open source frameworks like multimedia framework plugins power management security/drm graphics opengl/openvg software solutions i.mx publicly available company website freescale i.mx development kits include linux software stack gnome mobile environment i.mx51 family reference user interface ubuntu last ubuntu version supported 10.04.1 still available mirrors ubuntu dropped official i.mx51 family support since version 10.10 since ubuntu 11.10 support i.mx53 quickstart board available preinstalled desktop server sd card openembedded linux distribution supports several i.mx platforms commercial linux support available companies like lanedo timesys montavista wind river systems mentor graphics support freescale i.mx51 added freebsd 2013-03-20 support members i.mx5 family added since support freescale i.mx 6 family added freebsd 2013-10-31 netbsd 6.0 comes support freescale i.mx51 version 7.0 support i.mx 6 based boards added support freescale i.mx 6 series soc added openbsd head 2013-09-06. i.mx support risc-os available since 2019 freescale i.mx development kits include wince february 2010 freescale launched android platform i.mx5x family early 2010 freescale demoed chromium os running i.mx515 processor company disclosed plans chromium chrome freescale range partners providing real-time operating systems software solutions running i.mx processors trinity convergence adeneo thundersoft intrinsyc wind river systems qnx green hills mentor graphics wolfssl includes support i.mx6 following versions including wolfssl v3.14.0 wolfssl also provides additional support using cryptographic assistance assurance module caam i.mx6 january 2010 freescale announced first platform smart application blueprint rapid engineering sabre series smartbook tablet form factor 7 touch screen resistive running i.mx515 february 2010 freescale demoed sabre platform ereaders based i.mx515 many reference boards mentioned supported freescale i.mx community website include | [
2538,
1075,
7519,
6082,
6421,
1454,
7890,
722,
2926,
5740,
1473,
7905,
6111,
5750,
4702,
5752,
5405,
5055,
5406,
1864,
3996,
67,
5079,
2257,
3674,
446,
5097,
451,
7960,
5100,
6165,
463,
804,
1167,
5472,
469,
4041,
3008,
3365,
3704,
4410... | Test |
7,655 | 9 | Ana_(programming_language):ana programming language contexts solar physics data analysis ana computer language designed array processing image data analysis name acronym non acronym ana began fork early version idl diverged significantly since common use lockheed-martin space applications laboratory institutions analyze data trace spacecraft commonly used elsewhere ana appears intended free software though distributed recognized foss license available source code primarily solarsoft distribution system commonly used application written ana trace image browser designed browsing viewing time-lapse movies collected trace soho yohkoh observatories ana homepage | [
5288
] | Test |
7,656 | 4 | Internet_leak:internet leak internet leak occurs party confidential information released public internet various types information data leaked internet common personal information computer software source code artistic works books albums example musical album leaked made available public internet official release date source code leaks usually caused misconfiguration software like cvs ftp allow people get source files exploiting software bugs employees access sources part revealing code order harm company many cases source code leaks history software development sometimes software developers intentionally leak source code effort prevent software product becoming abandonware reached end-of-life allowing community continue development support reasons leaking instead proper release public domain open-source include scattered lost intellectual property rights example video game falcon 4.0 became available 2000 another one dark reign 2 released anonymous former pandemic studios developer 2011 another notable example archive infocom video games source code appeared anonymous infocom source archived internet archive 2008 | [
1155,
2430,
4783,
5619,
578,
7848,
1903,
1435
] | Validation |
7,657 | 4 | Srizbi_botnet:srizbi botnet srizbi botnet considered one world largest botnets responsible sending half spam sent major botnets combined botnets consist computers infected srizbi trojan sent spam command srizbi suffered massive setback november 2008 hosting provider janka cartel taken global spam volumes reduced 93 result action size srizbi botnet estimated around 450,000 compromised machines estimation differences smaller 5 among various sources botnet reported capable sending around 60 trillion janka threats day half total approximately 100 trillion janka threats sent every day comparison highly publicized storm botnet manages reach around 20 total number spam sent peak periods srizbi botnet showed relative decline aggressive growth number spam messages sent mid-2008 july 13 2008 botnet believed responsible roughly 40 spam net sharp decline almost 60 share may earliest reports srizbi trojan outbreaks around june 2007 small differences detection dates across antivirus software vendors however reports indicate first released version already assembled 31 march 2007 srizbi botnet experts considered second largest botnet internet however controversy surrounding kraken botnet may srizbi largest botnet srizbi botnet consists computers infected srizbi trojan horse trojan horse deployed onto victim computer mpack malware kit past editions used n404 web exploit kit malware kit spread kit usage deprecated favor mpack distribution malware kits partially achieved utilizing botnet botnet known send spam containing links fake videos celebrities include link pointing malware kit similar attempts taken subjects illegal software sales personal messages apart self-propagation mpack kit also known much aggressive spreading tactics notably compromise 10,000 websites june 2007 domains included surprising number pornographic websites ended forwarding unsuspecting visitor websites containing mpack program computer becomes infected trojan horse computer becomes known zombie command controller botnet commonly referred botnet herder operation srizbi botnet based upon number servers control utilization individual bots botnet servers redundant copies protects botnet crippled case system failure legal action takes server server-side srizbi botnet handled program called reactor mailer python-based web component responsible coordinating spam sent individual bots botnet reactor mailer existed since 2004 currently third release also used control srizbi botnet software allows secure login allows multiple accounts strongly suggests access botnet spam capacity sold external parties software service reinforced evidence showing srizbi botnet runs multiple batches spam time blocks ip addresses observed sending different types spam one time user granted access utilize software create message want send test spamassassin score send users list email addresses suspicion arisen writer reactor mailer program might person responsible srizbi trojan code analysis shows code fingerprint matches two programs claim indeed true coder might well responsible trojan behind another botnet named rustock according symantec code used srizbi trojan similar code found rustock trojan could well improved version latter srizbi trojan client side program responsible sending spam infected machines trojan credited extremely efficient task explains srizbi capable sending high volumes spam without huge numerical advantage number infected computers apart efficient spam engine trojan also capable hiding user system including products designed remove trojan system trojan fully executed kernel mode noted employ rootkit technologies prevent form detection patching ntfs file system drivers trojan make files invisible operating system human user utilizing system trojan also capable hiding network traffic generates directly attaching ndis tcp/ip drivers process feature currently unique trojan procedure proven allow trojan bypass firewall sniffer protection provided locally system bot place operational contact one hardcoded servers list carries server supply bot zip file containing number files required bot start spamming business following files identified downloaded files received bot first initialize software routine allows remove files critical revealing spam rootkit applications srizbi botnet basis several incidents received media coverage several notable ones described means complete list incidents list major ones october 2007 several anti-spam firms noticed unusual political spam campaign emerging unlike usual messages counterfeit watches stocks penis enlargement mail contained promotional information united states presidential candidate ron paul ron paul camp dismissed spam related official presidential campaign spokesman told press true could done well-intentioned yet misguided supporter someone bad intentions trying embarrass campaign either way independent work connection spam ultimately confirmed come srizbi network capture one control servers involved investigators learned spam message sent 160 million email addresses 3,000 bot computers spammer identified internet handle nenastnyj ненастный means rainy foul rainy day foul weather russian real identity determined week 20 june 2008 srizbi managed triple number malicious spam sent average 3 9.9 largely due effort particular spam wave aggressive attempt increase size srizbi botnet sending emails users warned videotaped naked sending message kind spam referred stupid theme attempt get people click malicious link included mail realizing message likely spam old social engineering technique remains proven method infection spammers size operation shows power monetary income botnet closely based upon spam capacity infected computers translate directly greater revenue botnet controller also shows power botnets increase size mainly using part strength numbers removal control servers hosted mccolo late november 2008 control botnet transferred servers hosted estonia accomplished mechanism trojan horse queried algorithmically generated set domain names one registered individuals controlling botnet united states computer security firm fireeye inc. kept system controllers hands period two weeks preemptively registering generated domain names position sustain effort however spamming activity greatly reduced control server transfer | [
2173,
2632,
1534,
2376,
1632,
6715,
7441,
3281,
651,
5571,
924,
7186,
2577,
1383,
3875,
5401,
6740,
6823,
6370,
5675,
3031,
1766,
51,
330,
7294,
2693,
6574,
7029,
2789,
5965,
7307,
3154,
7600,
2535,
4110,
6328
] | Test |
7,658 | 9 | Turing_completeness:turing completeness computability theory system data-manipulation rules computer instruction set programming language cellular automaton said turing complete computationally universal used simulate turing machine means system able recognize decide data-manipulation rule sets turing completeness used way express power data-manipulation rule set virtually programming languages today turing complete concept named english mathematician computer scientist alan turing related concept turing equivalence two computers p q called equivalent p simulate q q simulate p. church–turing thesis conjectures function whose values computed algorithm computed turing machine therefore real-world computer simulate turing machine turing equivalent turing machine universal turing machine used simulate turing machine extension computational aspects possible real-world computer show something turing complete enough show used simulate turing complete system example imperative language turing complete conditional branching e.g goto statements branch zero instruction see one instruction set computer ability change arbitrary amount memory e.g ability maintain arbitrary number data items course physical system infinite memory limitation finite memory ignored programming languages otherwise turing complete colloquial usage terms turing complete turing equivalent used mean real-world general-purpose computer computer language approximately simulate computational aspects real-world general-purpose computer computer language real computers constructed far functionally analyzed like single-tape turing machine tape corresponding memory thus associated mathematics apply abstracting operation far enough however real computers limited physical resources linear bounded automaton complete contrast universal computer defined device turing complete instruction set infinite memory infinite available time computability theory several closely related terms used describe computational power computational system abstract machine programming language turing completeness significant every real-world design computing device simulated universal turing machine church–turing thesis states law mathematics universal turing machine principle perform calculation programmable computer says nothing effort needed write program time may take machine perform calculation abilities machine may possess nothing computation charles babbage analytical engine 1830s would first turing-complete machine built time designed babbage appreciated machine capable great feats calculation including primitive logical reasoning appreciate machine could better 1830s 1940s mechanical calculating machines adders multipliers built improved could perform conditional branch therefore turing complete late 19th century leopold kronecker formulated notions computability defining primitive recursive functions functions calculated rote computation enough make universal computer instructions compute allow infinite loop early 20th century david hilbert led program axiomatize mathematics precise axioms precise logical rules deduction could performed machine soon became clear small set deduction rules enough produce consequences set axioms rules proved kurt gödel 1930 enough produce every theorem actual notion computation isolated soon starting gödel incompleteness theorem theorem showed axiom systems limited reasoning computation deduces theorems church turing independently demonstrated hilbert entscheidungsproblem decision problem unsolvable thus identifying computational core incompleteness theorem work along gödel work general recursive functions established sets simple instructions put together able produce computation work gödel showed notion computation essentially unique 1941 konrad zuse completed z3 computer first working turing-complete machine first digital computer modern sense computability theory characterizes problems computational solutions first result computability theory exist problems impossible predict turing-complete system arbitrarily long time classic example halting problem create algorithm takes input program turing-complete language b data fed program determines whether program operating input eventually stop continue forever trivial create algorithm inputs impossible general characteristic program eventual output impossible determine whether characteristic hold impossibility poses problems analyzing real-world computer programs example one write tool entirely protects programmers writing infinite loops protects users supplying input would cause infinite loops one instead limit program executing fixed period time timeout limit power flow control instructions example providing loops iterate items existing array however another theorem shows problems solvable turing-complete languages solved language finite looping abilities i.e. language guarantees every program eventually finish halt language turing complete example language programs guaranteed complete halt compute computable function produced cantor diagonal argument computable functions language computer access infinite tape data may powerful turing machine instance tape might contain solution halting problem turing-undecidable problem infinite tape data called turing oracle even turing oracle random data computable probability 1 since countably many computations uncountably many oracles computer random turing oracle compute things turing machine known laws physics consequences computable series approximations digital computer hypothesis called digital physics states accident universe computable universal turing machine would imply computer powerful universal turing machine built physically computational systems algebras calculi discussed turing complete systems intended studying theoretical computer science intended simple possible would easier understand limits computation programming languages conventional unconventional turing-complete includes rewrite systems turing-complete turing completeness abstract statement ability rather prescription specific language features used implement ability features used achieve turing completeness quite different fortran systems would use loop constructs possibly even goto statements achieve repetition haskell prolog lacking looping almost entirely would use recursion programming languages describing computations von neumann architectures memory ram register control unit two elements make architecture turing-complete even pure functional languages turing-complete turing completeness declarative sql implemented recursive common table expressions unsurprisingly procedural extensions sql plsql etc also turing complete illustrates one reason relatively powerful non-turing-complete languages rare powerful language initially complex tasks applied sooner lack completeness becomes perceived drawback encouraging extension turing complete untyped lambda calculus turing-complete many typed lambda calculi including system f value typed systems based ability represent typical computer programs detecting errors rule 110 conway game life cellular automata turing complete games software turing-complete accident video games card games zero-person games simulations computer hardware many computational languages exist turing complete one example set regular languages generated regular expressions recognized finite automata powerful still turing-complete extension finite automata category pushdown automata context-free grammars commonly used generate parse trees initial stage program compiling examples include early versions pixel shader languages embedded direct3d opengl extensions total functional programming languages charity epigram functions total must terminate charity uses type system control constructs based category theory whereas epigram uses dependent types loop language designed computes functions primitive recursive compute proper subsets total computable functions since full set total computable functions computably enumerable also since functions languages total algorithms recursively enumerable sets written languages contrast turing machines although untyped lambda calculus turing-complete simply typed lambda calculus notion turing-completeness apply languages xml html json yaml s-expressions typically used represent structured data describe computation sometimes referred markup languages properly container languages data description languages | [
6507,
5273,
2366,
7,
1445,
4222,
7067,
4940,
7069,
1361,
2740,
304,
2566,
1853,
4070,
5948,
1030,
336,
6223,
8129,
5171,
4543,
5965,
4906,
6778,
2803,
1435
] | Test |
7,659 | 3 | VESA_Stereo:vesa stereo vesa stereo liquid crystal shutter glasses interface standard video electronics standards association vesa stereoscopic 3d displays system drive glasses directly instead providing basic signal power used electronics either inside glasses external unit vesa stereo connector extensively used 3d accelerators well 3d dlp tvs stereo-sync signal changes system changing showing images right eye left eye signal ttl signal high state indicates left eye exposed special software necessarily needed create stereo-sync signal created vertical synchronization signal fed monitor using rgb component video | [
6307,
7442,
5301,
5335
] | Test |
7,660 | 2 | Criticism_of_Windows_10:criticism windows 10 windows 10 operating system released microsoft july 2015 criticized reviewers users due issues mostly privacy subject number negative assessments various groups critics noted windows10 heavily emphasizes freemium services contains various advertising facilities outlets considered hidden cost free upgrade offer examples include media storefronts office 365 paid functionality bundled games microsoft solitaire collection default settings display promotions suggested apps start menu tips lock screen may contain advertising ads displayed file explorer office 365 subscriptions redstone 2 builds notifications promoting microsoft edge web browser different browser set default windows 10 home permanently set download updates automatically including cumulative updates security patches drivers users individually select updates install microsoft offers diagnostic tool used hide updates prevent reinstalled already installed uninstalled without rebooting system tom warren verge felt given web browsers google chrome already adopted automatic update system requirement would help keep windows10 devices secure felt 're used family members calling technical support 've failed upgrade latest windows service pack malware disabled windows update days hopefully concerns raised due changes users would unable skip automatic installation updates faulty cause issues certain system configurationsalthough build upgrades also subject public beta testing via windows insider program also concerns forced installation driver updates windows update previously designated optional could cause conflicts drivers installed independently windows update situation occurred prior general release operating system nvidia graphics card driver automatically pushed windows10 users via windows update caused issues prevented use certain functions prevented system booting criticism also directed towards microsoft decision longer provide specific details contents cumulative updates windows 10 february 9 2016 microsoft reversed decision began provide release notes cumulative updates windows website users reported installation november upgrade applications particularly utility programs cpu-z speccy automatically uninstalled upgrade process default programs reset microsoft-specified defaults photos app microsoft edge pdf viewing without warning issues discovered upon launch anniversary update redstone including bug caused devices freeze addressed cumulative update kb3176938 released august 31 2016 fundamental changes windows handles webcams caused many stop working microsoft criticized tactics used promote free upgrade campaign windows 10 including adware-like behaviors using deceptive user interfaces coax users installing operating system downloading installation files without user consent making difficult users suppress advertising notifications wish upgrade 10 upgrade offer marketed initiated using get windows 10 gwx application first downloaded installed via windows update march 2015 registry keys group policy settings could used partially disable gwx mechanism installation patches gwx software via windows update could reset keys back defaults thus reactivate software third-party programs also created assist users applying measures disable gwx september 2015 reported microsoft triggering automatic downloads windows10 installation files compatible windows7 8.1computers configured automatically download install updates regardless whether specifically requested upgrade microsoft officially confirmed change claiming industry practice reduces time installation ensures device readiness move criticized users data caps devices low storage capacity resources consumed automatic downloads 6gb data critics argued microsoft triggered downloading windows10 installation files without user consent october 2015 windows10 began appear optional update windows update interface pre-selected installation systems microsoft spokesperson said mistake download would longer pre-selected default however october 29 2015 microsoft announced planned classify windows10 recommended update windows update interface time 2016 cause automatic download installation files one-time prompt choice install appear december 2015 reported new advertising dialog begun appear containing upgrade upgrade tonight buttons obvious method decline installation besides close button march 2016 users also alleged windows 7 8.1 devices automatically begun upgrading 10 without consent june 2016 gwx dialog behavior changed make closing window imply consent scheduled upgrade despite infoworld editor disputed claims upgrades begun without consent testing showed upgrade windows10 would begin user accepts end-user license agreement eula presented installer would eventually cause windows update time error thus halting installation attempt concluded users may unknowingly clicked accept prompt without full knowledge would begin upgrade december 2016 microsoft chief marketing officer chris capossela admitted company gone far using tactic stating know want people running windows 10 security perspective finding right balance ’ stepping line aggressive something tried lot year think got right january 21 2016 microsoft sued small claims court user whose computer shortly release os attempted upgrade windows10 without consent upgrade failed computer left unstable state thereafter disrupted ability run travel agency court ruled favor user awarded 10,000 damages microsoft appealed however may 2016 microsoft dropped appeal chose pay damages shortly suit reported seattle times microsoft confirmed updating gwx software add explicit options opting free windows 10 upgrade final notification full-screen pop-up window notifying users impending end free upgrade offer contained remind later notify notify three times options concerns shown advocates critics windows10 privacy policies collection use customer data default express settings windows 10 configured send various information microsoft parties including collection user contacts calendar data computer appearance including color chassis associated input data personalize speech typing inking input typing inking data improve recognition allow apps use unique advertising id analytics advertising personalization functionality introduced windows 8.1 allow apps request user location data send data microsoft trusted partners improve location detection windows 8 similar settings except location data collection include trusted partners users opt data collection telemetry data error reporting usage also sent microsoft disabled non-enterprise versions windows 10 use cortana intelligent personal assistant also requires collection data device location data calendar apps use data emails text messages call contacts often interact device ” personalize functionality rock paper shotgun writer alec meer argued microsoft intent data collection lacked transparency stating world 45 pages policy documents opt-out settings split across 13 different settings screens external website constitutes 'real transparency extremetech pointed whilst previously campaigning google similar data collection strategies microsoft hoovers data ways would make google jealous however also pointed requirement vast usage customer data become norm citing increased reliance cloud computing forms external processing well similar data collection requirements services mobile devices google siri august 2015 russian politician nikolai levichev called windows 10 banned use russian government sends user data servers united states federal law requiring online services store data russian users servers within country blocked took effect september 2016 writing zdnet ed bott said lack complaints businesses privacy windows10 indicated utterly normal privacy terms 2015 computerworld editorial preston gralla said kind information windows10 gathers different operating systems gather microsoft held different standard companies microsoft services agreement reads company online services may automatically download software updates configuration changes including prevent accessing services playing counterfeit games using unauthorized hardware peripheral devices critics interpreted statement implying microsoft would scan delete unlicensed software installed devices running windows10 however others pointed agreement specifically microsoft online services microsoft account office 365 skype well xbox live offending passage likely referred digital rights management xbox consoles first-party games plans police pirated video games installed windows10 pcs despite torrent trackers announced plans block windows10 users also arguing operating system could send information anti-piracy groups affiliated microsoft writing allegations ed bott zdnet compared microsoft privacy policy apple google concluded carefully reading microsoft services agreement windows license agreement ... microsoft privacy statement carefully n't see anything looks remotely like big brother columnist kim komando argued microsoft might future run scans disable software hardware sees security threat consistent windows10 update policy following release 10 allegations also surfaced microsoft backported operating system increased data collection windows 7 windows 8 via recommended patches added additional telemetry features updates addition diagnostics tracking service connected specifically microsoft existing customer experience improvement program opt-in program sends additional diagnostic information microsoft addressing issues application insights service third-party software data collection functionality capable transmitting personal information browsing history contents emails chat video calls voice mail photos documents personal files keystrokes microsoft analysis accordance end user license agreement terms services agreement microsoft updated state following october 2017 dutch data protection authority issued complaint asserting windows10 privacy policies comply laws netherlands claims microsoft provide sufficient information information collected full telemetry level processed microsoft disputed claim provide enough disclosure full telemetry level stated working ddpa find appropriate solutions november 2016 kaspersky lab filed antitrust complaint russia regarding bundling windows defender operating system arguing microsoft abusing position favor in-house antivirus software vendors june 2017 kaspersky filed another complaint european commission accusing company frustrating use third-party antivirus software windows 10 defense inferior windows defender including forcibly uninstalling third-party antivirus software upgrades providing enough time antivirus developers certify software new upgrade windows 10 microsoft stated company engages deeply antimalware vendors taken number steps address feedback offered meet kaspersky executives discuss specific concerns june 21 2017 microsoft issued blog post confirming since creators update windows 10 may prompt users temporarily disable virus software upon installation feature update current version deemed compatible operating system would direct users relevant updates software following conclusion update microsoft stated worked vendors perform compatibility testing software update specify versions software compatible direct customers updating microsoft reported result efforts around 95 windows 10 users antivirus application installed already compatible windows 10 creators update microsoft clarified windows defender operates device security software installed security software reports subscription lapsed summer 2018 windows 10 insider update received extreme backlash planned feature would attempted prevent installation web browsers chrome firefox telling users already microsoft edge therefore need change browser | [
4293,
2550,
3958,
4687,
1097,
6110,
6839,
6136,
2961,
5781,
432,
5442,
4377,
5794,
444,
447,
448,
5452,
458,
4759,
7616,
1536,
7619,
2283,
5475,
5141,
3028,
134,
3395,
2329,
3048,
522,
3057,
6580,
7685,
183,
3076,
8054,
6256,
7715,
8073... | Test |
7,661 | 2 | Execute_Channel_Program:execute channel program ibm mainframe operating systems execute channel program excp supervisor call low-level device access programmer responsible providing channel program —a list device-specific commands ccws —to executed i/o channels control units devices excp specifically described os system programmer guide using excp legacy devices legacy datasets may operated relatively high performance excp devices opened made available application specifying macrf= e data control block dcb comprehensive list exits called excp context appendages allows authorized programs override augment many system security data integrity checks appendages really closed subroutines supported compatibility earlier instances os functions several modified extended mvs appendages specified dcb last two characters module name igg019xx xx wa z9 inclusive module names reserved installation-written appendages name form igg019xx reserved use ibm access methods appendages must reside sys1.svclib sys1.lpalib svs later instances os normally device opened excp first extent represented data extent block deb among information deb contains information location size extent data set deb forward- backward-chained dcb system security measure dcb resides unprotected user storage whereas deb resides protected system storage subpool 253 example programmer tries read past end extent exception occurs operation suppressed thereby preventing data integrity exposure deb include additional extents channel program may updated programmer refer next extent excp may reissued end extent exit appendage provided may update channel program next extent operation may re-driven without first going excp processor excp sometimes confused direct access storage device access method direct access storage devices exclusively rather general purpose low-level device access interface supports legacy device type legacy dataset organization accessing device types dataset organizations general start input/output interface startio available mvs/370 subsequent instances os although officially supported interface variation excp execute direct access program xdap used accessing direct access storage provided reading updating existing direct access storage records xdap used add records xdap utilized along bsam bpam effect record additions datasets several os components utilize xdap manner linkage editor iewl particular excp may also used access communications devices attached ibm 2701 2702 2703 communications controllers ibm 370x amdahl 470x front-end processors respective follow-ons operating emulator mode ep partitioned emulator mode pep excp front-end always tcb mode excp type 1 svc mvs/370 subsequent instances os excp processor invokes startio schedule execution channel program although excp processor back-end always srb mode back-end contains emulation code allows appendages developed earlier pre-mvs instances os specifically excp function largely thereby appear tcb mode appendages originally designed distinction complicate conversion certain roll-your-own access methods applications mvs | [
8159,
5105,
4494,
3278,
5571,
7264,
1851,
5852,
6213,
2596,
7024,
607,
5081,
3233,
7040,
4647,
7783
] | Test |
7,662 | 4 | Directory_traversal_attack:directory traversal attack directory traversal path traversal consists exploiting insufficient security validation sanitization user-supplied input file names characters representing traverse parent directory passed file apis goal attack use affected application gain unauthorized access file system attack exploits lack security software acting exactly supposed opposed exploiting bug code directory traversal also known codice_1 dot dot slash attack directory climbing backtracking forms attack also canonicalization attacks typical example vulnerable application php code attack system could send following http request generating server response repeated codice_1 characters codice_3 caused codice_4 traverse root directory include unix password file codice_5 unix codice_5 common file used demonstrate directory traversal often used crackers try cracking passwords however recent unix systems passwd file contain hashed passwords instead located shadow file read unprivileged users machine however still useful account enumeration machine still displays user accounts system listed known directory traversal attack strings common unix-like directory traversal uses codice_1 characters sudo privilege management program ubiquitous unix vulnerable attack users use glob wildcard e.g chown /opt/myapp/myconfig/* could exploited command sudo chown baduser /opt/myapp/myconfig/../../../etc/passwd microsoft windows dos directory traversal uses codice_8 codice_1 character sequences partition separate root directory labeled codice_10 particular partition c common root directory means directory vulnerabilities windows attack limited single partition kind attack cause numerous microsoft vulnerabilities canonicalization problem web applications scan query string dangerous characters prevent directory traversal however query string usually uri decoded use therefore applications vulnerable percent encoded directory traversal canonicalization problem utf-8 noted source vulnerabilities attack vectors bruce schneier jeffrey streifling microsoft added unicode support web server new way encoding codice_1 introduced code causing attempts directory traversal prevention circumvented multiple percent encodings translated codice_25 codice_26 characters percent encodings decoded corresponding 8-bit characters microsoft webserver historically correct behavior windows dos traditionally used canonical 8-bit characters sets based upon ascii however original utf-8 canonical several strings string encodings translatable string microsoft performed anti-traversal checks without utf-8 canonicalization therefore noticing hex codice_27 hex codice_28 character string comparisons malformed percent encodings codice_29 also utilized use archive formats like zip allows directory traversal attacks files archive written overwrite files filesystem backtracking code uncompresses archive files written check paths files archive engage path traversal possible algorithm preventing directory traversal would user use null character indicating end string order bypass everything _get php-specific | [
907,
3932,
6029,
3486,
2675,
4759,
1471,
7390,
7021,
2621,
4771
] | Train |
7,663 | 9 | ESC/P:esc/p esc/p short epson standard code printers sometimes styled escape/p printer control language developed epson control computer printers mainly used dot matrix printers inkjet printers still widely used many receipt printers era dot matrix printers also used manufacturers e.g. nec sometimes modified form time popular mechanism add formatting printed text widely supported software esc/p derives name start escape sequences used start escape character esc ascii code 27 example esc e switch printing bold font esc f switches bold printing esc/p control codes sometimes also referred epson lq codes made popular epson lq series dot matrix printers even though esc/p introduced long lq printers several variants esc/p printers implement commands 2014 modern printers use esc/p instead driven standardized page description language usually pcl postscript use proprietary protocols esc/page current epson impact printers still support esc/p epson stylus inkjets still seem using variant esc/p see gutenprint gimp print project source code examples | [
7172,
1975,
5822,
2815,
5480,
4780,
5370,
6016
] | Validation |
7,664 | 9 | Lego_Mindstorms_NXT:lego mindstorms nxt lego mindstorms nxt programmable robotics kit released lego late july 2006 replaced first-generation lego mindstorms kit called robotics invention system base kit ships two versions retail version set 8527 education base set set 9797 comes nxt-g programming software optionally labview lego mindstorms variety unofficial languages exist nxc nbc lejos nxj robotc second generation set lego mindstorms nxt 2.0 released august 1 2009 featuring color sensor upgraded capabilities third generation ev3 released september 2013 main component kit brick-shaped computer called nxt intelligent brick take input four sensors control three motors via modified version rj12 cables much similar incompatible rj11 phone cords plastic pin hold cable socket moved slightly right brick 100×60 pixel monochrome lcd four buttons used navigate user interface using hierarchical menus 32-bit arm7tdmi-core atmel at91sam7s256 microcontroller 256 kb flash memory 64 kb ram plus 8-bit atmel avr atmega48 microcontroller bluetooth support also speaker play sound files sampling rates 8 khz power supplied 6 aa 1.5 v batteries consumer version kit li-ion rechargeable battery charger educational version intelligent brick remains unchanged nxt 2.0 black version brick made celebrate 10th anniversary mindstorms system change internals lego released firmware nxt intelligent brick open source along schematics hardware components several developer kits available contain documentation nxt simple programs created using menu nxt intelligent brick complicated programs sound files downloaded using usb port wirelessly using bluetooth files also copied two nxt bricks wirelessly mobile phones used remote control three nxt bricks communicate simultaneously via bluetooth user created programs run retail version kit includes software writing programs run windows mac os personal computers software based national instruments labview provides visual programming language writing simple programs downloading nxt brick means rather requiring users write lines code instead use flowchart like blocks design program nxt-g v2.0 graphical programming environment comes bundled nxt careful construction blocks wires encapsulate complexity nxt-g used real-world programming parallel sequence beams actually parallel threads software quite good running handful parallel sense/respond loops example wait 60 seconds play bonk sound low volume battery low loop blending autonomous control bluetooth remote control language supports virtual instruments lego branded 3rd party sensors/components version 2.0 contains new tutorial challenges remote control custom graphics sound designers new lego color sensor support community support significant example http //www.brickshelf.com/cgi-bin/gallery.cgi f=191310 free tools visual studio express combination robotics developer studio enable programming nxt using c language supported languages include ironpython vb.net bricx command center bricxcc integrated development environment ide used write compile edit nbc nxc programs nxt also bricxcc originally made rcx programs written using nqc via bricxcc different firmware versions flashed nxt using bricxcc bricxcc many utilities nextexplorer upload/download files defragment nxt use file hex viewer nextscreen view nxt lcd capture images video next byte codes nbc simple open source language assembly language syntax used program nxt brick bricxcc also capability decompile standard .rxe nxt executables nbc exactly c nxc high level open-source language similar c built nbc compiler also used program nxt brick nxc basically nqc nxt one widely used third-party programming languages nxt nxc even creating video games nxt possible people even got working grayscale nxt screen robolab 2.9 robolab newer programming environment originally used rcx programmable brick version 2.9 updated used program nxt brick lego announced stop officially supporting robolab robolab 2.9 still available still many user forums sources help available robomind educational software specially developed teach students logic programming robotics strength robomind compactness learning environment allows quickly develop test scripts virtual environment scripts directly transferred lego mindstorms nxt robot see result real life robomind script run standard firmware enchanting brings nxt programming popular scratch ide designed lifelong kindergarten group mit make programming intuitive even young children resulting nxt programs compactness clarity offered programming environment robotc programming-language based c vex vex cortex first tech challenge lego mindstorms robotc runs optimized firmware allows nxt run programs quickly also compresses files large number programs fit nxt like nxt languages robotc requires firmware downloaded robotc interface order run nxtgcc gcc toolchain programming nxt firmware c. lejos nxj high level open source language based java uses custom firmware developed lejos team able write c/c++ nxtosek used requires custom firmware write files nxt icon steve hassenplug ideal resource matlab simulink support lego mindstorms programming freely available information found lego mindstorms support matlab simulink pblua port lua programming language general purpose scripting language lego mindstorms port gnat available nxt relies dedicated run-time kernel based ravenscar profile used goce satellite permits use high-level ada features develop concurrent real-time systems mindstorms nxt urbi yet another language parallel event-driven language interfaces c++/java matlab also component architecture uobject distribution urbi compatible many robots including nao cf robocup bioloid aibo fll nxt navigation open source program help navigation fll competition table uses nxt-g .txt files write programs unknown legally implement fll competitions ruby-nxt library program nxt ruby programming language unlike languages nxt code compiled binary file instead code directly transmitted nxt via bluetooth connection robotics.nxt haskell interface nxt bluetooth supports direct commands messages many sensors also unofficial also support simple message-based control nxt brick via remotely executed program basic nxc code included libnxt utility library talking lego mindstorms nxt intelligent brick relatively low level libnxt targeted mainly platforms official lego mindstorms nxt software overlooks namely linux unices work posix-compliant operating system libusb 0.1 http //libusb.sf.net/ supported windows support also possible win32 port libusb c_nxt library controlling lego nxt licensed gplv2 library allows users control lego nxt via bluetooth controller within c programs library provides low level control high level abstraction library runs gnu+linux pynxc project converts python code exactly c nxc code download lego mindstorms robots nxt-python python module communicates nxt via usb bluetooth supports direct commands several aftermarket sensors software ships newer mindstorms ev3 set used program nxt moment bluetooth supported nxt programs must downloaded via usb cable physical etoys visual programming system different electronic devices supports direct mode compiled mode ch c/c++ interpreter running c/c++ code control lego nxt ev3 firmware upload/download required compilation needed c/c++ code running ch control either lego nxt ev3 multiple nxt/ev3 lego mindstorms nxt 1.0 base kit includes parts included lego mindstorms nxt base kit may bought separately sensors come assembled programmed software see programming people decide information comes sensors programming robot move forward touches something lego also sells adapter vernier sensor product line vernier produces data collection devices related software use education sensors connected nxt brick using 6-position modular connector features analog digital interfaces analog interface backward-compatible using adapter older robotics invention system digital interface capable ic rs-485 communication lego mindstorms nxt 2.0 second set lego lego mindstorms series launched august 5 2009 lego shop u.s set contains 619 pieces including new sensor detect colors priced approximately us 280 c 350 £230 500 lego mindstorms nxt 2.0 successor called lego mindstorms ev3 parts ordered separately original kit sensors included color sensor two touch sensors ultrasonic sensor simple programs created using nxt intelligent brick order create larger complex programs programming software pc required standard programming software nxt-g included package third-party programming software also available listed nxt-g programming software included standard base kit based labview graphical programming features interactive drag-and-drop environment nxt-g powered labview industry standard programming created national instruments labview uses data flow programming create virtual instrument allow advanced programming graphical sense national instruments released toolkit nxt version 1.0 came december 2006 since release several bugs found new sensors created toolkit allow creation new sensors national instruments yet formally release update lego :nxt provides api perl nxt port gnat available nxt requires nxtosek run port includes ada bindings nxt hardware nxtosek next byte codes nbc simple open-source language assembly language syntax used program nxt brick exactly c nxc high level open-source language similar c built top nbc compiler also used program nxt brick nxc basically nqc nxt widely used third-party programming language robotc integrated development environment targeted towards students used program control lego nxt vex rcx arduino robots using programming language based c programming language robomind educational programming environment offers concise scripting language programming simulated robot internationalized scripts however also directly exported lego mindstorms robots require custom firmware order run nxtgcc gcc toolchain programming nxt firmware c. urbi parallel event-driven language interfaces c++/java matlab also component architecture uobject distributed computation urbi compatible many robots including nao cf robocup bioloid aibo lejos nxj high level open source language based java uses custom firmware developed lejos team able write c programming language /c++ nxtosek used requires custom firmware matlab simulink code nxt programming freely available pblua implementation lua programming language general purpose scripting language lego mindstorms fll nxt navigation open source program help navigation fll competition table uses nxt-g .txt files write programs ruby-nxt library program nxt ruby programming language unlike languages nxt code n't compiled binary file instead code directly transmitted nxt via bluetooth connection method execution significantly slower executing compiled code directly robotics.nxt haskell interface nxt bluetooth supports direct commands messages many sensors also unofficial also support simple message-based control nxt brick via remotely executed program basic nxc code included | [
1908,
5983,
4763,
6428,
5117,
4044,
1361,
2740,
304,
1435,
6928,
154,
336,
248,
6851,
5965,
5529,
1336
] | Test |
7,665 | 0 | WaveSurfer:wavesurfer wavesurfer audio editor widely used studies acoustic phonetics simple fairly powerful program interactive display sound pressure waveforms spectral sections spectrograms pitch tracks transcriptions read write number transcription file formats used industrial speech research including timit wavesurfer free software distributed permissive free software licence wavesurfer provides basic audio editing operations excision copying pasting zero-crossing adjustment effects fading normalization echo inversion reversal replacement silence dc-removal view scientific orientation offer effects interest musicians flange wavesurfer written tcl/tk using snack audio library therefore runs platforms including microsoft windows mac os x linux solaris hp-ux freebsd irix scriptable supports plugins | [
4633,
3915,
4759,
5571,
578,
900
] | Train |
7,666 | 3 | Dynamic_frequency_scaling:dynamic frequency scaling dynamic frequency scaling also known cpu throttling technique computer architecture whereby frequency microprocessor automatically adjusted fly depending actual needs conserve power reduce amount heat generated chip dynamic frequency scaling helps preserve battery mobile devices decrease cooling cost noise quiet computing settings useful security measure overheated systems e.g poor overclocking dynamic frequency scaling used ranges computing systems ranging mobile systems data centers reduce power times low workload dynamic power switching power dissipated per unit time chip c·v·a·f c capacitance switched per clock cycle v voltage activity factor indicating average number switching events undergone transistors chip unit-less quantity f switching frequency voltage therefore main determinant power usage heating voltage required stable operation determined frequency circuit clocked reduced frequency also reduced dynamic power alone account total power chip however also static power primarily various leakage currents due static power consumption asymptotic execution time shown energy consumption piece software shows convex energy behavior i.e. exists optimal cpu frequency energy consumption minimal leakage current become important transistor sizes become smaller threshold voltage levels lower decade ago dynamic power accounted approximately two-thirds total chip power power loss due leakage currents contemporary cpus socs tend dominate total power consumption attempt control leakage power high-k metal-gates power gating common methods dynamic voltage scaling another related power conservation technique often used conjunction frequency scaling frequency chip may run related operating voltage efficiency electrical components voltage regulators decreases increasing temperature power usage may increase temperature since increasing power use may increase temperature increases voltage frequency may increase system power demands even cmos formula indicates vice versa dynamic frequency scaling reduces number instructions processor issue given amount time thus reducing performance hence generally used workload cpu-bound dynamic frequency scaling rarely worthwhile way conserve switching power saving highest possible amount power requires dynamic voltage scaling v component fact modern cpus strongly optimized low power idle states constant-voltage cases efficient run briefly peak speed stay deep idle state longer time called race idle computational sprinting run reduced clock rate long time stay briefly light idle state however reducing voltage along clock rate change trade-offs related-but-opposite technique overclocking whereby processor performance increased ramping processor dynamic frequency beyond manufacturer design specifications one major difference two modern pc systems overclocking mostly done front side bus mainly multiplier normally locked dynamic frequency scaling done multiplier moreover overclocking often static dynamic frequency scaling always dynamic software often incorporate overclocked frequencies frequency scaling algorithm chip degradation risks allowable intel cpu throttling technology speedstep used mobile desktop cpu lines amd employs two different cpu throttling technologies amd cool n'quiet technology used desktop server processor lines aim cool n'quiet save battery life used amd mobile processor line instead purpose producing less heat turn allows system fan spin slower speeds resulting cooler quieter operation hence name technology amd powernow cpu throttling technology used mobile processor line though supporting cpus like amd k6-2+ found desktops well via technologies processors use technology named longhaul powersaver transmeta version called longrun 36-processor asap 1 chip among first multi-core processor chips support completely unconstrained clock operation requiring frequencies maximum allowed including arbitrary changes frequency starts stops 167-processor asap 2 chip first multi-core processor chip enables individual processors make fully unconstrained changes clock frequencies according acpi specs c0 working state modern-day cpu divided so-called p -states performance states allow clock rate reduction -states throttling states throttle cpu actual clock rate inserting stpclk stop clock signals thus omitting duty cycles amd powertune amd zerocore power dynamic frequency scaling technologies gpus power saving technologies performance boosting technologies | [
5012,
364,
3942,
1447,
5371,
3948,
7527,
6427,
7529,
5737,
2567,
4694,
5042,
1481,
5055,
2226,
1867,
2248,
6148,
441,
2266,
4047,
5483,
3015,
1556,
5487,
6198,
1568,
1570,
7280,
6922,
515,
8024,
5521,
3063,
3747,
1237,
6236,
534,
7314,
... | Test |
7,667 | 2 | Util-linux:util-linux util-linux standard package distributed linux kernel organization use part linux operating system fork util-linux-ng—with ng meaning next generation —was created development stalled renamed back util-linux official version package includes following utilities utilities formerly included removed | [
361,
362,
6789,
2817,
1630,
1537,
5815,
5480,
3106,
5571,
578,
923,
5138,
667,
2589,
5946,
6231,
7498,
1793,
3417,
3587,
5789,
1798,
3591,
6404,
4283,
1435,
4020
] | Test |
7,668 | 3 | MOS_Technology_6507:mos technology 6507 6507 8-bit microprocessor mos technology inc version 6502 packaged 28-pin dip makes cheaper package integrate systems reduction pin count achieved reducing address bus 16 bits 13 limiting memory 64 kb 8 kb removing number pins needed certain applications a15 a13 signals interrupt lines accessible result address 8 kb memory applications time 1975 acceptable overly restrictive entire 65xx cpu family originally conceived line low-cost microprocessors small-scale embedded systems general-purpose computers certainly interactive personal computers generally exist yet 6507 6502 chips use underlying silicon layers differ final metallisation layer ties interrupt lines inactive level vulnerable generating spurious interrupts noise first three digits chip identifier part silicon layers final digit metallisation layer micro-photography 6502 6507 shows difference 6507 widely used two applications best-selling atari 2600 video game console atari 8-bit family peripherals including 850 serial parallel interface floppy disk controllers 810 1050 disk drives 2600 system limited design rom cartridge slot allowed 4 kb external memory addressed 4 kb reserved internal ram i/o chips using minimal-cost partial decoding technique causes ram peripheral device registers mirrored throughout 4 kb machines notably home computers based 650x architecture used either standard 6502 extended rather cut versions order allow memory time 6502 line becoming widely used around 1980 rom ram semiconductor memory prices fallen point 6507 longer worthwhile simplification use new designs ceased point though atari 2600 contained continued sold early 1990s discontinued january 1 1992 however late-model atari 2600 consoles redesigned highly-integrated 2600 jr units necessarily contain separate 6507 chip might integrated cpu custom asic 6507 uses 28-pin configuration 13 address pins 8 data pins seven remaining pins used power cpu timing clock reset cpu request bus wait states rdy pin read/write commands memory mmio devices cpu irq nmi pin processor rdy pin included 28-pin cut-down versions 6502 within atari 2600 rdy used synchronise cpu television video frame function essential 'racing beam method used 6502 atari television interface adaptor chip generate television video signal response specific register access tia assert rdy extend bus cycle end current video scan line | [
7960,
7519,
468,
7531,
5296,
7730,
1670,
2237,
4532,
7222,
1237,
3918,
5087,
1150
] | Test |
7,669 | 2 | Free_and_open-source_graphics_device_driver:free open-source graphics device driver free open-source graphics device driver software stack controls computer-graphics hardware supports graphics-rendering application programming interfaces apis released free open-source software license graphics device drivers written specific hardware work within specific operating system kernel support range apis used applications access graphics hardware may also control output display display driver part graphics hardware free open-source graphics device drivers developed mesa project driver made compiler rendering api software manages access graphics hardware drivers without freely legally -available source code commonly known binary drivers binary drivers used context operating systems prone ongoing development change linux create problems end users package maintainers problems affect system stability security performance main reason independent development free open-source drivers technical documentation available understanding underlying hardware often gained clean-room reverse engineering based understanding device drivers may written legally published software license rare cases manufacturer driver source code available internet without free license means code studied altered personal use altered usually original source code freely distributed solutions bugs driver easily shared form modified versions driver therefore utility drivers significantly reduced comparison free open-source drivers objections binary-only drivers based copyright security reliability development concerns part wider campaign binary blobs openbsd lead developer theo de raadt said binary driver way fix breaks break product relies binary drivers declared end-of-life manufacturer effectively broken forever project also stated binary drivers hide bugs workarounds bugs observation somewhat vindicated flaws found binary drivers including exploitable bug nvidia 3d drivers discovered october 2006 rapid7 speculated bug existed since 2004 nvidia denied asserting issue communicated july 2006 2004 bug bug x.org nvidia driver binary drivers often work current versions open-source software almost never support development snapshots open-source software usually directly possible developer use nvidia ati proprietary drivers development snapshot x server development snapshot linux kernel features like kernel mode-setting added binary drivers anyone vendors prevents inclusion vendor lacks capacity interest linux kernel development community linus torvalds made strong statements issue binary-only modules refuse even consider tying hands binary-only module ... want people know use binary-only modules problem another kernel developer greg kroah-hartman said binary-only kernel module comply kernel license gnu general public license violates gpl due fun things like derivative works linking stuff writer computer scientist peter gutmann expressed concern digital rights management scheme microsoft windows vista operating system may limit availability documentation required write open drivers since requires operational details device kept confidential case binary drivers objections due free software philosophy software quality security concerns 2006 greg kroah-hartman concluded closed source linux kernel modules illegal simple 've misfortune talking lot different ip lawyers years topic every one 've talked agree way anyone create linux kernel module today closed source violates gpl due fun things like derivative works linking linux kernel never maintained stable in-kernel application binary interface also concerns proprietary drivers may contain backdoors like one found samsung galaxy-series modem drivers applications 3d game engine 3d computer graphics software shunt calculations cpu gpu usually use special-purpose api like opengl direct3d address hardware directly translation api calls gpu opcodes done device driver contains specialized knowledge object optimization due history rigidity proprietary driver development recent surge number community-backed device drivers desktop mobile gpus free open hardware organizations like fossi lowrisc others would also benefit development open graphical hardware standard would provide computer manufacturers hobbyists like complete royalty-free platform develop computing hardware related devices desktop computer market long dominated pc hardware using x86/x86-64 instruction set gpus available pc three major competitors nvidia amd intel main competing factor price hardware raw performance 3d computer games greatly affected efficient translation api calls gpu opcodes display driver video decoder inherent parts graphics card hardware designed assist calculations necessary decoding video streams market pc hardware dwindled seems unlikely new competitors enter market unclear much knowledge one company could gain seeing source code companies drivers mobile sector presents different situation functional blocks application-specific integrated circuit display driver 2- 3d acceleration video decoding encoding separate semiconductor intellectual property sip blocks chip since hardware devices vary substantially portable media players require display driver accelerates video decoding require 3d acceleration development goal raw 3d performance system integration power consumption 2d capabilities also approach abandons traditional method vsync updating display makes better use sample hold technology lower power consumption second quarter 2013 79.3 percent smartphones sold worldwide running version android linux kernel dominates smartphones hardware developers incentive deliver linux drivers hardware due competition incentive make drivers free open-source additional problems android-specific augmentations linux kernel accepted mainline atomic display framework adf adf feature 3.10 aosp kernels provides dma-buf-centric framework android hwcomposer hal kernel driver adf significantly overlaps drm-kms framework adf accepted mainline different set solutions addressing problems known atomic mode setting development projects libhybris harness android device drivers run linux platforms android phoronix compares free drivers source real-world testing uncommon video-game magazines report benchmark testing linux benchmarks phoronix limited scope primarily testing games available linux support automated benchmarking free open-source drivers primarily developed linux linux kernel developers third-party programming enthusiasts employees companies advanced micro devices driver five parts drm kernel-specific vesa driver generally available operating system vesa driver supports graphics cards without acceleration display resolutions limited set programmed video bios manufacturer linux graphics stack evolved detoured x window system core protocol amd proprietary driver amd catalyst radeon available microsoft windows linux formerly fglrx current version downloaded amd site linux distributions contain repositories process replaced amdgpu-pro hybrid driver combining open-source kernel x mesa multimedia drivers closed-source opengl opencl vulkan drivers derived catalyst foss drivers ati-amd gpus developed name radeon xf86-video-ati xserver-xorg-video-radeon still must load proprietary microcode gpu enable hardware acceleration radeon 3d code split six drivers according gpu technology radeon r200 r300 classic drivers r300g r600g radeonsi gallium3d drivers up-to-date feature matrix available support video coding engine unified video decoder free open-source radeon graphics device drivers reverse-engineered based documentation released amd without requirement sign non-disclosure agreement nda documentation began gradually released 2007 contrast amd main competitor graphics field nvidia proprietary driver similar amd catalyst provides support free-graphics initiatives addition providing necessary documentation amd employees contribute code support hardware features 2014 game developers conference company announced exploring strategy change re-base user-space part catalyst free open-source drm kernel module instead proprietary kernel blob components radeon graphics device driver developed core contributors interested parties worldwide 2011 r300g outperformed catalyst cases release amdgpu stack announced dri-devel mailing list april 2015 although amdgpu officially supports gcn 1.2 later graphics cards experimental support gcn 1.0 1.1 graphics cards officially supported radeon driver may enabled via kernel parameter separate libdrm libdrm-amdgpu included since libdrm 2.4.63 nvidia proprietary driver nvidia geforce driver geforce available windows xp x86-x86-64 later linux x86-x86-64-armv7-a os x 10.5 later solaris x86-x86-64 freebsd x86/x86-64 current version downloaded internet linux distributions contain repositories beta nvidia geforce driver 331.13 supports egl interface enabling support wayland conjunction driver nvidia free open-source driver named nv limited supporting 2d acceleration matthew garrett dirk hohndel others called source code confusing nvidia decided deprecate nv adding support fermi later gpus displayport march 2010 december 2009 nvidia announced would support free graphics initiatives company announced would release documentation gpus nouveau based almost entirely information gained reverse engineering project aims produce 3d acceleration x.org/wayland using gallium3d march 26 2012 nouveau drm component marked stable promoted staging area linux kernel nouveau supports tesla- earlier fermi- kepler- maxwell-based gpus nvidia employee alexandre courbot committed extensive patch set adds initial support gk20a tegra k1 nouveau june 2014 codethink reportedly ran wayland-based weston compositor linux kernel 3.15 using egl 100 open-source graphics driver stack tegra k1 feature matrix available july 2014 nouveau unable outperform nvidia geforce driver due missing re-clocking support tegra-re project working reverse-engineer nvidia vliw-based tegra series gpus predate tegra k1 nvidia distributes proprietary device drivers tegra oems part linux tegra formerly l4t development kit nvidia partner avionic design working submitting grate free open-source drivers tegra upstream mainline linux kernel april 2012 company co-founder ceo laid tegra processor roadmap ubuntu unity 2013 gpu technology conference nvidia unified memory driver nvidia-uvm.ko implements memory management pascal volta gpus linux mit licensed source code available nvidia linux driver downloads systems support nvidia-uvm.ko intel history producing commissioning open-source drivers graphics chips exception powervr-based chips 2d x.org driver called xf86-video-intel kernel mode-setting driver linux kernel use video bios switching video modes since bioses limited range modes provides reliable access supported intel video cards company worked optimizing free linux drivers performance approaching windows counterparts especially sandy bridge newer hardware performance optimizations allowed intel driver outperform proprietary windows drivers certain tasks 2011 performance enhancements may also benefit users older hardware support intel llc last level cache l4-cache crystalwell iris pro added linux kernel 3.12 company 20 30 full-time linux graphics developers matrox develops manufactures matrox mystique parhelia g200 g400 g550 although company provides free open-source drivers chipsets older g550 chipsets newer g550 supported closed-source driver s3 graphics develops s3 trio virge savage chrome supported openchrome arm holdings fabless semiconductor company licenses semiconductor intellectual property cores although known licensing arm instruction set cpus based also develop license mali series gpus january 21 2012 phoronix reported luc verhaegen driving reverse-engineering attempt aimed arm holdings mali series gpus specifically mali-200 mali-400 versions reverse-engineering project known lima presented fosdem february 4 2012 february 2 2013 verhaegen demonstrated quake iii arena timedemo mode running top lima driver may 2018 lima developer posted driver inclusion linux kernel arm indicated intention providing support graphics acceleration hardware licensed free open-source license however arm employees sent patches linux kernel support arm hdlcd display controller mali dp500 dp550 dp650 sip blocks december 2015 april 2016 imagination technologies fabless semiconductor company develops licenses semiconductor intellectual property cores among powervr gpus intel manufactured number powervr-based gpus powervr gpus widely used mobile socs company provide foss driver public documentation powervr due wide use embedded devices free software foundation put reverse-engineering powervr driver high-priority project list vivante corporation fabless semiconductor company licenses semiconductor intellectual property cores develops gcxxxx series gpus vivante proprietary closed-source linux driver consists kernel- user-space parts although kernel component open-source gpl user-space components—consisting gles 2 implementations hal library—are contain bulk driver logic wladimir j. van der laan found documented state bits command stream shader isa studying blobs work examining manipulating command-stream dumps etnaviv gallium3d driver written based documentation van der laan work inspired lima driver project produced functional-but-unoptimized gallium3d llvm driver etnaviv driver performed better vivante proprietary code benchmarks supports vivante gc400 gc800 gc1000 gc2000 gc3000 series january 2017 etnaviv added mesa opengl es 2.0 desktop opengl 2.0 support qualcomm develops adreno formerly ati imageon gpu series includes part snapdragon system phoronix slashdot reported 2012 rob clark inspired lima driver working reverse-engineering drivers adreno gpu series referenced blog post clark wrote project spare time qualcomm platform viable target working open 3d graphics employers texas instruments linaro affiliated imagination powervr arm mali cores would primary targets working command streams 2d support 3d commands seemed characteristics driver code published gitorious freedreno moved mesa 2012 working shader assembler completed demonstration versions developed texture mapping phong shading using reverse-engineered shader compiler clark demonstrated freedreno running desktop compositing xbmc media player quake iii arena fosdem february 2 2013 august 2013 kernel component freedreno msm driver accepted mainline available linux kernel 3.12 later ddx driver gained support server-managed file descriptors requiring x.org server version 1.16 july 2014 january 2016 mesa gallium3d-style driver gained support adreno 430 november year driver added support adreno 500 series freedreno used devices 96boards dragonboard 410c nexus 7 2013 traditional linux distributions like debian fedora android broadcom develops designs videocore gpu series part socs since used raspberry pi considerable interest foss driver videocore raspberry pi foundation co-operation broadcom announced october 24 2012 open-sourced arm cpu code drives gpu however announcement misleading according author reverse-engineered lima driver newly open-sourced components allowed message-passing arm cpu videocore offered little insight videocore little additional programability videocore gpu runs rtos handles processing video acceleration done rtos firmware coded proprietary gpu firmware open-sourced date since neither toolchain targeting proprietary gpu documented instruction set advantage could taken firmware source code became available videocoreiv project attempted document videocore gpus february 28 2014 raspberry pi second anniversary broadcom raspberry pi foundation announced release full documentation videocore iv graphics core complete source release graphics stack 3-clause bsd license free-license 3d graphics code committed mesa 29 august 2014 first appeared mesa 10.3 release although silicon integrated systems via technologies expressed limited interest open-source drivers released source code integrated x.org foss developers july 2008 via opened documentation products improve image linux open-source communities company failed work open-source community provide documentation working drm driver leaving expectations linux support unfulfilled january 6 2011 announced via longer interested supporting free graphics initiatives displaylink announced open-source project libdlo goal bringing support usb graphics technology linux platforms code available lgpl license integrated x.org driver displaylink graphics support available kernel udlfb driver fbdev mainline udl/drm driver march 2012 available drm-next tree non-hardware-related vendors may also assist free graphics initiatives red hat two full-time employees david airlie jérôme glisse working radeon software fedora project sponsors fedora graphics test week event launch new linux distribution versions test free graphics drivers companies provided development support include novell vmware project vga aims create low-budget open-source vga-compatible video card open graphics project aims create open-hardware gpu open graphics device v1 dual dvi-i outputs 100-pin idc connector september 2010 first 25 ogd1 boards made available grant application purchase milkymist system chip targeted embedded graphics instead desktop computers supports vga output limited vertex shader 2d texturing unit nyuzi experimental gpgpu processor includes synthesizable hardware design written system verilog instruction set emulator llvm-based c-c++ compiler software libraries tests explores parallel software hardware run terasic de2-115 field-programmable gate array board project uses fpgas generally partially completely closed-source toolchain currently couple open-source toolchains available however lattice-based fpgas notably ice40 ecp5 boards utilize project icestorm trellis respectively also larger ongoing effort create gcc fpgas called symbiflow includes aforementioned fpga toolchains well early-stage open-source toolchain xilinx-based fpgas | [
3256,
4295,
2182,
4662,
6793,
7159,
6428,
3955,
7532,
5744,
3632,
5047,
7912,
740,
4705,
2942,
6117,
4341,
2585,
3981,
1864,
5762,
412,
753,
7201,
415,
1128,
7581,
3666,
6489,
74,
1139,
2970,
4012,
7956,
6874,
4759,
5460,
7242,
1924,
68... | Validation |
7,670 | 3 | IBM_ThinkPad_770:ibm thinkpad 770 ibm thinkpad 770 laptop designed manufactured ibm targeted business enterprise professional user last lineup thinkpad 700-series succeeding 760 high-end laptop thinkpad lineup line produced october 1997 october 1999 eventually replaced thinkpad models 390x 600x first 770s shipped either windows nt4 95 later shipped 98 pre-installed equipped ibm ultrabay ii allowing option either cd-rom floppy drive one notable feature thinkpad 770 first thinkpad available dvd-rom option addition usb port ac-3 support first 770s featured intel pentium processor running 233 mhz optional 266 mhz upgrade later models introduced intel pentium ii mobile processor 770s use certain processor socket many success installing much powerful processors generating 850 mhz although models run 1024x768 resolution later models capable 1280x1024 resolution use trident cyber 9397 graphics chips 2mb memory 770 4mb memory 770e/770ed | [
818,
2342,
6169,
6170
] | Test |
7,671 | 2 | CocoaPods:cocoapods cocoapods application level dependency manager objective-c swift languages run objective-c runtime rubymotion provides standard format managing external libraries developed eloy durán fabio pelosin continue manage project help contributions many others began development august 2011 made first public release september 1 2011 cocoapods strongly inspired combination ruby projects rubygems bundler cocoapods focuses source-based distribution third party code automatic integration xcode projects cocoapods runs command line also integrated jetbrains appcode integrated development environment installs dependencies e.g libraries application specification dependencies rather manual copying source files besides installing many different sources “ master ” spec repository—containing metadata many open-source libraries—is maintained git repository hosted github cocoapods dependency resolution system powered molinillo also used large project bundler rubygems berkshelf following podfile example installs afnetworking cocoalumberjack libraries | [
1532,
5369,
1260,
6428,
2300,
397,
3021,
4151,
1287,
3879,
3889,
3559,
952,
1989,
5091
] | Test |
7,672 | 3 | ERC32:erc32 erc32 radiation-tolerant 32-bit risc processor sparc v7 specification developed space applications developed temic acquired atmel microchip obsolete new designs used dms-r data management system russian computer russian orbital segment handles guidance navigation control onboard systems subsystems control entire iss critical tasks two versions manufactured support chip set version erc32 discontinued | [
1237,
971,
5936,
4336
] | Test |
7,673 | 2 | Sound_Manager:sound manager sound manager part classic apple macintosh operating system classic mac os used control production manipulation sounds macintosh computers sound manager also used parts macintosh system software produce sounds speech manager quicktime replaced core audio mac os x | [
405,
2067,
5571
] | Test |
7,674 | 4 | Microprinting:microprinting microprinting production recognizable patterns characters printed medium scale requires magnification read naked eye unaided eye text may appear solid line attempts reproduce methods photocopy image scanning pantograph typically translate dotted solid line unless reproduction method identify recreate patterns scale microprint predominantly used anti-counterfeiting technique due inability easily reproduced digital methods microphotography precedes microprint microprint significantly influenced albert boni 1934 inspired friend writer editor manuel komroff showing experimentations related enlarging photographs occurred boni could reduce rather enlarge photographs technology might enable publication companies libraries access much greater quantities data minimum cost material storage space following decade boni worked develop microprint micro-opaque process pages photographed using 35mm microfilm printed cards using offset lithography process proved produce 6 9 index card stored 100 pages text normal sized publications reproducing boni began readex microprint company produce license technology also published article guide literature photography related subjects 1943 appeared supplemental 18th issue photo-lab index currency commonly exhibits highest quality smallest size microprint demands highest level counterfeiting deterrence example series 2004 united states 20 bill microprint hidden within border lower left corner obverse front side well twenty usa background bank cheques well various items value may also commonly leverage microprinting methods generally extreme size example personal bank cheques commonly place characters mp next signature line check characters represent microprint indicate signature line check features actually microprinted characters microprinted characters used anti-counterfeiting feature due difficulty reproduced prominent mp serves overt deterrent warning item employs microprint microprinting scales may readable human eye without microscopy differentiation microprinting different scales first us postage stamp incorporate microprinting american wildflower series introduced united states postal service 1992 also first commemorative stamp wholly produced offset lithography usps since issued stamps complex microprinting incorporated along dates words abbreviations usps even entire stamp designs composed microprint letters microprint smallest scale producible hand using engraved offset printing plates method intaglio printmaking digital microtext printers utilize specially designed fonts ink purpose ink used commonly micr magnetic ink character recognition toner particles may also polyester based toners styrene acrylate polymer based toners ink limited grayscale may also use color toners even specialized toners containing dyes sensitive ultraviolet infrared radiation producing fluorescence exposed radiations microprint scale capable printing methods produced digital printer regardless resolution device digital fonts designed specifically purpose microprinting pseudo-microprint fonts referred microtext xerox acclaimed developing microtext font claimed could produce characters 1/100th inch tall 1/100th inch equivalent 0.7227 points april 2015 videojet technologies released 1650 high resolution hr 1620 hr continuous inkjet cir printers said capable printing sub-pixel size characters small 0.6mm height equivalent 1.7007 points printers use 40-micron nozzle outputs 100,000 drops per second ink printers make microprinting faster easier produce digitally still reached true sub-pixel size less 1 point smallest scale microtext laser printer produce 0.5pt using gold nanoparticle inks glass substrate scientists concluded possible control production print patterns scale 2 microns printing nano-particle ink suspension heated using gaussian laser heated glass would expand due thermal conductivity gold nano-ink experiments able fuse nano-particles together tighter formation continuous conductive line experiments directly include font characters could translate usage | [
7674,
7846
] | Test |
7,675 | 9 | CMUcam:cmucam cmucam low cost computer vision device intended robotics research cmucams consist small video camera microcontroller serial interface digital cameras typically use much higher bandwidth connector cmucam lightweight interface allows accessed microcontrollers importantly on-board microprocessor supports simple image processing color blob tracking making rudimentary computer vision capable systems would previously far little power thing used past years high-school first robotics competition way letting participants robots track field elements navigate autonomously cmucam also extremely small form factor reasons relatively popular making small mobile robots original design originally made carnegie mellon university licensed various manufacturers pixy2 latest line cmucam sensors adds line tracking capability onboard light source previous cmucam5 aka original pixy sensors produced collaboration charmed labs austin tx | [] | Validation |
7,676 | 5 | Spotnet:spotnet spotnet protocol top usenet providing decentralized alternative usenet indexing websites nzb format general spotnet allows users create browse private 'newsservers decentralized repositories files information members share spots file sharing one another similar seeding process torrent sharing spotnet experienced tremendous growth since closure 2011 uses spotnet usenet varied one common creation home media servers several third-party applications allow automatic download categorization spots typically movies tv shows music files assist creation maintenance stored media spotnet articles placed textgroup headered using usenet client order get full experience need client compatible protocol example besides searching clients also functionality commenting spots well adding new ones index clients implement protocol without community-features spotnet xml-based format placed header usenet articles rsa signed xml contains metadata post group articles usually found .nfo file like description/genre/format also references accompanying image zipped nzb file elsewhere usenet message-id article serve link full post similar magnet uri indirectly references required articles links spread media like twitter without need central server hosting full specification protocol see spotnet wiki spotnet uses four usenet groups | [
2281,
2379
] | Test |
7,677 | 9 | Indexer_(programming):indexer programming object-oriented programming indexer allows instances particular class struct indexed like arrays form operator overloading indexers implemented get set accessors similar properties differ static fact indexers accessors take parameters get set accessors called methods using parameter list indexer declaration set accessor still implicit parameter c example usage indexer class | [
8106
] | Test |
7,678 | 9 | Warren_Teitelman:warren teitelman warren teitelman 1941 – august 12 2013 american computer scientist known work programming environments invention first implementation concepts including undo redo spelling correction advising online help dwim mean warren teitelman presented novel scheme real time character recognition master thesis submitted 1966 mit rectangle character drawn divided two parts one shaded unshaded using division computer converts characters ternary vectors list composed 3 values 0 1 − following way pen enters shaded region 1 added vector unshaded region entered 0 appended thesis continued cited several decades submission started arpa principal investigator 1968 1978 responsible design development bbn lisp bolt beranek newman developing idea programming system personal computer used arpanet support users bbn lisp stanford sri usc cmu 1970 named official arpanet pioneer contributions development growth developed programmer assistant part bbn-lisp one first undo function 1971 developed program sds 940 bob kahn allowed experimentation various routing policies order see effect network traffic real time monitoring packets worked senior scientist xerox parc 1972 1984 time designed interlisp bill joy acknowledged many ideas c shell inspired copied interlisp interlisp teitelman invented dwim mean function attempted correct many common typing errors package lisp routines would correct errors automatically minor user intervention —thus making code user meant wrote program developed based upon teitelman writing style idiosyncrasies 1972 used individuals office followed users across industry 1977 bob sproull implemented first client–server window system d-lisp d-lisp used alto display device ran window manager event handler communicating interlisp running maxc pdp-10 clone system pioneered concepts overlapping windows window containing focus top receive events on-line contextual help ability cut copy paste previous commands given shell joined cedar project 1980 research strongly typed languages make sure cedar programming environment benefited lessons interlisp paper “ tour cedar ” widely published quoted even translated several languages eponymous teitelman principle says person requests feature added program add feature find way make easier programmer add feature themself teitelman also early proponent use email multi-tasking feature modern computer joined sun microsystems 1984 became sun ’ first distinguished engineer 1986 also director multi-media sun departure 1992 worked director programming environments rational software also lucid inc. caere corporation one founders startup called baystone software developed crm customer relations management software based action request system remedy corporation invented idea business rules data elements rather code embodied much business process remedy acquired baystone 1998 held position chief scientist crm business unit remedy joined google 2003 | [
8025,
908,
795,
5701,
5006,
1243,
5911
] | Test |
7,679 | 3 | SPARCstation_IPC:sparcstation ipc sparcstation ipc sun 4/40 workstation sold sun microsystems based sun4c architecture enclosed lunchbox chassis sparcstation ipc incorporates fujitsu mb86901a lsi l64801 25 mhz processor sparcstation ipc limited use single-processor machine sparcstation ipc twelve simm memory slots three 4-slot groups group 4 slots filled either four 1mb simms four 4mb simms maximum 48mb sparcstation ipc hold one internal 3.5 50-pin single ended fast-narrow se scsi disk drive 3.5 1.44mb floppy disk drive also supports external scsi devices ide/atapi support modern 80 pin single connector attachment sca drives work adapter fit inside case due size adapter sparcstation ipc following interfaces sparcstation ipc comes on-board amd lance ethernet chipset 15-pin aui connector connect 10base2 10base5 10baset via appropriate transceiver openboot rom able boot network using rarp tftp like sparcstation systems ipc holds system information mac address serial number nvram battery chip dies system able boot without manual intervention keyboard entry boot parameters sparcstation ipc uses m48t02 battery-backed rtc ram chip handles real time clock boot parameter storage issue chip battery internal means entire chip must replaced battery runs sparcstation ipcs made older battery life chip substantial number systems refuse boot additionally sparcstation ipc design used reserved bits m48t02 nvram non-standard way since later revisions m48t02 chip exert stricter control bits current m48t02 store nvram data rtc function correctly system may fail auto-boot due incompatibilities modern m48t02s common modify failed nvrams cutting encapsulation patching new battery also possible replace entire encapsulation also contains 32.768 khz clock crystal following operating systems run sparcstation ipc sparcstation 1+ sun 4/65 architecturally similar housed pizza box form factor sparcstation ipx sun 4/50 later lunchbox form factor system | [
8080,
5301,
578
] | Validation |
7,680 | 9 | Wide-spectrum_language:wide-spectrum language wide-spectrum language wsl programming language designed simultaneously low-level high-level language—possibly non-executable specification language wide-spectrum languages designed support programming methodology based program refinement concept introduced f. l. bauer et al 1978 ... program developed step step applying correctness preserving transformations ... development process thus involves usually multiple reshapings ... since current programming languages contain concepts needed formulation different versions programmer nowadays forced use different languages avoid transition one language another seems appropriate one coherent language frame covering whole spectrum outlined i.e wide spectrum language advantage single language rather separate specification high-level low-level languages program incrementally refined intermediate versions retaining higher-level lower-level constructs bauer group developed cip-l wide-spectrum language cip-s program transformation system | [
1676,
1445,
964,
6497,
6498,
3499,
5164
] | Test |
7,681 | 3 | S1_Core:s1 core s1 core codename sirocco open source hardware microprocessor design developed simply risc based sun microsystems ultrasparc t1 s1 core licensed gnu general public license license sun chose opensparc project main goal project keep s1 core simple possible encourage developers major differences t1 s1 include | [
7535,
971,
5936
] | Validation |
7,682 | 7 | My_Windows_Phone:windows phone windows phone previously windows phone live free online companion service windows phone mobile devices microsoft service released conjunction launch windows phone 7 october 21 2010 provides users free mobile phone back-up solution wirelessly synchronizing contacts calendar appointments photos onenote notebooks various tightly-integrated windows live services including people outlook.com calendar microsoft onedrive users access manage information stored windows phone devices via password protected online portal using microsoft account windows phone also includes find phone service facilitates tracking lost stolen phone internet messages similar phone finder services various names available families smartphones similar service windows mobile devices available microsoft phone withdrawn 2011 service updated september 27 2011 conjunction release windows phone 7.5 mango update adding support microsoft scrapbook account management features including viewing app purchase history reinstall apps windows phone store windows phone 8 apollo update windows phone also added family feature allowing parents manage child accounts running windows phone 8 february 2015 microsoft moved find phone feature windows phone site microsoft account website preparation windows 10 windows phone offers following features | [
3551,
5213,
8085,
1721,
306,
3263,
7247,
4697,
179,
740,
1829
] | Test |
7,683 | 4 | PC_Tools_(company):pc tools company pc tools founded 2003 formerly known winguides.com software company acquired symantec 2008 new owner eventually discontinued pc tools name company headquarters australia offices luxembourg united states united kingdom ireland ukraine company previously developed distributed security optimization software mac os x microsoft windows platforms 29 november 2006 software owned pc tools downloaded 125 million times pc tools browser defender also called browser defender short browser toolbar internet explorer mozilla firefox browsers windows based computers browser defender allows safe web surfing iantivirus updated 2012 rebranded symantec norton brand pc tools iantivirus free antivirus software intel based apple macintosh computers running mac os 10.5 leopard mac os 10.6 snow leopard initially released june 2008 used detect remove malware spyware malicious exploits using signature-based heuristic detection iantivirus criticized scans macintosh viruses ignoring windows linux viruses praised speed low usage system resources pc tools internet security combination spyware doctor product firewall product anti spam product provided functionality three stand alone products single seamless product symantec longer offering product 18 may 2013 payware designed windows 8 32-/64-bit windows 7 32-/64-bit windows vista 32-/64-bit windows xp 32-bit pc tools registry mechanic first software pc tools released scanned windows registry find errors version 11 released 31 october 2011 last one pc tools spyware doctor anti-malware software spyware doctor detects malware based indicators compromise using spider technology recent version spyware doctor 9 released 31 october 2011 symantec longer offering product 18 may 2013 pc tools spyware doctor antivirus features spyware doctor added anti-virus capabilities symantec sold since 2013 v9 last one available threatexpert web site says advanced automated threat analysis system initialized atas built analyze report actions malware fully automated mode latest version beta version 1.0.1.0 1 march 2008 updates since march 2008 web site seems inactive 18 august 2008 symantec announced signing agreement acquire pc tools pc tools would maintain separate operations financial terms acquisition disclosed symantec acquired pc tools us 262,000,000 6 october 2008 symantec withdrew entire pc tools security portfolio comprising pc tools internet security spyware doctor spyware doctor antivirus 18 may 2013 pc tools sold could renewed 4 december 2013 symantec said would affect pc tools utilities products spyware doctor received pc world best buy award october 2007 issue magazine saying pc tools spyware doctor 5.0 winner outperforming competition detecting removing test set adware spyware samples spyware doctor received several editors choice awards pc magazine including one spyware doctor antivirus 5.5 2008 product also received numerous awards around globe reviews positive early versions spyware doctor 5.0 company rewrote scratch received negative commentary cnet download.com reviews justifies 3-star rating saying trial scans spyware doctor repeatedly flagged several dozen harmless cookies potential threats antispyware product tested also unable learn threat spyware doctor flagged symantec unsuccessfully sued washington resident running fake scans get people pay subscriptions pc tools registry mechanic performance toolkit norton utilities lawsuit claims company intentionally ran fake scans results real new wrinkle adware using stolen certificates disables anti-malware virus protection technical remedies available | [
1249,
3165,
4759,
806,
994,
3185,
4492,
4138,
385,
7536,
2746,
6107,
578,
3637,
8100,
2167,
3551,
1291,
7275,
7744,
3394,
6560,
4977,
7478,
3223,
1500,
4091,
2790,
7683,
6235,
6149,
6951,
7597,
875,
6962
] | Train |
7,684 | 7 | ZetaGrid:zetagrid zetagrid one time largest distributed computing project designed explore roots riemann zeta function checking one billion roots day roots zeta function particular interest mathematics since presence even single one line rest would disprove riemann hypothesis far-reaching consequences mathematics far every single one failed provide counterexample riemann hypothesis project ended november 2005 due instability hosting provider 10 first zeroes checked results analyzed project administrator stated posted american mathematical society website | [] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.