node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4 values |
|---|---|---|---|---|
7,685 | 2 | List_of_features_removed_in_Windows_8:list features removed windows 8 windows 8 version windows nt successor windows 7 several features present windows vista windows 7 longer present windows 8 | [
1710,
448,
2452,
458,
3937,
4759,
5637,
6256,
7616,
1536,
7619,
2999,
3180,
8177,
3698,
3187,
2472,
4500,
4687,
1097,
3711,
3795,
4880,
5313,
224,
140,
1213,
7660,
2772,
8118,
4723,
2329,
3048,
6136,
3907,
522,
2066,
5781,
2885,
3340,
5... | Test |
7,686 | 4 | ShieldsUP:shieldsup shieldsup online port scanning service created steve gibson gibson research corporation purpose utility alert users ports opened firewalls nat routers utility scan common file sharing ports well service ports 1-1056 user defined ports sets 64 often recommended checking port vulnerabilities scanning servers static ip addresses 4.79.142.192 4.79.142.207 | [
7729
] | Validation |
7,687 | 9 | TypeScript:typescript typescript open-source programming language developed maintained microsoft strict syntactical superset javascript adds optional static typing language typescript designed development large applications transcompiles javascript typescript superset javascript existing javascript programs also valid typescript programs typescript may used develop javascript applications client-side server-side node.js execution multiple options available transcompilation either default typescript checker used babel compiler invoked convert typescript javascript typescript supports definition files contain type information existing javascript libraries much like c++ header files describe structure existing object files enables programs use values defined files statically typed typescript entities third-party header files popular libraries jquery mongodb d3.js typescript headers node.js basic modules also available allowing development node.js programs within typescript typescript compiler written typescript compiled javascript licensed apache 2.0 license typescript included first-class programming language microsoft visual studio 2013 update 2 later beside c microsoft languages official extension allows visual studio 2012 support typescript well anders hejlsberg lead architect c creator delphi turbo pascal worked development typescript typescript first made public october 2012 version 0.8 two years internal development microsoft soon announcement miguel de icaza praised language criticized lack mature ide support apart microsoft visual studio available linux os x time today support ides particularly eclipse via plug-in contributed palantir technologies various text editors including emacs vim sublime webstorm atom microsoft visual studio code also support typescript typescript 0.9 released 2013 added support generics typescript 1.0 released microsoft build developer conference 2014 visual studio 2013 update 2 provides built-in support typescript july 2014 development team announced new typescript compiler claiming 5× performance gains simultaneously source code initially hosted codeplex moved github 22 september 2016 typescript 2.0 released introduced several features including ability programmers optionally prevent variables assigned values sometimes referred billion-dollar mistake typescript originated shortcomings javascript development large-scale applications microsoft among external customers challenges dealing complex javascript code led demand custom tooling ease developing components language typescript developers sought solution would break compatibility standard cross-platform support knowing current ecmascript standard proposal promised future support class-based programming typescript based proposal led javascript compiler set syntactical language extensions superset based proposal transforms extensions regular javascript sense typescript preview expect ecmascript 2015 unique aspect proposal added typescript optional static typing enables static language analysis facilitates tooling ide support typescript adds support features classes modules arrow function syntax defined ecmascript 2015 standard typescript language extension adds features ecmascript 6 additional features include following features backported ecmascript 2015 syntactically typescript similar jscript .net another microsoft implementation ecma-262 language standard added support static typing classical object-oriented language features classes inheritance interfaces namespaces typescript strict superset ecmascript 2015 superset ecmascript 5 commonly referred javascript javascript program also valid typescript program typescript program seamlessly consume javascript default compiler targets ecmascript 5 current prevailing standard also able generate constructs used ecmascript 3 2015 typescript possible use existing javascript code incorporate popular javascript libraries call typescript-generated code javascript type declarations libraries provided source code typescript provides static typing type annotations enable type checking compile time optional ignored use regular dynamic typing javascript annotations primitive types codice_1 codice_2 codice_3 weakly- dynamically-typed structures type codice_4 type annotations exported separate declarations file make type information available typescript scripts using types already compiled javascript annotations declared existing javascript library done node.js jquery typescript compiler makes use type inference infer types types given example codice_5 method code would inferred returning codice_1 even return type annotation provided based static types codice_7 codice_8 codice_9 compiler knowledge result adding two codice_9 always codice_1 however explicitly declaring return type allows compiler verify correctness type inferred lack declarations defaults dynamic codice_4 type value codice_4 type supports operations value javascript minimal static type checking performed operations codice_4 values typescript script gets compiled option generate declaration file extension codice_15 functions interface components compiled javascript process compiler strips away function method bodies preserves signatures types exported resulting declaration file used describe exported virtual typescript types javascript library module third-party developer consumes typescript concept declaration files analogous concept header file found c/c++ type declaration files written hand existing javascript libraries done jquery node.js large collections declaration files popular javascript libraries hosted github definitelytyped typescript supports ecmascript 2015 classes integrate optional type annotations support typescript supports generic programming typescript distinguishes modules namespaces features typescript support encapsulation classes interfaces functions variables containers namespaces formerly internal modules utilize immediately-invoked function expression javascript encapsulate code whereas modules formerly external modules leverage javascript library patterns amd commonjs typescript compiler named codice_16 written typescript result compiled regular javascript executed javascript engine e.g browser compiler package comes bundled script host execute compiler also available node.js package uses node.js host also alpha version client-side compiler javascript executes typescript code fly upon page load current version compiler supports ecmascript 5 default option allowed target ecmascript 2015 make use language features exclusive version e.g generators classes despite part ecmascript 2015 standard available modes using plug-ins typescript integrated build automation tools including grunt grunt-ts apache maven typescript maven plugin gulp gulp-typescript gradle typescript gradle plugin tslint scans typescript code conformance set standards guidelines eslint standard javascript linter also provided support typescript via community plugins however eslint inability leverage typescript language services precluded certain forms semantic linting program-wide analysis early 2019 tslint team announced linter deprecation favor codice_17 joint effort tslint eslint typescript teams consolidate linting eslint umbrella improved performance community unity developer accessibility | [
7149,
4296,
6420,
714,
6428,
2198,
720,
4315,
1460,
2928,
4697,
5747,
7907,
5751,
403,
4705,
2953,
53,
54,
6840,
422,
425,
3663,
775,
2619,
4017,
5091,
6504,
4022,
6507,
4026,
7607,
1526,
4755,
3687,
7246,
7619,
6172,
7621,
2283,
7971,
... | Test |
7,688 | 2 | Windows_Resource_Protection:windows resource protection windows resource protection feature windows vista replaces windows file protection protects registry keys folders addition critical system files way protects resources differs entirely method used windows file protection windows resource protection works registering notification file changes winlogon changes detected protected system file modified file restored cached copy located compressed folder windir \system32\dllcache windows resource protection works setting discretionary access control lists dacls access control lists acls defined protected resources permission full access modify wrp-protected resources restricted processes using windows modules installer service trustedinstaller.exe administrators longer full rights system files use setupapi take ownership resource add appropriate access control entries aces modify replace trusted installer account used secure core operating system files registry keys windows resource protection protects large number file types wrp also protects several critical folders folder containing wrp-protected files may locked trusted installer able create files subfolders folder folder may partially locked enable administrators create files subfolders folder essential registry keys installed windows vista also protected key protected wrp sub-keys values protected also wrp copies files needed restart windows cache directory located windir \winsxs\backup critical files needed restart windows copied cache directory unlike windows file protection cached entire set protected file types dllcache folder size cache directory list files copied cache modified windows resource protection applies stricter measures protect files result windows file protection available windows vista order replace single protected file windows file protection disabled completely windows resource protection works per-item basis setting acls therefore taking ownership single item particular item replaced items remain protected system file checker also integrated wrp windows vista sfc.exe used check specific folder paths including windows folder boot folder | [
7879,
3937,
3263,
378,
2198,
6096,
1475,
7553,
7195,
5410,
7564,
2953,
422,
6844,
2245,
435,
5442,
4377,
5090,
3340,
7602,
6164,
2631,
4759,
1534,
6885,
7619,
2999,
5475,
6528,
2290,
4774,
1181,
3711,
5134,
7272,
1571,
5850,
140,
6558,
... | Test |
7,689 | 9 | IgniteFusion:ignitefusion ignitefusion freeware cfml script engine runs cfm script files similar perl php script engines ignitefusion script engine runs executable server cfml engines include adobe coldfusion new atlanta bluedragon railo lucee coral web builder coldfusion | [
3186,
6029,
5983,
6362,
3543
] | Test |
7,690 | 4 | INVITE_of_Death:invite death invite death type attack voip-system involves sending malformed otherwise malicious sip invite request telephony server resulting crash server telephony usually critical application damage causes significant disruption users poses tremendous acceptance problems voip kinds attacks necessarily affect sip-based systems implementations vulnerabilities voip area affected dos attack also transported messages invite example december 2007 report vulnerability bye message bye bye using obsolete header name also however sending invite packets popular way attacking telephony systems name reference ping death attack caused serious trouble 1995-1997 invite death vulnerability found february 16 2009 vulnerability allows attacker crash server causing remote denial service dos sending single malformed packet impersonator using malformed packet overflow specific string buffers add large number token characters modify fields illegal fashion result server tricked undefined state lead call processing delays unauthorized access complete denial service problem specifically exists opensbc version 1.1.5-25 handling “ via ” field maliciously crafted sip packet invite death packet also used find new vulnerability patched opensbc server network dialog minimization popular open source-based asterisk pbx security advisories cover signaling-related problems also problems protocols resolution problems may malformed sdp attachments codex numbers valid range obsolete headers “ also ” invite death specifically problem operators run servers public internet sip allows usage udp packets easy attacker spoof source address internet send invite death untraceable locations sending kinds requests periodically attackers completely interrupt telephony service choice service provider upgrade systems attack crash system anymore large number voip vulnerabilities exist ip phones dos attacks voip phones less critical attacks central devices like ip-pbx usually endpoint affected | [
7170,
8171,
4716
] | Test |
7,691 | 1 | Data_system:data system data system term used refer organized collection symbols processes may used operate symbols organised collection symbols symbol-manipulating operations considered data system hence human-speech analysed level phonemes considered data system incan artefact khipu image stored pixels data system defined terms data model bears resemblance idea physical symbol system symbols within data systems may persistent hence sounds human speech non-persistent symbols decay rapidly air contrast pixels stored peripheral storage device persistent symbols education data system computer system aims provide educators student data help solve educational problems examples data systems include student information systems siss assessment systems instructional management systems imss data-warehousing systems distinctions different types data systems blurring separate systems begin serve functions data systems present data educators over-the-counter data format embed labels supplemental documentation help system make key package/display content decisions improve accuracy data system users ’ data analyses | [] | Validation |
7,692 | 5 | NetNewsWire:netnewswire netnewswire news aggregator macos netnewswire developed brent sheila simmons company ranchero software introduced july 12 2002 netnewswire lite free version missing advanced features commercial version introduced weeks later version 1.0 released february 11 2003 version 2.0 released may 2005 time included custom feed views custom downloading opening podcasts synchronization feeds feed status computers bloglines support built-in tabbed browser october 2005 newsgator bought netnewswire bringing newsgator online rss synchronization service mac brent simmons hired newsgator continue developing software netnewswire 3.0 released june 5 2007 version added spotlight indexing news items integration ical iphoto address book voodoopad growl support new user interface performance enhancements application originally shareware became free release netnewswire 3.1 january 10 2008 netnewswire lite discontinued time netnewswire 3.2 moved advertisement-supported model option purchase application remove ads ios version netnewswire support iphone ipod touch later ipad released first day app store includes syncing unread articles desktop version netnewswire lite 4.0 introduced march 3 2011 mac app store misses several advanced features included netnewswire 3.2 includes completely rewritten code base future used ios versions app netnewswire 4.0 shareware june 3 2011 acquisition netnewswire black pixel announced two years development apparently stalled gap updates 2011 release version 4 open beta june 24 2013 netnewswire 4.0 announced released open beta black pixel announcement also brought news product would commercial product free component though beta would free use final release final release netnewswire 4.0 occurred september 3 2015 august 31 2018 black pixel announced returned netnewswire intellectual property brent simmons september 1 2018 brent simmons released netnewswire 5.0d1 renamed version open source mac rss reader netnewswire well regarded many users reviewers according feedburner netnewswire popular desktop newsreader platforms 2005 software received macworld editor choice award 2003 2005 maintained 4.8 five stars rating among reviewers versiontracker cnet ars technica called netnewswire built-in browser hands-down best mac newsreader walter mossberg technology columnist wall street journal said netnewswire favorite mac | [
1152,
2812,
6788,
5984,
3172,
4575,
7063,
7975,
1367,
1276,
2842,
393,
5571,
7015,
3655,
3043,
4352,
4357,
163,
6312,
5699,
6582
] | Test |
7,693 | 9 | Duff's_device:duff device c programming language duff device way manually implementing loop unrolling interleaving two syntactic constructs c loop switch statement discovery credited tom duff november 1983 duff working lucasfilm used speed real-time animation program loop unrolling attempts reduce overhead conditional branching needed check whether loop done executing batch loop bodies per iteration handle cases number iterations divisible unrolled-loop increments common technique among assembly language programmers jump directly middle unrolled loop body handle remainder duff implemented technique c using c case label fall-through feature jump unrolled body duff problem copy 16-bit units shorts c implementations array memory-mapped output register denoted c pointer original code k r c looked follows code assumes initial pointer incremented would required memory-to-memory copy always divisible eight unrolling loop eight-fold would produce following duff realized handle cases divisible eight assembly programmer technique jumping loop body could implemented interlacing structures switch statement loop putting switch labels points loop body correspond remainder duff device similarly applied size unrolled loop eight example based algorithm used widely programmers coding assembly minimizing number tests branches copy duff device appears place implemented c. device valid c virtue two attributes c leads jargon file calls dramatic use yet seen fall c c default fall-through case statements long one controversial features duff said code forms sort argument debate 'm sure whether basic idea loop unrolling number instructions executed loop reduced reducing number loop tests sometimes reducing amount time spent loop example case loop single instruction block code loop test typically performed every iteration loop every time instruction executed instead eight copies instruction placed loop test performed every eight iterations may gain time avoiding seven tests however handles multiple eight iterations requiring something else handle remainder iterations duff device provides solution first performing remainder iterations followed iterating many times necessary multiple eight similar instructions determine number remainder iterations code first calculates total number iterations modulo eight according remainder program execution jump codice_1 statement followed exactly number iterations needed done everything straightforward code continues iterations groups eight instructions become possible since remaining number iterations multiple eight duff device provides compact loop unrolling using case keyword inside outside loop unusual contents case statement traditionally thought block code nested inside case statement reader would typically expect end next case statement according specifications c language necessary indeed case statements appear anywhere inside switch code block depth program execution simply jump next statement wherever may many compilers optimize switch jump table would done assembly implementation primary increase speed versus simple straightforward loop comes loop unwinding reduces number performed branches computationally expensive due need flushand hence stallthe instruction pipeline codice_2 statement used handle remainder data evenly divisible number operations unrolled example eight byte moves unrolled codice_2 handles extra 1–7 bytes automatically automatic handling remainder may best solution systems compilers cases two loops may actually faster one loop unrolled main copy second loop handle remainder problem appears come ability compiler correctly optimize device may also interfere pipelining branch prediction architectures numerous instances duff device removed xfree86 server version 4.0 improvement performance noticeable reduction size executable. ref name= lkml-0008.2/0171 /ref therefore considering code program optimization may worth running benchmarks verify actually fastest code target architecture target optimization level target compiler well weighing risk optimized code later used different platforms fastest code purpose memory-to-memory copies mentioned original use duff device standard c library provides function codice_4 perform worse memory-to-memory copy version code may contain architecture-specific optimizations make significantly faster | [
336,
7541,
3437,
3675,
1427,
1435
] | Test |
7,694 | 0 | DialogOS:dialogos dialogos graphical programming environment design computer system converse voice user dialogs clicked together flowchart dialogos includes bindings control lego mindstorms robots voice bindings sql databases well generic plugin architecture integrate types backends dialogos used computer science courses schools universities teach programming introduce beginners basic principles human/computer interaction dialog design also used research systems dialogos initially developed commercially clt sprachtechnologie gmbh liquidation 2017 rights acquired saarland university software released open-source dialogos control lego mindstorms nxt series uses sensor-nodes obtain values following sensors | [
3363,
5571,
150,
578,
4787,
1830
] | Test |
7,695 | 9 | Radhia_Cousot:radhia cousot radhia cousot 6 august 1947 – 1 may 2014 french computer scientist known inventing abstract interpretation radhia cousot born 6 august 1947 sakiet sidi youssef tunisia survived went sousse algiers polytechnic school algiers ranked 1st woman specialized mathematical optimization integer linear programming supported unesco fellowship 1972–1975 obtained master degree computer science joseph fourier university grenoble 1972 obtained mathematics nancy 1985 supervision radhia cousot appointed associate research scientist imag laboratory joseph fourier university grenoble 1975–1979 1980 centre national de la recherche scientifique junior research scientist research scientist senior research scientist senior research scientist emerita computer science laboratories henri poincaré university nancy 1980–1983 university paris-sud orsay 1984–1988 école polytechnique 1989–2008 1991 headed research team “ semantics proof abstract interpretation ” école normale supérieure 2006–2014 together husband patrick radhia cousot originator abstract interpretation influential technique formal methods abstract interpretation based three main ideas thesis radhia cousot advanced semantics proof static analysis methods concurrent parallel programs radhia cousot origin contacts airbus january 1999 lead development astrée run-time error analyzer 2001 onwards tool sound static program analysis embedded control/command software developed école normale supérieure distributed absint gmbh german software company specialized static analysis astrée used transportation space medical software industries patrick cousot received acm sigplan programming languages achievement award 2013 ieee computer society ieee computer society harlan d. mills award 2014 “ invention ‘ abstract interpretation ’ development tool support practical application ” since september 2014 radhia cousot best young researcher paper award attributed annually program chair behalf program committee static analysis symposia sas | [
4176,
1243
] | Test |
7,696 | 4 | Packet_Sender:packet sender typical applications packet sender include packet sender comes built-in tcp udp ssl server multiple ports user specifies remains running listening packets sending packets version v6.2.3 packet sender supports following features packet sender mobile also open source available ios android mit license written xamarin core features desktop packet sender send receive tcp udp cloud | [
4991,
1813,
588,
3915,
7637,
5571,
3085,
2438,
578,
3950,
7093,
8023
] | Validation |
7,697 | 3 | ShaBLAMM!_NiTro-VLB:shablamm nitro-vlb shablamm nitro-vlb computer system used qed r4600 microprocessor implemented vesa local bus peripheral card designed function connected host computer system using intel i486 nitro-vlb conformed arc standard produced marketed shablamm computer upgrade card accelerating windows nt nitro-vlb notable various unique characteristics among personal computer accessories example although system marketed upgrade computers already using 486 processor nitro-vlb fact entirely different architecture specifically mips architecture ia32-based 486 parasitic symbiotic coprocessor nitro-vlb designed co-opt host 486 processor running used four megabytes host 486 motherboard system memory dma buffer although nitro-vlb required separate dram main memory addition memory installed host 486 motherboard type parasite host upgrade card configuration entire motherboard processor implemented expansion card designed connect host motherboard expansion slot configurations rare among computer systems designed run microsoft windows nitro-vlb qed r4600 processor running 100 mhz rated 73.8 specint92 63 specfp92 similar figures first-generation pentium running 66 mhz faster costlier versions designed run 133 mhz 150 mhz initially nitro-vlb system priced 1,095 100 mhz card main memory 1,995 100 mhz card 16 mb main memory copy windows nt 2,595 150 mhz card | [
5055,
4799,
6074,
8139,
4759,
4479,
6256,
1452,
4859
] | Test |
7,698 | 3 | Compaq_Portable:compaq portable compaq portable early portable computer one first 100 ibm pc compatible systems compaq computer corporation first product followed others compaq portable series later compaq deskpro series compaq portable announced november 1982 first shipped march 1983 priced us 2,995 single half-height 5¼ 360 kb diskette drive 3,590 dual full-height diskette drives compaq portable folded luggable case size portable sewing machine computer early all-in-one becoming available two years cp/m-based osborne 1 kaypro ii year ms-dos-based entirely ibm pc compatible dynalogic hyperion year commodore sx-64 design influenced xerox notetaker prototype computer developed xerox parc 1976 ibm responded compaq portable ibm portable developed sales force needed comparable computer sell compaq compaq sold 53,000 units first year total 111 million revenue american business record second year revenue hit 329 million setting industry record third year revenue 503.9 million another us business record compaq portable basically hardware ibm pc transplanted luggable case specifically designed fit carry-on luggage airplane compaq bios instead ibm portables shipped 128k ram 1-2 double-sided double-density 360 kb disk drives machine uses unique hybrid ibm mda cga supports latter graphics modes contains cards text fonts rom using internal monochrome monitor 9x14 font used 8x8 one external monitor used user switches internal external monitors pressing user use ibm video standards graphics capabilities high-resolution text larger external monitor graphics hardware also used original compaq deskpro desktop computer despite success compaq portable flaws hardware foam pads keyboards used make contact circuit board pressed would eventually disintegrate time due wear normal use natural wear would render keyboard useless would require full replacement foam pad affected crt display also suffered low refresh rate heavy ghosting compaq efforts possible ibm used mostly off-the-shelf parts pc published full technical documentation microsoft kept right license ms-dos computer manufacturers difficulty bios contained ibm copyrighted code compaq solved problem producing clean room workalike performed documented functions ibm pc bios completely written scratch although numerous companies soon also began selling pc compatibles matched compaq remarkable achievement essentially-complete software compatibility ibm pc typically reaching 95 compatibility best phoenix technologies others began selling similarly reverse-engineered bioss open market first portables used compaq dos 1.13 essentially identical pc dos 1.10 except standalone basic require ibm pc rom cassette basic superseded months dos 2.00 added hard disk support advanced features aside using dos 1.x initial portables similar 16k-64k models ibm pc bios limited 544k ram support expansion roms thus making unable use ega/vga cards hard disks similar hardware dos 2.x ibm xt came compaq upgraded bios although portable offered factory hard disk users commonly installed starting 1984 compaq began offering hard disk-equipped version portable plus 1985 compaq introduced portable 286 replaced compact portable ii redesigned case within months byte wrote testing prototype compaq portable looks like sure winner portability cost high degree compatibility ibm pc reviewer tested ibm pc dos cp/m-86 wordstar supercalc several software packages found worked except one game pc magazine also rated compaq portable highly compatibility reporting tested applications ran praised rugged hardware design sharp display concluded certainly worth consideration anyone seeking run ibm pc software without ibm pc machine first series compaq portable machines | [
4291,
7467,
7759,
1052,
5784,
6380,
5571,
1237,
4277,
6127,
4018,
1064
] | Test |
7,699 | 9 | TIOBE_index:tiobe index tiobe programming community index measure popularity programming languages created maintained tiobe company based eindhoven netherlands tiobe stands importance earnest title comedy play oscar wilde first performed 1895 index calculated number search engine results queries containing name language index covers searches google google blogs msn yahoo baidu wikipedia youtube index updated month current information free long term statistics many years observation sale index authors think may valuable accepting various strategic decisions tiobe focuses turing complete languages provide information popularity instance html according site tiobe index best programming language language lines code written however site claim number web pages may reflect number skilled engineers courses jobs worldwide tiobe index sensitive ranking policy search engines based instance april 2004 google performed cleanup action get rid unfair attempts promote search rank consequence large drop languages java c++ yet languages stayed top table avoid fluctuations tiobe uses multiple search engines august 2016 c reached lowest ratings score since index launched still second popular language java since languages substantially gone still maintaining top two positions tiobe programming language year award goes language biggest annual popularity gain index e.g. go programming language year 2016 pierre carbonnelle challenges tiobe naming objective-c programming language year 2012 arguing may many objective-c pages web rarely read proposes pypl index instead based google trends data shows popularity trends since 2004 worldwide 5 different countries tim bunce author perl dbi critical index methods ranking | [
336,
4070,
5965,
7218,
2619,
993,
1435,
6092
] | Train |
7,700 | 9 | Modula-2+:modula-2+ modula-2+ programming language descended modula-2 language developed dec systems research center src acorn computers ltd research centre palo alto california modula-2+ modula-2 exceptions threads group developed language led p. rovner 1984 main differences modula-2 modula-2+ used develop topaz operating system dec src firefly multiprocessor topaz applications written modula-2+ programming language grew along development system also build programming environment acorn research center arc language completely disappeared great influence programming languages modula-3 original developers modula-2+ bought acorn olivetti digital equipment corporation compaq compaq bought hewlett-packard olivetti also sold olivetti research center olivetti software technology laboratory bought acorn arc oracle later absorbed dec made src-reports available public | [
6507,
3764,
8137,
3915,
5948,
5571,
3069,
5006,
4589
] | Test |
7,701 | 6 | AppleShare:appleshare appleshare product apple computer implemented various network services main purpose act file server using afp protocol network services implemented later versions appleshare included print server using printer access protocol pap web server electronic mail server smb cifs server support file sharing microsoft windows clients earlier versions appleshare supported appletalk network transport protocol later versions sold name appleshare ip allowed use tcp/ip protocol stack used modern networks appleshare provided three different protocols application-layer services appleshare file server appleshare print server appleshare pc appleshare would operate physical network medium early installations used mainly localtalk recently ethernet physical medium could used could directly indirectly connected appleshare server system equivalent third party server products include open-source netatalk suite unix-like systems services macintosh microsoft windows nt 2000 versions mac os system 7 onwards included personal file sharing limited afp implementation obvious difference personal file sharing appleshare former supports small number concurrent remote users versions mac os capable acting client appleshare server via afp later smb appletalk tcp/ip protocols although recent versions macos gradually removed support appletalk favor standard tcp/ip third-party vendors created client software pc maclan discontinued dave implement client functionality windows systems developers offered server software provided similar functionality windows servers grouplogic extremez-ip cyan software macserverip netatalk linux later versions appleshare also implemented smb cifs protocols native file sharing protocols windows machines apple discontinued appleshare product line following release macos server provides equivalent functionality appleshare ip support 3.0.1 macintosh | [
405,
8081,
5079,
4759,
1189,
6256,
5859
] | Test |
7,702 | 2 | Amiga_Unix:amiga unix amiga unix informally known amix discontinued full port unix system v release 4 operating system developed commodore-amiga inc. 1990 amiga computer family alternative amigaos shipped default bundled amiga 3000ux commodore unix one first ports svr4 68k architecture amiga a3000ux model even got attention sun microsystems though ultimately nothing came unlike apple a/ux amiga unix contained compatibility layer allow amigaos applications run unix native applications available take advantage amiga significant multimedia capabilities failed find niche quite-competitive unix workstation market early 1990s a3000ux price tag 4,998 also attractive compared unix workstations time nextstation 5,000 base system full api many times number applications available sgi indigo starting 8,000 personal decstation 5000 model 25 starting 5,000 sun hp ibm similarly priced systems a3000ux 68030 noticeably underpowered compared risc-based competitors unlike typical commercial unix distributions time amiga unix included source code vendor-specific enhancements platform-dependent device drivers essentially part n't owned allowing interested users study enhance parts system however source code subject license terms binary part system free software amiga unix also incorporated depended upon many open source components gnu c compiler x window system included source code like many proprietary unix variants small market shares amiga unix vanished mists computer history vendor commodore went business today unix-like operating systems minix netbsd linux available amiga platform | [
1522,
4751,
5097,
4478,
4670,
900,
2467,
2294,
5571,
2300,
2118,
6360,
578,
5232,
6367,
7010,
4447,
4099,
3751,
443
] | Test |
7,703 | 1 | Zentralblatt_MATH:zentralblatt math zbmath formerly zentralblatt math major international reviewing service providing reviews abstracts articles pure applied mathematics produced berlin office fiz karlsruhe – leibniz institute information infrastructure gmbh editors european mathematical society ems fiz karlsruhe heidelberg academy sciences zbmath distributed springer science+business media uses mathematics subject classification codes organising reviews topic mathematicians richard courant otto neugebauer harald bohr together publisher ferdinand springer took initiative foundation new mathematical reviewing journal harald bohr brother famous physicist niels bohr worked copenhagen courant neugebauer professors university göttingen time göttingen considered one central places mathematical research appointed mathematicians like david hilbert hermann minkowski carl runge felix klein great organiser mathematics physics göttingen dream building independent mathematical institute spacious rich reference library realised four years death credit achievement particularly due richard courant convinced rockefeller foundation donate large amount money construction service founded 1931 otto neugebauer zentralblatt für mathematik und ihre grenzgebiete contained bibliographical data recently published mathematical articles book together peer reviews done mathematicians world preface first volume intentions zentralblatt formulated follows zentralblatt für mathematik und ihre grenzgebiete aims publish — efficient reliable manner — reviews entire world literature mathematics related areas issues initially appearing monthly name suggests main focus journal mathematics however areas closely related mathematics treated seriously so-called pure mathematics zentralblatt jahrbuch essence agenda zentralblatt published several issues per year issue published soon sufficiently many reviews available frequency three four weeks late 1930s began rejecting jewish reviewers number reviewers england united states resigned protest helped start mathematical reviews competing publication electronic form provided name inka-math acronym information system karlsruhe-database mathematics since least 1980 name later shortened zentralblatt math zentralblatt math abstracting service provides reviews brief accounts contents current articles conference papers books publications mathematics applications related areas reviews predominantly english occasional entries german french reviewers volunteers invited editors based published work recommendation existing reviewer zentralblatt math provided web printed form service reviews 2,300 journals serials worldwide well books conference proceedings zentralblatt math edited european mathematical society fiz karlsruhe heidelberg academy sciences zentralblatt database also incorporates 200,000 entries earlier similar publication jahrbuch über die fortschritte der mathematik jfm 1868 1942 added 2003 access subscription currently first three records search provided free without subscription | [
1030,
2455
] | Test |
7,704 | 3 | Rambo_III_(video_game):rambo iii video game rambo iii series video games based film rambo iii 1988 like film main plots center former vietnam-era green beret john rambo recalled duty one last time rescue former commander colonel sam trautman captured covert operation mission soviet union-controlled afghanistan console versions developed published sega pc dos version developed ocean published taito ocean developed published rest atari st amiga spectrum c64 amstrad taito also released arcade game based film sega master system version released 1988 light gun rail shooter lines operation wolf light phaser supported makes game also unique unlike nes sega master system port ironically port operation wolf long player ammunition game light phaser trigger held supply full automatic shooting ammunition runs though player pull trigger time shooting sega mega drive version released 1989 follows rambo six missions one various objectives besides finding exit level missions prisoners must freed enemy ammunition supplies destroyed rambo controlled overhead perspective several weapons disposal besides machine gun never runs ammo use knife close range kills set timed bombs use famous longbow explosive arrows ammunition bow bombs limited collected dead enemies rambo hand vulnerable killed one hit missions perspective switches view behind rambo additional boss fights take place soviet tanks helicopters must destroyed using crossbow aiming bow rambo move otherwise hide behind rocks obstacles enemy fire reminiscent taito arcade game name also player firing screen helicopters jeeps instead single segment stage whole game played perspective taito released rail shooter based film well features rambo sam trautman playable characters zx spectrum atari st commodore amiga commodore 64 amstrad cpc versions three missions varied console version drastically terms gameplay graphics music | [] | Test |
7,705 | 7 | Kyvos:kyvos kyvos big data business intelligence software developed american privately held company named kyvos insights company headquartered los gatos california founded praveen kankariya ceo impetus technologies 2012 software provides olap-based multidimensional analysis big data cloud platforms launched officially june 2015 december year company listed among 10 coolest big data startups 2015 crn magazine software uses olap technology enable business intelligence big data platforms report published forrester research 2016 evaluated several native hadoop business intelligence bi platforms 22 parameters kyvos referred platform gave new life olap bringing hadoop per report kyvos enables analysis hadoop based olap schemas aggregations predefined drill-down paths pre-calculates aggregates multiple levels dimensional hierarchies improve query response times compared sql-on-hadoop platforms users analyze data kyvos visualization tool using bi platforms kyvos originally built hadoop later added support cloud platforms amazon web services aws google cloud microsoft azure initially supported mdx queries integrated data visualization tools excel tableau 2017 kyvos 4.0 added support sql connectivity extending integration bi tools business objects cognos microstrategy power bi qlik late 2018 version 5 software built specifically cloud elastic olap provide cloud native way scale changing data workloads | [
6506,
4431,
5064
] | Test |
7,706 | 2 | Absolute_OpenBSD:absolute openbsd absolute openbsd unix practical paranoid comprehensive guide openbsd operating system michael w. lucas author absolute freebsd cisco routers desperate book assumes basic knowledge design commands user permissions unix-like operating systems book contains troubleshooting tips background information system commands examples assist learning first edition released june 2003 information book became outdated openbsd 3.4 released months later second edition released april 2013 peter n. m. hansteen author book pf technical reviewer | [
1047,
5571
] | Test |
7,707 | 9 | Dana_Scott:dana scott dana stewart scott born october 11 1932 emeritus hillman university professor computer science philosophy mathematical logic carnegie mellon university retired lives berkeley california research career involved computer science mathematics philosophy work automata theory earned acm turing award 1976 collaborative work christopher strachey 1970s laid foundations modern approaches semantics programming languages worked also modal logic topology category theory received ba mathematics university california berkeley 1954 wrote ph.d. thesis convergent sequences complete theories supervision alonzo church princeton defended thesis 1958 solomon feferman 2005 writes period completing ph.d. studies moved university chicago working instructor 1960 1959 published joint paper michael o. rabin colleague princeton titled finite automata decision problem scott rabin 1959 introduced idea nondeterministic machines automata theory work led joint bestowal turing award two introduction fundamental concept computational complexity theory scott took post assistant professor mathematics back university california berkeley involved classical issues mathematical logic especially set theory tarskian model theory period started supervising ph.d. students james halpern contributions study independence axiom choice edgar lopez-escobar infinitely long formulas countable quantifier degrees scott also began working modal logic period beginning collaboration john lemmon moved claremont california 1963 scott especially interested arthur prior approach tense logic connection treatment time natural-language semantics began collaborating richard montague copeland 2004 known days undergraduate berkeley later scott montague independently discovered important generalisation kripke semantics modal tense logic called scott-montague semantics scott 1970 john lemmon scott began work modal-logic textbook interrupted lemmon death 1966 scott circulated incomplete monograph amongst colleagues introducing number important techniques semantics model theory importantly presenting refinement canonical model became standard introducing technique constructing models filtrations core concepts modern kripke semantics blackburn de rijke venema 2001 scott eventually published work introduction modal logic lemmon scott 1977 following initial observation robert solovay scott formulated concept boolean-valued model solovay petr vopěnka likewise around time 1967 scott published paper proof independence continuum hypothesis used boolean-valued models provide alternate analysis independence continuum hypothesis provided paul cohen work led award leroy p. steele prize 1972 scott took post professor mathematical logic philosophy faculty university oxford 1972 member merton college oxford honorary fellow college period saw scott working christopher strachey two managed despite administrative pressures work providing mathematical foundation semantics programming languages work scott best known together work constitutes scott–strachey approach denotational semantics constitutes one pieces work theoretical computer science perhaps regarded founding one schools computer science one scott contributions formulation domain theory allowing programs involving recursive functions looping-control constructs given denotational semantics additionally provided foundation understanding infinitary continuous information domain theory theory information systems scott work period led bestowal carnegie mellon university scott proposed theory equilogical spaces successor theory domain theory among many advantages category equilogical spaces cartesian closed category whereas category domains 1994 inducted fellow association computing machinery 2012 became fellow american mathematical society | [
4405,
6995,
1746,
1381,
7009,
3470,
43,
3810,
3895,
2778,
1308,
5424,
6485,
7863,
1600,
1243,
360
] | Test |
7,708 | 4 | Peter_Tippett:peter tippett peter tippett born 1953 dearborn michigan american physician researcher inventor known contributions information security clinical medicine technology contributions include development anti-virus program corporate vaccine tippett vice president verizon innovations incubator chief medical officer verizon enterprise services 2009 2015 currently founder ceo healthcelerate inc. born 1953 raised dearborn michigan tippett alumnus kalamazoo college holds ph.d. m.d case western reserve university school medicine studied rockefeller university new york nobel prize winner robert bruce merrifield directing doctoral research efforts toward metabolic indicators peptide synthesis completed internship residency internal medicine cleveland metropolitan general hospital spent 1975-1985 engaged biochemical research engaged research case western reserve tippett moonlighted emergency room physician instructor emergency outpatient medicine spent much early clinical career 1989-1995 emergency medicine ohio california received board certification internal medicine 1987 1993 2000 served board computer ethics institute served executive director pacific foundation science medicine 1988 1992 intersection clinical career emerging focus technology particularly arena cybersecurity well use access protocols internet role president chairman certus international publisher developer pc anti-virus security software tippett applied research insights biochemist concept computer viruses develop anti-virus software vaccine later purchased symantec 1992 ceo role cybertrust led merger cybertrust verizon tippett role verizon healthcare security innovations divisions tippett served chairman alliance internet security 2000 represented verizon board directors open identity exchange oix information card foundation addition credited development one first anti-virus programs vaccine tippett pioneered commercialized string now-common technologies including called recovery disk processor image signatures using hash-tables trusted file execution anomaly detection aspects mail merge un-do ran bulletin board system cp/m software first ibm pc created president cleveland osborne group user group computers osborne computer corporation early 1980s chief scientist icsa.net tippett one handful experts identify address iloveyou virus broke may 2000 provided key information department justice david smith writer melissa virus featured cover august 2000 issue time digital magazine tippett work cybersecurity space led roles speaker contributor advisor government private sector organizations 2003-2005 served president information technology committee pitac established congress 1997 high performance computing act 1991 guide administration efforts accelerate development adoption information technologies vital american prosperity 21st century u.s. chamber commerce awarded tippett first leadership health care award chamber ’ first annual health care summit 2012 leadership verizon incubator tippett also chief scientist icsa labs previously served president international computer security association tippett currently adjunct professor division general medical sciences case western reserve university school medicine november 2017 t.e.n. technology information security executive networking relationship-marketing firm announced tippett recipient 2017 ise® luminary leadership award | [
6143,
4556,
15
] | Test |
7,709 | 4 | Transshipment_(information_security):transshipment information security information security transshipment technique protecting software services applications ensuring receive data known able handle safely term analogous logistics industry cargo offloaded one means transport another port entry transshipment information extracted data used send encoded data handled safely transshipment messages intercepted business information carry extracted information encoded new message using data format receiving application safely handle example email client may known handle messages simple structure without failure full generality allowed standards transshipment used protect mail client attackers exploit weaknesses ability handle general case transshipment process extracts business information email messages creates new message conveys information using simple structures mail client protected without knowing details weaknesses implementation transshipment function must handle data sent potential attackers useful function must implemented without vulnerable attack achieved using guard technology separates implementation three parts destination proxy interacts message originator extracts business information messages verifier source proxy creates new message carry business information interacts message recipient verifier role ensure source proxy presented business information using simple data format expecting result attack surface limited verifier interface part source proxy interface visible verifier unlike antivirus software use transshipment defends unknown attacks hence zero-day attacks require routine updates signatures heuristics | [
3932,
2779
] | Test |
7,710 | 9 | Troff:troff troff short typesetter roff major component document processing system developed corporation unix operating system troff features commands designate fonts spacing paragraphs margins footnotes unlike many text formatters troff position characters arbitrarily page even overlapping fully programmable input language separate preprocessors used convenient production tables diagrams mathematics inputs troff plain text files created text editor extensive macro packages created various document styles typical distribution troff includes macros formatting research papers man mdoc macros creating unix man pages mv macros creating mountable transparencies ms mm macros letters books technical memoranda reports troff origins traced text-formatting program called runoff written jerome h. saltzer mit ctss operating system mid-1960s name allegedly came phrase 'll run document bob morris ported ge 635 architecture called program roff abbreviation runoff rewritten rf pdp-7 time 1969 doug mcilroy rewrote extended simplified version roff bcpl programming language first version unix developed pdp-7 sitting around bell labs 1971 developers wanted get pdp-11 work operating system order justify cost system proposed would implement document-formatting system patents division first formatting program reimplementation mcillroy roff written joe f. ossanna needed flexible language new version roff called nroff newer roff written provided basis future versions got graphic systems cat phototypesetter ossanna modified nroff support multiple fonts proportional spacing dubbed troff typesetter roff sophisticated output amazed typesetter manufacturer confused peer reviewers thought manuscripts using troff published name troff pronounced rather troff came nroff actually almost program producing output line printers character terminals understood everything troff ignored commands applicable e.g. font changes ossanna troff written pdp-11 assembly language produced output specifically cat phototypesetter rewrote c although 7000 lines uncommented code still dependent cat cat became less common longer supported manufacturer need make support devices became priority ossanna died task completed brian kernighan took task rewriting troff newly rewritten version produced device-independent code easy post-processors read translate appropriate printer codes also new version troff often called ditroff device independent troff several extensions included drawing functions program documentation defines output format ditroff used many modern troff clones like gnu groff troff collection tools including pre- post-processors eventually called documenter workbench dwb continuous development bell labs later spin-off unix system laboratories usl 1994 time softquad took maintenance although brian kernighan continued improve troff thus least following variants original bell labs troff use troff supplanted programs interleaf framemaker latex still used quite extensively remains default formatter unix documentation software reimplemented groff gnu system beginning 1990 addition due open sourcing ancient unix systems well modern successors ditroff based open-sourced versions found opensolaris plan 9 bell labs several versions troff cat ditroff-based available various open-source licenses troff includes sets commands called macros run starting process document macros include setting page headers footers defining new commands generally influencing output formatted command-line argument including macro set -m name led many macro sets known base filename leading m. standard macro sets leading comprehensive list macros available usually listed codice_2 manual page troff evolved since several things done easily troff several preprocessors developed programs transform certain parts document troff input fitting naturally use pipelines unix — sending output one program input another see pipes filters typically preprocessor translates sections input file specially marked passing rest file unchanged embedded preprocessing instructions written simple application-specific programming language provides high degree power flexibility three preprocessors provide troff drawing capabilities defining domain-specific language describing picture yet preprocessors allow drawing complex pictures generating output pic | [
5,
4403,
5571,
217,
578,
2220,
222,
931,
6470,
1493,
3222,
241,
336,
4447,
7032,
7498,
1435
] | Test |
7,711 | 9 | Isabelle_(proof_assistant):isabelle proof assistant isabelle automated theorem prover interactive theorem prover higher order logic hol theorem prover lcf-style theorem prover written standard ml based small logical core ease logical correctness isabelle generic provides meta-logic weak type theory used encode object logics like first-order logic fol higher-order logic hol zermelo–fraenkel set theory zfc isabelle main proof method higher-order version resolution based higher-order unification though interactive isabelle also features efficient automatic reasoning tools term rewriting engine tableaux prover well various decision procedures isabelle used formalize numerous theorems mathematics computer science like gödel completeness theorem gödel theorem consistency axiom choice prime number theorem correctness security protocols properties programming language semantics isabelle theorem prover free software released revised bsd license isabelle named lawrence paulson gérard huet daughter isabelle allows proofs written two different styles procedural declarative procedural proofs specify series tactics procedures apply reflecting procedure human mathematician might apply proving result typically hard read describe outcome steps declarative proofs supported isabelle proof language isar hand specify actual mathematical operations performed therefore easily read checked humans procedural style deprecated recent versions isabelle archive formal proofs also recommends declarative style example declarative proof contradiction isar square root two rational written follows isabelle used aid formal methods specification development verification software hardware systems larry paulson keeps list research projects use isabelle following programs provide similar functionality isabelle | [
578,
5571,
7717,
5021,
7713,
2619,
703,
7554,
3141
] | Validation |
7,712 | 7 | Quasi-opportunistic_supercomputing:quasi-opportunistic supercomputing quasi-opportunistic supercomputing computational paradigm supercomputing large number geographically disperse computers quasi-opportunistic supercomputing aims provide higher quality service opportunistic resource sharing quasi-opportunistic approach coordinates computers often different ownerships achieve reliable fault-tolerant high performance control opportunistic computer grids computational resources used whenever may become available opportunistic match-making approach task scheduling computer grids simpler merely matches tasks whatever resources may available given time demanding supercomputer applications weather simulations computational fluid dynamics remained reach partly due barriers reliable sub-assignment large number tasks well reliable availability resources given time quasi-opportunistic approach enables execution demanding applications within computer grids establishing grid-wise resource allocation agreements fault tolerant message passing abstractly shield failures underlying resources thus maintaining opportunism allowing higher level control general principle grid computing use distributed computing resources diverse administrative domains solve single task using resources become available traditionally grid systems approached task scheduling challenge using opportunistic match-making approach tasks matched whatever resources may available given time boinc developed university california berkeley example volunteer-based opportunistic grid computing system applications based boinc grid reached multi-petaflop levels using close half million computers connected internet whenever volunteer resources become available another system folding home based boinc computes protein folding reached 8.8 petaflops using clients include gpu playstation 3 systems however results applicable top500 ratings run general purpose linpack benchmark key strategy grid computing use middleware partitions pieces program among different computers network although general grid computing success parallel task execution demanding supercomputer applications weather simulations computational fluid dynamics remained reach partly due barriers reliable sub-assignment large number tasks well reliable availability resources given time opportunistic internet primenet server supports gimps one earliest grid computing projects since 1997 researching mersenne prime numbers gimps distributed research currently achieves 60 teraflops volunteer-based computing project use computing resources volunteer grids gimps usually purely opportunistic geographically disperse distributively owned computers contributing whenever become available preset commitments resources available given time hence hypothetically many volunteers unwittingly decide switch computers certain day grid resources become significantly reduced furthermore users find exceedingly costly organize large number opportunistic computing resources manner achieve reasonable high performance computing example structured grid high performance computing deisa supercomputer project organized european community uses computers seven european countries although different parts program executing within deisa may running computers located different countries different ownerships administrations control coordination purely opportunistic approach deisa two level integration scheme inner level consists number strongly connected high performance computer clusters share similar operating systems scheduling mechanisms provide homogeneous computing environment outer level consists heterogeneous systems supercomputing capabilities thus deisa provide somewhat controlled yet dispersed high performance computing services users quasi-opportunistic paradigm aims overcome achieving control assignment tasks distributed resources use pre-negotiated scenarios availability systems within network quasi-opportunistic distributed execution demanding parallel computing software grids focuses implementation grid-wise allocation agreements co-allocation subsystems communication topology-aware allocation mechanisms fault tolerant message passing libraries data pre-conditioning approach fault tolerant message passing essential abstractly shield failures underlying resources quasi-opportunistic approach goes beyond volunteer computing highly distributed systems boinc general grid computing system globus allowing middleware provide almost seamless access many computing clusters existing programs languages fortran c distributed among multiple computing resources key component quasi-opportunistic approach qoscos grid economic-based resource allocation model resources provided based agreements among specific supercomputer administration sites unlike volunteer systems rely altruism specific contractual terms stipulated performance specific types tasks however tit-for-tat paradigms computations paid back via future computations suitable supercomputing applications avoided key component quasi-opportunistic approach reliable message passing system provide distributed checkpoint restart mechanisms computer hardware networks inevitably experience failures way part large computation fails entire run need abandoned restart last saved checkpoint | [
5666,
4159,
3531,
1023,
4484,
7930,
1678,
5890
] | Test |
7,713 | 9 | HOL_(proof_assistant):hol proof assistant hol higher order logic denotes family interactive theorem proving systems using similar higher-order logics implementation strategies systems family follow lcf approach implemented library programming language library implements abstract data type proven theorems new objects type created using functions library correspond inference rules higher-order logic long functions correctly implemented theorems proven system must valid way large system built top small trusted kernel systems hol family use ml programming language successors ml originally developed along lcf serve purpose meta-language theorem proving systems fact name stands meta-language hol systems use variants classical higher-order logic simple axiomatic foundations axioms well-understood semantics logic used hol provers closely related isabelle/hol widely used logic isabelle four hol systems sharing essentially logic still maintained developed although hol predecessor isabelle various hol derivatives hol4 hol light remain active use cakeml project developed formally proven compiler ml previously hol used developed formally proven lisp implementation running arm x86 powerpc hol also used develop formal semantics x86 multiprocessors well semantics machine code power isa arm architectures | [
3254,
4543,
6489,
6876,
1445,
7711,
7717,
5164,
703
] | Validation |
7,714 | 5 | BitTorrent_tracker:bittorrent tracker bittorrent tracker special type server assists communication peers using bittorrent protocol peer-to-peer file sharing software client end-user pc requests file portions requested file residing peer machines sent client reassembled full copy requested file tracker server keeps track file copies reside peer machines ones available time client request helps coordinate efficient transmission reassembly copied file clients already begun downloading file communicate tracker periodically negotiate faster file transfer new peers provide network performance statistics however initial peer-to-peer file download started peer-to-peer communication continue without connection tracker since creation distributed hash table dht method trackerless torrents bittorrent trackers largely become redundant however still often included torrents improve speed peer discovery public open trackers used anyone adding tracker address existing torrent used newly created torrent like openbittorrent pirate bay operated one popular public trackers disabling 2009 amid legal trouble thereafter offered magnet links private tracker bittorrent tracker restricts use requiring users register site method controlling registration used among many private trackers invitation system active contributing members given ability grant new user permission register site new user goes interview process several circumstances legal distribute copyrighted material parts thereof also experiments legally selling content distributed bittorrent using secure tracker system trackers primary reason damaged bittorrent swarm reasons mostly related damaged hacked clients uploading corrupt data reliability trackers improved two main innovations bittorrent protocol multi-tracker torrents contain multiple trackers single torrent file provides redundancy case one tracker fails trackers continue maintain swarm torrent one disadvantage becomes possible multiple unconnected swarms single torrent users connect one specific tracker unable connect another create disjoint set impede efficiency torrent transfer files describes additional extensions peer exchange dht mitigate effect rapidly merging otherwise disjoint graphs peers vuze formerly azureus first bittorrent client implement system distributed hash table dht method alternative incompatible dht system known mainline dht developed simultaneously later adopted bittorrent mainline µtorrent transmission rtorrent ktorrent bitcomet deluge clients current versions official bittorrent client µtorrent bitcomet transmission bitspirit share compatibility mainline dht dht implementations based kademlia version 3.0.5.0 vuze also supports mainline dht addition distributed database use optional application plugin mainlinedht plugin potentially allows vuze client reach bigger swarm bittorrent clients also use peer exchange pex gather peers addition trackers dht peer exchange checks known peers see know peers 3.0.5.0 release vuze major bittorrent clients compatible peer exchange one options http based tracker protocol compact flag flag defined bep 23 specifies tracker compact response encoding ipv4 addresses set 4 bytes 32 bits ipv6 though 128 bits long compact would break ipv6 support handle situation clients trackers must either avoid using compact announces ipv6 implement bep 07 opentracker dirk engling powered one biggest bittorrent trackers pirate bay tracker atrack high performance open source tracker designed run google app engine bitstorm small tracker written php require database server runs php compatible web server bitstorm 2 uses mysql database instead flat file improve scalability bittorious open source commercially supported tracker integrated web-based management portal hefur standalone bittorrent tracker written c++ mit license ocelot bittorrent tracker written c++ gazelle project | [
2984,
3172,
806,
7343,
7637,
6025,
7744,
499,
4434,
4891,
5414,
3573,
3819,
3739,
2430,
2696,
1329,
6499
] | Validation |
7,715 | 1 | Microsoft_SQL_Server:microsoft sql server microsoft sql server relational database management system developed microsoft database server software product primary function storing retrieving data requested software applications—which may run either computer another computer across network including internet microsoft markets least dozen different editions microsoft sql server aimed different audiences workloads ranging small single-machine applications large internet-facing applications many concurrent users history microsoft sql server begins first microsoft sql server product—sql server 1.0 16-bit server os/2 operating system 1989—and extends current day following versions supported microsoft sql server 2016 onward product supported x64 processors current version microsoft sql server 2017 released october 2 2017 rtm version 14.1709.3807.1 sql server 2019 released community technology preview slated release manufacturing second half 2019 microsoft makes sql server available multiple editions different feature sets targeting different users editions protocol layer implements external interface sql server operations invoked sql server communicated via microsoft-defined format called tabular data stream tds tds application layer protocol used transfer data database server client initially designed developed sybase inc. sybase sql server relational database engine 1984 later microsoft microsoft sql server tds packets encased physical transport dependent protocols including tcp/ip named pipes shared memory consequently access sql server available protocols addition sql server api also exposed web services data storage database collection tables typed columns sql server supports different data types including primitive types integer float decimal char including character strings varchar variable length character strings binary unstructured blobs data text textual data among others rounding floats integers uses either symmetric arithmetic rounding symmetric round fix depending arguments codice_1 gives 3 microsoft sql server also allows user-defined composite types udts defined used also makes server statistics available virtual tables views called dynamic management views dmvs addition tables database also contain objects including views stored procedures indexes constraints along transaction log sql server database contain maximum 2 objects span multiple os-level files maximum file size 2 bytes 1 exabyte data database stored primary data files extension codice_2 secondary data files identified codice_3 extension used allow data single database spread across one file optionally across one file system log files identified codice_4 extension storage space allocated database divided sequentially numbered pages 8 kb size page basic unit i/o sql server operations page marked 96-byte header stores metadata page including page number page type free space page id object owns page type defines data contained page data stored database index allocation map holds information pages allocated tables indexes change map holds information changes made pages since last backup logging contain large data types image text page basic unit i/o operation space actually managed terms extent consists 8 pages database object either span 8 pages extent uniform extent share extent 7 objects mixed extent row database table span one page limited 8 kb size however data exceeds 8 kb row contains varchar varbinary data data columns moved new page possibly sequence pages called allocation unit replaced pointer data physical storage table rows divided series partitions numbered 1 n partition size user defined default rows single partition table split multiple partitions order spread database computer cluster rows partition stored either b-tree heap structure table associated clustered index allow fast retrieval rows rows stored in-order according index values b-tree providing index data leaf node leaves nodes storing index values leaf data reachable respective nodes index non-clustered rows sorted according index keys indexed view storage structure indexed table table without clustered index stored unordered heap structure however table may non-clustered indices allow fast retrieval rows situations heap structure performance advantages clustered structure heaps b-trees span multiple allocation units sql server buffers pages ram minimize disk i/o 8 kb page buffered in-memory set pages currently buffered called buffer cache amount memory available sql server decides many pages cached memory buffer cache managed buffer manager either reading writing page copies buffer cache subsequent reads writes redirected in-memory copy rather on-disc version page updated disc buffer manager in-memory cache referenced time writing pages back disc asynchronous i/o used whereby i/o operation done background thread operations wait i/o operation complete page written along checksum written reading page back checksum computed matched stored version ensure page damaged tampered meantime sql server allows multiple clients use database concurrently needs control concurrent access shared data ensure data integrity—when multiple clients update data clients attempt read data process changed another client sql server provides two modes concurrency control pessimistic concurrency optimistic concurrency pessimistic concurrency control used sql server controls concurrent access using locks locks either shared exclusive exclusive lock grants user exclusive access data—no user access data long lock held shared locks used data read—multiple users read data locked shared lock acquire exclusive lock latter would wait shared locks released locks applied different levels granularity—on entire tables pages even per-row basis tables indexes either entire index index leaves level granularity used defined per-database basis database administrator fine-grained locking system allows users use table index simultaneously requires resources automatically yield higher performance sql server also includes two lightweight mutual exclusion solutions—latches spinlocks—which less robust locks less resource intensive sql server uses dmvs resources usually busy sql server also monitors worker threads acquire locks ensure end deadlocks—in case sql server takes remedial measures many cases kill one threads entangled deadlock roll back transaction started implement locking sql server contains lock manager lock manager maintains in-memory table manages database objects locks along metadata lock access shared object mediated lock manager either grants access resource blocks sql server also provides optimistic concurrency control mechanism similar multiversion concurrency control used databases mechanism allows new version row created whenever row updated opposed overwriting row i.e. row additionally identified id transaction created version row old well new versions row stored maintained though old versions moved database system database identified codice_5 row process updated requests blocked unlike locking executed older version row request update statement result two different versions rows—both stored database identified respective transaction ids main mode retrieving data sql server database querying query expressed using variant sql called t-sql dialect microsoft sql server shares sybase sql server due legacy query declaratively specifies retrieved processed query processor figures sequence steps necessary retrieve requested data sequence actions necessary execute query called query plan might multiple ways process query example query contains join statement select statement executing join tables executing select results would give result selecting table executing join result different execution plans case sql server chooses plan expected yield results shortest possible time called query optimization performed query processor sql server includes cost-based query optimizer tries optimize cost terms resources take execute query given query query optimizer looks database schema database statistics system load time decides sequence access tables referred query sequence execute operations access method used access tables example table associated index whether index used index column unique columns low selectivity might worthwhile use index access data finally decides whether execute query concurrently concurrent execution costly terms total processor time execution actually split different processors might mean execute faster query plan generated query temporarily cached invocations query cached plan used unused plans discarded time sql server also allows stored procedures defined stored procedures parameterized t-sql queries stored server issued client application case general queries stored procedures accept values sent client input parameters send back results output parameters call defined functions stored procedures including stored procedure set number times selectively provided access unlike queries stored procedures associated name used runtime resolve actual queries also code need sent client every time accessed name reduces network traffic somewhat improves performance execution plans stored procedures also cached necessary t-sql transact-sql microsoft proprietary procedural language extension sql server provides repl read-eval-print-loop instructions extend standard sql instruction set data manipulation dml data definition ddl instructions including sql server-specific settings security database statistics management exposes keywords operations performed sql server including creating altering database schemas entering editing data database well monitoring managing server client applications consume data manage server leverage sql server functionality sending t-sql queries statements processed server results errors returned client application exposes read-only tables server statistics read management functionality exposed via system-defined stored procedures invoked t-sql queries perform management operation also possible create linked servers using t-sql linked servers allow single query process operations performed multiple servers sql server native client native client side data access library microsoft sql server version 2005 onwards natively implements support sql server features including tabular data stream implementation support mirrored sql server databases full support data types supported sql server asynchronous operations query notifications encryption support well receiving multiple result sets single database session sql server native client used hood sql server plug-ins data access technologies including ado ole db sql server native client also directly used bypassing generic data access layers november 28 2011 preview release sql server odbc driver linux released microsoft sql server 2005 includes component named sql clr common language runtime via integrates .net framework unlike applications use .net framework sql server hosts .net framework runtime i.e. memory threading resource management requirements .net framework satisfied sqlos rather underlying windows operating system sqlos provides deadlock detection resolution services .net code well sql clr stored procedures triggers written managed .net language including c vb.net managed code also used define udt user defined types persist database managed code compiled cli assemblies verified type safety registered database invoked like procedure however subset base class library available running code sql clr apis relating user interface functionality available writing code sql clr data stored sql server databases accessed using ado.net apis like managed application accesses sql server data however creates new database session different one code executing avoid sql server provides enhancements ado.net provider allows connection redirected session already hosts running code connections called context connections set setting codice_6 parameter codice_7 connection string sql server also provides several enhancements ado.net api including classes work tabular data single row data well classes work internal metadata data stored database also provides access xml features sql server including xquery support enhancements also available t-sql procedures consequence introduction new xml datatype query value nodes functions sql server also includes assortment add-on services essential operation database system provide value added services top core database management system services either run part sql server component out-of-process windows service presents api control interact sql server machine learning services operates within sql server instance allowing people machine learning data analytics without send data across network limited memory computers services come microsoft r python distributions contain commonly used packages data science along proprietary packages e.g revoscalepy revoscaler microsoftml used create machine models scale analysts either configure client machine connect remote sql server push script executions run r python scripts external script inside t-sql query trained machine learning model stored inside database used scoring used inside instance programming environment cross-instance applications service broker communicates tcp/ip allows different components synchronized via exchange messages service broker runs part database engine provides reliable messaging message queuing platform sql server applications sql server replication services used sql server replicate synchronize database objects either entirety subset objects present across replication agents might database servers across network database caches client side lulla follows publisher/subscriber model i.e. changes sent one database server publisher received others subscribers sql server supports three different types replication sql server analysis services adds olap data mining capabilities sql server databases olap engine supports molap rolap holap storage modes data analysis services supports xml analysis standard underlying communication protocol cube data accessed using mdx linq queries data mining specific functionality exposed via dmx query language analysis services includes various algorithms—decision trees clustering algorithm naive bayes algorithm time series analysis sequence clustering algorithm linear logistic regression analysis neural networks—for use data mining sql server reporting services report generation environment data gathered sql server databases administered via web interface reporting services features web services interface support development custom reporting applications reports created rdl files reports designed using recent versions microsoft visual studio visual studio.net 2003 2005 2008 business intelligence development studio installed included report builder created rdl files rendered variety formats including excel pdf csv xml bmp emf gif jpeg png tiff html web archive originally introduced post-release add-on sql server 2000 notification services bundled part microsoft sql server platform first time sql server 2005 sql server notification services mechanism generating data-driven notifications sent notification services subscribers subscriber registers specific event transaction registered database server trigger event occurs notification services use one three methods send message subscriber informing occurrence event methods include smtp soap writing file filesystem notification services discontinued microsoft release sql server 2008 august 2008 longer officially supported component sql server database platform sql server integration services ssis provides etl capabilities sql server data import data integration data warehousing needs integration services includes gui tools build workflows extracting data various sources querying data transforming data—including aggregation de-duplication de-/normalization merging data—and exporting transformed data destination databases files sql server full text search service specialized indexing querying service unstructured text stored sql server databases full text search index created column character based text data allows words searched text columns performed sql codice_8 operator using sql server full text search service efficient full allows inexact matching source string indicated rank value range 0 1000—a higher rank means accurate match also allows linguistic matching inflectional search i.e. linguistic variants word verb different tense also match given word lower rank exact match proximity searches also supported i.e. words searched occur sequence specified query near also considered match t-sql exposes special operators used access fts capabilities full text search engine divided two processes filter daemon process codice_9 search process codice_10 processes interact sql server search process includes indexer creates full text indexes full text query processor indexer scans text columns database also index binary columns use ifilters extract meaningful text binary blob example microsoft word document stored unstructured binary file database ifilters hosted filter daemon process text extracted filter daemon process breaks sequence words hands indexer indexer filters noise words i.e. words like etc. occur frequently useful search remaining words inverted index created associating word columns found sql server includes gatherer component monitors changes tables invokes indexer case updates full text query received sql server query processor handed fts query processor search process fts query processor breaks query constituent words filters noise words uses inbuilt thesaurus find linguistic variants word words queried inverted index rank accurateness computed results returned client via sql server process sqlcmd command line application comes microsoft sql server exposes management features sql server allows sql queries written executed command prompt also act scripting language create run set sql statements script scripts stored codice_11 file used either management databases create database schema deployment database sqlcmd introduced sql server 2005 continues sql server 2012 2014 2016 predecessor earlier versions osql isql functionally equivalent pertains tsql execution many command line parameters identical although sqlcmd adds extra versatility microsoft visual studio includes native support data programming microsoft sql server used write debug code executed sql clr also includes data designer used graphically create view edit database schemas queries created either visually using code ssms 2008 onwards provides intellisense sql queries well sql server management studio gui tool included sql server 2005 later configuring managing administering components within microsoft sql server tool includes script editors graphical tools work objects features server sql server management studio replaces enterprise manager primary management interface microsoft sql server since sql server 2005 version sql server management studio also available sql server express edition known sql server management studio express ssmse central feature sql server management studio object explorer allows user browse select act upon objects within server used visually observe analyze query plans optimize database performance among others sql server management studio also used create new database alter existing database schema adding modifying tables indexes analyze performance includes query windows provide gui based interface write execute queries sql server operations studio preview cross platform query editor available optional download tool allows users write queries export query results commit sql scripts git repositories perform basic server diagnostics sql server operations studio supports windows mac linux systems business intelligence development studio bids ide microsoft used developing data analysis business intelligence solutions utilizing microsoft sql server analysis services reporting services integration services based microsoft visual studio development environment customized sql server services-specific extensions project types including tools controls projects reports using reporting services cubes data mining structures using analysis services sql server 2012 later ide renamed sql server data tools ssdt | [
3599,
4290,
2180,
6420,
1449,
2911,
1081,
3951,
3961,
5736,
2924,
3280,
3962,
2566,
4323,
2571,
4697,
5747,
6110,
6445,
3975,
6821,
3303,
6462,
4345,
53,
7205,
2956,
422,
4001,
425,
5425,
2961,
6141,
7213,
7215,
432,
1891,
779,
4739,
84... | Train |
7,716 | 2 | Userful:userful userful corporation canadian software company specializes video walls digital signage interactive displays desktop virtualization founded 2003 userful develops software turns standard pc high end video wall controller video wall processor userful head office located calgary alberta privately held for-profit company resellers around world founder chief technology officer timothy griffin founded userful corporation 2003 company commenced work multi-screen desktop computing platform core userful software first userful software release 2002 quickest market uptake low cost approach desktop virtualization schools public libraries locations needed locked virtual desktops military oilfields deployment 2014 userful launched video wall digital signage software built pc network zero client infrastructure desktop virtualization product october 2018 userful named john marshall new chief executive officer february 2009 userful announced claimed world largest desktop virtualization deployment 356,800 virtual desktops brazil may 2012 userful launched version 5 multiseat software added ethernet zero client support april 2012 userful announced partnership viewsonic produce linux-based zero-client product february 2013 userful launched userful multiplatform 6 enables running windows linux browser desktops multiseat environment february 2014 userful launched userful multiplatform 7.0 provides desktop virtualization central management desktops touch screens kiosks october 2014 userful partnered viewsonic create sc-u25 value vdi client userful multiplatform software december 2014 userful launched userful network video wall software turns standard pc video wall controller video wall processor supports ultra-high definition content one core i7 pc multiple video walls 25 standard displays august 2015 version 8.0 userful network video wall released updating core platform userful products improving performance reliability january 2016 version 8.5 userful released updating core platform include core enhancements enhanced support features vdi video walls may 2016 version 8.6 userful released update supports 8k video walls including enhanced features support vdi video walls september 2016 userful released version 8.7 featuring enhancements minor updates december 2016 userful released version 9.0 added many interactive features enhancements video walls digital signage see list userful software products built combination centos linux userful ’ software provisions manages zero clients userful software turns standard pc video wall controller video wall processor delivers content gigabit ethernet network userful software utilizes cpu gpu intel platform process render high resolution real time content release userful network video wall december 2014 world first commercially available video wall solution deliver real-time 4k content standard ethernet network one pc january 2016 userful updated video wall solution world first network video wall capable 6k source content real time ability support 40 screens one standard pc 60 screens high-end pc userful merged virtual desktop platform 8.5 release enabling delivery virtual desktops video wall userful also announced support multi-zone configurations allowing video wall broken sections different real time content played different zones within video wall may 2016 userful released version 8.6 improving display quality use discrete compatible gpus announced support 8k video content playback december 2016 userful launched version 9.0 increased number screens supported 1 pc 100 release also included interactivity tools ability store invoke presets change content zone configurations fly userful multiplatform multiseat desktop virtualization product works oracle virtualbox enable creation management multiple windows linux cloud desktops commercially available hardware userful desktop combines customized configurable gnome desktop managed remotely in-house tools product specifically designed full public computing solution kiosks public access computers desktop settings managed session profiles created stored central web portal pre-book open source pc reservation system originally client software userful/linux windows however opensource windows software since discontinued pre-book feature available people using userful platform public computing wanting advance reservations multi-location time management available cloud subscription feature starting release 8.5 userful ’ desktop virtualization video wall features joined single platform offers virtual desktops video wall digital signage solutions starting release 8.9 public computing features userful desktop pre-book also merged unified platform called userful userful multiseat linux replaced userful multiplatform software turns one linux computer 20 independent computer stations includes educational applications userful multiseat linux software linux-based equivalent windows multipoint server multiseat solutions education sector userful multiseat formerly userful multiplier commercial linux-based multiseat configuration software package allows multiple independent users connect single host pc time monitor keyboard mouse applications | [
2961,
6572
] | Test |
7,717 | 9 | Logic_for_Computable_Functions:logic computable functions logic computable functions lcf interactive automated theorem prover developed universities edinburgh stanford robin milner others 1972 lcf introduced general-purpose programming language ml allow users write theorem-proving tactics theorems system terms special theorem abstract data type ml type system ensures theorems derived using inference rules given operations abstract type successors include hol higher order logic isabelle | [
7009,
7711,
7713,
2778,
5164
] | Test |
7,718 | 6 | Disc_Filing_System:disc filing system disc filing system dfs computer file system developed acorn computers initially add-on eurocard-based acorn system 2 1981 education departments western australia south australia announced joint tenders calling supply personal computers schools acorn australian computer distributor barson computers convinced joint managing directors hermann hauser chris curry allow soon released acorn bbc microcomputer offered disk storage part bundle agreed condition barson adapted acorn dfs system 2 without assistance acorn resources available required minor hardware software changes make dfs compatible bbc micro barson tenders states dfs fitted year ahead uk early initiative resulted bbc micro heavily focused education market australia little penetration home computer market arrival acorn electron dfs shipped rom disk controller chip fitted bbc micro motherboard filing system extremely limited functionality storage capability using flat directory structure filename seven letters long plus one letter directory file stored dfs remarkable unlike filing systems single vendor implementation original dfs written acorn continued maintain codebase various disc drive vendors wrote implementations companies wrote dfs implementations included cumana opus watford electronics watford electronics implementation notable supporting 62 files per disc instead usual 31 using non-standard disc format features third-party implementations included able review free space built-in codice_1 codice_2 commands shipped utility disc original acorn dfs acorn followed original dfs series acorn 1770 dfs used disc format earlier version added set extra commands supported improved wd1770 floppy drive controller chip dfs conventionally uses one side double-density 5¼ floppy disc discs formatted either 40 80 track giving capacity 100 200 kb per side ten 256-byte sectors per track fm encoding capacity limited choice intel 8271 controller original bbc micro supports fm encoding mfm encoding already common use time bbc micro launch fm encoding gives half recording capacity mfm given physical disc density fm mfm encoding commonly referred single density double density although discs drives unlike high density uses different drives discs double-density 3½ discs formatted used 1770 dfs intel 8271-based dfs problems many 3½ drives giving single-density capacity fm encoding originally standard practice 3½ discs normally formatted mfm double density using later advanced disc filing system present acorn machines supplied 3½ drives 2009 3½ drives commonly used bbc micros past including use dfs due greater availability easier data interchange recent computers high-density 5¼ 3½ discs supported dfs dfs directly support double-sided discs instead two heads double-sided drive treated two separate logical drives dfs support four volumes numbered 0 3 drive 0 default drive 1 representing second drive attached cable drive 2 referred reverse side drive 0 drive 3 reverse drive 1 support two physical drives due installed base single-sided drives commercial software normally provided single-sided discs flippy discs manually reversed access side discs formatted using 40 80 tracks using codice_3 codice_4 commands drives either 40 80 track common compatibility issue dfs users 40-track discs norm commercial software distribution due installed base 40-track drives 80-track drives became common prices dropped allowing users store data 80-track drive automatically read 40-track discs disc capacity stored sector count catalogue track zero track zero located place 40- 80-track discs allowing disc file system set motor stepping accordingly however intel 8271-based acorn dfs dual-format capability addressed number ways failure use correct setting would result errors dfs codice_5 damage disc drive trying step heads beyond physical end disc surface switching 80 tracks extend catalogue way leaving user prone running filename slots running space disc situation resulted codice_6 error dfs case-preserving case-sensitive prevalence all-capitals filenames likely due bbc micro defaulting caps lock enabled hard soft reset character set quite permissive printable characters 7-bit ascii allowed including spaces excluding sake portability third-party dfs implementations best avoid codice_12 codice_16 leaf names quotation marks allowed although bbc basic requires escaped twice fully qualified filename file specification fsp short contains colon drive number dot directory letter another dot name example file default directory drive 2 called codice_31 would complete specification codice_32 drive directory specifiers optional directories dfs single character prefixes filenames codice_21 codice_34 used group files arrangement flat default directory codice_35 used instead root directory requesting catalogue disc codice_36 codice_37 commands files current directory shown directory prefix one block listed files second block directory prefixes visible example acorn dfs third party dfs implementations may vary slightly top seven files current directory codice_35 drive 0 files directories case codice_39 codice_40 codice_21 codice_42 filename codice_43 shows file locked modification deletion first line contains disc title modification count dfs provides working space divided directory library directory working directory current volume much like working directory command line system library second alternative working directory functions like path benefit able volume requests open files unqualified names first searched working directory failing library directory also searched directory library default directory catalogue file table occupies first two disc sectors one names directories file matching sector holding file locations sizes metadata eight bytes sector used file eight bytes sector reserved 12-byte disc title volume information total number files disc irrespective directory file limited 31 interests saving space significant bit directory letter file used locked read-only flag although physical disks usually formatted either 100 kb 200 kb dfs supports volume sizes 256 kb largest dfs file size allowed volume size minus ½ kb catalogue file sizes stored 18-bit quantity dfs support data fragmentation meaning file data must stored single run consecutive sectors free space prone becoming fragmented random-access file writes fail end file reaches beginning next even though may free sectors elsewhere disc cases dfs aborts codice_44 error codice_45 split file fit available space either failure occurs sector allocation stage error returned codice_46 codice_47 command provided relocate files disc solid block placing free space second block allows next file created fill disc last existing file extended without moved codice_45 virtually deletes existing file copies specified block memory wherever space disc contrast codice_47 command uses program memory buffer relocate files overwriting program data memory like cassette filing system acorn dfs supports bbc micro standard file metadata load address execution address required acorn mos operating system used bbc micro support relocation binary code file loaded address programmer intended contents may refer internal locations absolute addresses execution address also recorded entry point necessarily beginning even within file file attributes limited single bit locked set codice_42 appears right file name catalogue file may altered overwritten deleted dfs discs track dates acorn mos prior version 3 maintain real-time clock instead offer peculiar feature modification count every time catalogue updated count increments count shown parentheses title first line disc catalogue codice_51 catalogue listing shown earlier dfs also supports means start disc software based key sequence shift key held machine soft hard reset dfs checks drive 0 disc containing positive boot flag boot flag either 0 ignore 1 load file 2 run machine code file 3 execute script boot flag positive file called codice_52 looked loaded memory 1 loaded executed machine code 2 fed keyboard buffer 3 option 3 reads exec files text macro files used primitive shell scripts true shell scripts simply series keys typed like recording play back thus loop branch unless input code basic interpreter well used reset executed time operating system codice_53 command exec files file system independent variant dfs called dnfs disc/network filing system contained econet network filing system nfs standard disc filing system tube co-processor support software single rom rom installed two filing systems os initial design dfs based around intel corporation fdc 8271 disc drive controller immediate predecessor 8272 design found ibm personal computer 8271 controller limited functionality obsolete later versions file system various vendors including solidisk acorn watford electronics based later wd1770 wd1772 drive controllers 1770 controller quickly became standard controller acorn range following advent adfs dfs superseded advanced disc filing system adfs fully hierarchical suitable running hard drives bbc micro adfs default filing system bbc master users likely reverted dfs compatibility reasons adfs could read dfs discs adfs also chosen standard filing system risc os | [
3599,
2547,
7161,
4672,
6431,
3626,
5049,
6117,
759,
6854,
5437,
7588,
4375,
6500,
6505,
2630,
5457,
460,
1534,
7246,
7976,
4406,
821,
7258,
5130,
1561,
836,
5843,
2313,
6558,
2683,
5859,
5865,
4444,
5518,
6231,
5877,
869,
2704,
1605,
1... | Validation |
7,719 | 9 | LEGO_(proof_assistant):lego proof assistant lego proof assistant developed randy pollack university edinburgh implements several type theories edinburgh logical framework lf calculus constructions coc generalized calculus constructions gcc unified theory dependent types utt | [
4240
] | Test |
7,720 | 1 | Liberian_companies:liberian companies companies republic liberia regulated variety laws corporate laws liberia promulgated 50 years ago provide offshore jurisdiction ship owners international financial community liscr liberian international ship corporate registry appointed government liberia agent manage corporate registry act sole registered agent corporations registered liberia place business elsewhere corporate registry managed liscr located dulles virginia us office zurich switzerland two income tax treaties sweden germany force additionally liberia corporate jurisdiction oecd ’ white-list countries substantially implemented tax transparency meet internationally agreed tax standard liberian registry – second largest world – includes 4,300 ships 160 million gross tons accounts 12 percent world ’ oceangoing fleet liberian fleet one youngest nations average vessel age 12 years according u.s. maritime administration liberian-flagged vessels carry one-third oil imported united states liberian registry administered liberian international ship corporate registry liscr llc u.s. owned operated company provides day-to-day management republic liberia rol ship corporate registry addition regional offices many major maritime centers world liberian registry also supported worldwide network 400 nautical inspectors auditors liberian registry open ship owner world order enter liberian registry vessel must less 20 years age must meet high safety standards liberian flagged ships able trade anywhere world crew nationality restrictions taxes liberian vessels conservative rates based net tonnage registration vessels eligible liberian entities registered business entities incorporated jurisdictions registered liberian foreign maritime entity liberian corporations llcs partnerships not-for-profit businesses easily formed special documents required submitted order form confirming details entity requested however accept formation instructions professional user offshore corporations including ship managers manning agents ship owners etc. well trust company managers lawyers accountants investment companies etc accept instructions directly individuals engaged professionally company management acting professional advisor lawyer articles incorporation include minimum name corporation purpose corporation type shares total authorized share capital name incorporator names subscribers shares number initial directors directors shareholders officers need registered liberia thus possible obtain public record form evidence directors shareholders officers particular feature makes administration liberian company particularly simple offshore trust companies unfortunately sometimes create difficulties liberian company enter contract since counter-party must follow paper trail ensure dealing duly elected officials company purpose liberian corporations voluntarily file information needed conduct business liberian companies shall keep correct complete books records account shall keep minutes meetings shareholders actions taken consent shareholders meetings board directors actions taken consent directors meetings executive committee requirement file information public register instead corporation responsible safekeeping records requirement audited accounts liberian corporation decision audit accounts one shareholders take costs 713.50 register company liberia annual registration fee 450.00 requirement company director physically present liberia time capital investment requirements start liberian company maintain non-resident domestic corporation status least 75 previously 50 company shares share subscription rights must owned controlled non-residents liberia liberia special bank secrecy laws like tax havens deterrent liberian offshore corporations actually handle banking transactions within liberia ’ territory borders moreover requirement must bank liberia certified copies filed corporate records available order public | [
2188
] | Validation |
7,721 | 9 | PDF/UA:pdf/ua pdf/ua pdf/universal accessibility informal name iso 14289 international standard accessible pdf technology technical specification intended developers implementing pdf writing processing software pdf/ua provides definitive terms requirements accessibility pdf documents applications equipped appropriate software conformance pdf/ua ensures accessibility people disabilities use assistive technology screen readers screen magnifiers joysticks technologies navigate read electronic content february 18 2015 us access board announced proposed rule us federal policy accessibility commonly known section 508 proposed rule identifies pdf/ua equivalent wcag 2.0 appropriate content pdf/ua separate file-format simply way use familiar pdf format invented adobe systems standardized iso 32000 general pdf/ua requires tagged pdf iso 32000-1 14.8 adds variety qualitative requirements especially regarding semantic correctness tags employed pdf/ua complements wcag 2.0 used make pdf files also conform wcag 2.0 2014 update pdf/ua published december 2014 first fully accessible standard iso ever published pdf file distributed iso conforms pdf/ua formal name pdf/ua iso 14289-1 document management applications -- electronic document file format enhancement accessibility -- part 1 use iso 32000-1 pdf/ua-1 pdf/ua specification written software developers pdf/ua support interest persons disabilities require benefit assistive technology reading electronic content pdf/ua conforming files readers assistive technology users guaranteed – far pdf format provide – equal access information benefits pdf/ua extend beyond people disabilities support pdf/ua reader software able reliably reflow text onto small screens provide powerful navigation options transform text appearance improve search engine functionality aid selection copying text pdf/ua project began 2004 aiim standards committee pdf/ua wiki operated aiim contains agendas meeting-minutes public-access documents pertaining development pdf/ua chaired since 2005 duff johnson 2009 aiim pdf/ua committee became u.s. committee iso/awi accepted work item 14289 cherie ekholm microsoft international project leader us committee continued main driver standard development wd cd dis fdis phases iso standards development review comment balloting member bodies iso tc 171 iso 14289-1:2012 pdf/ua published july 2012 minor update iso 14289-1:2014 published december 2014 document available directly iso webstore october 2012 us library congress added pdf/ua list archivable file formats loc guidance states pdf/ua ... preferred format page-oriented content library congress adobe systems largest implementer interactive pdf software announced intention support pdf/ua december 2014 iso published iso 14289-1:2014 minor revision original 2012 document march 2016 aiim ansi published pdf/ua american national standard aiim us committee pdf/ua published following documents support pdf/ua work iso 14289-2 pdf/ua-2 ongoing pdf/ua-2 based pdf 2.0 aiim us committee pdf/ua led development document 2004 2010 draft became iso nwi us iso committees maintain work aiim pdf standards wiki participation subject matter experts software developers interested parties invited encouraged pdf association helps promote pdf/ua variety ways 2011 pdf association created pdf/ua competence center way vendors develop educational resources share experiences regarding implementation pdf/ua matterhorn protocol see product pdf/ua competence center 2012 2013 pdf association helped raise money awareness nv access nvda development world first pdf/ua conforming screen reader august 2013 pdf association pdf/ua competence center published matterhorn protocol set 31 checkpoints 136 failure conditions help software developers make easier document authors create fully accessible pdf files forms june 2014 pdf association pdf/ua competence center published first iteration pdf/ua reference suite set reference-quality documents conforming pdf/ua-1. ref name= pdf/ua reference suite /ref december 2015 pdf association pdf/ua competence center unveiled first public draft tagged pdf best practice guide publication expected summer 2016 pdf association conducted numerous educational seminars pdf/ua throughout europe north america australia 2012 2013 book pdf/ua nutshell produced english german informational brochure also produced languages | [
6172,
3620,
1543,
6428,
7732,
6015,
2214,
737,
4884,
6208,
1114,
5948,
1774,
2057,
2872,
2877,
3916,
698,
1435,
7144
] | Test |
7,722 | 8 | Amazon_Simple_Queue_Service:amazon simple queue service amazon simple queue service amazon sqs distributed message queuing service introduced amazon.com late 2004 supports programmatic sending messages via web service applications way communicate internet sqs intended provide highly scalable hosted message queue resolves issues arising common producer-consumer problem connectivity producer consumer amazon sqs described commoditization messaging service well-known examples messaging service technologies include ibm websphere mq microsoft message queuing unlike technologies users need maintain server amazon sells sqs service per-use rate amazon provides sdks several programming languages including java ruby python .net php javascript java message service jms 1.1 client amazon sqs released december 2014 amazon sqs provides authentication procedures allow secure handling data amazon uses amazon web services aws identification requiring users aws enabled account amazon.com created amazon web services aws cloud computing services aws assigns pair related identifiers aws access keys aws enabled account perform identification first identifier public 20-character access key key included aws service request identify user user using soap protocol ws-security digital signature calculated using secret access key secret access key 40-character private identifier aws uses access key id provided service request look account secret access key amazon.com calculates digital signature key match user considered authentic authentication fails request processed amazon sqs guarantees at-least-once delivery messages stored multiple servers redundancy ensure availability message delivered server available may removed server queue may resent amazon sqs guarantee recipient receive messages order sent sender message ordering important required application place sequencing information within messages allow reordering delivery messages type data contained within restricted message bodies initially limited 8kb size later raised 64kb 2010-07-01 256kb 2013-06-18 larger messages user options get around limitation large message split multiple segments sent separately message data stored using amazon simple storage service amazon s3 amazon dynamodb pointer data transmitted sqs message amazon made extended client library available purpose extension amazon sqs client enables sending receiving messages 2gb via amazon s3 awslabs/amazon-sqs-java-extended-client-lib service supports unlimited queues message traffic sqs automatically delete messages sent message delivered receipt handle generated delivery sent recipient receipts sent message addition sqs requires recipient provide receipt order delete message feature new 2008 message id required message deletion system distributed message may sent case recent receipt handle needed delete message message delivered visibility timeout prevent components consuming clock visibility timeout starts message sent default time 30 seconds queue told delete message time message becomes visible resent queue also consists retention parameter defaulting 4 days message residing queue longer purged automatically retention modified 1 minute 14 days user retention changed messages already queue message queue longer new retention purged dropbox netflix nextdoor examples companies use sqs extensively sqs also widely used within amazon.com first 1 million monthly requests free pricing follows regions date transfer price | [
5894,
2451,
4217,
2988,
7613,
632,
1634,
3091,
6262,
3953,
6428,
8083,
6806,
3627,
1550,
5927,
2212,
5135,
1757,
3028,
7838,
6029,
842,
4163,
7102,
5064,
330,
6219,
1125,
518,
2961,
2517,
5965,
2700,
7037,
2530,
5706,
1514,
5889
] | Test |
7,723 | 7 | Borg_(cluster_manager):borg cluster manager borg cluster manager used google led widespread use similar approaches docker kubernetes | [
2008
] | Test |
7,724 | 2 | ArchOne:archone archone arch linux based operating system optimized acer aspire one netbooks usable pcs similar hardware archone preconfigured support hardware acer aspire one drivers network sound graphics special keys webcam active make hardware ready use immediately upon first boot archone uses rolling-release model upgrades archone three versions different desktop manager openbox edition gnome edition kde edition. application software including firefox google chrome skype keepassx hsoconnect gparted gimp openoffice.org vlc mplayer | [
3559,
3751,
5232
] | Test |
7,725 | 4 | Email_encryption:email encryption email encryption encryption email messages protect content read entities intended recipients email encryption may also include authentication email prone disclosure information emails currently transmitted clear encrypted form emails sent using gmail outlook encrypted default possible send unencrypted email using gmail warning icon appear address bar means available tools persons designated recipients read email contents email encryption rely public-key cryptography users publish public key others use encrypt messages keeping secret private key use decrypt messages digitally encrypt sign messages send original design email protocol communication email servers plain text posed huge security risk years various mechanisms proposed encrypt communication email servers encryption may occur transport level aka hop hop end-to-end transport layer encryption often easier set use end-to-end encryption provides stronger defenses difficult set use one commonly used email encryption extensions starttls tls ssl layer plaintext communication allowing email servers upgrade plaintext communication encrypted communication assuming email servers sender recipient side support encrypted communication eavesdropper snooping communication mail servers use sniffer see email contents similar starttls extensions exist communication email client email server see imap4 pop3 stated rfc 2595 starttls may used regardless whether email contents encrypted using another protocol encrypted message revealed altered intermediate email relays words encryption takes place individual smtp relays sender recipient good bad consequences key positive trait transport layer encryption users need change anything encryption automatically occurs send email addition since receiving organizations decrypt email without cooperation end user receiving organizations run virus scanners spam filters delivering email recipient however also means receiving organization anyone breaks organization email system unless steps taken easily read modify email receiving organization considered threat end-to-end encryption necessary electronic frontier foundation encourages use starttls launched 'starttls everywhere initiative make simple easy everyone help ensure communications email ’ vulnerable mass surveillance support starttls become quite common google reports gmail 90 incoming email 90 outgoing email encrypted using starttls 2018-07-24 mandatory certificate verification historically viable internet mail delivery without additional information many certificates verifiable want email delivery fail case result email delivered tls uses opportunistic encryption dane proposed standard makes incremental transition verified encryption internet mail delivery possible starttls everywhere project uses alternative approach support “ preload list ” email servers promised support starttls help detect prevent downgrade attacks end-to-end encryption data encrypted decrypted end points words email sent end-to-end encryption would encrypted source unreadable service providers like gmail transit decrypted endpoint crucially email would decrypted end user computer would remain encrypted unreadable form email service like gmail would n't keys available decrypt email services integrate end-to-end encryption automatically notable protocols end-to-end email encryption include openpgp data encryption standard allows end-users encrypt email contents various software email-client plugins allow users encrypt message using recipient public key sending core openpgp uses public key cryptography scheme email address associated public/private key pair openpgp provides way end users encrypt email without support server sure intended recipient read however usability issues openpgp — requires users set public/private key pairs make public keys available widely also protects content email metadata — untrusted party still observe sent email general downside end end encryption schemes—where server decryption keys—is makes server side search almost impossible thus impacting usability signed encrypted email internet demonstration shown organizations collaborate effectively using secure email previous barriers adoption overcome including use pki bridge provide scalable public key infrastructure pki use network security guards checking encrypted content passing corporate network boundaries avoid encryption used hide malware introduction information leakage transport layer encryption using starttls must set receiving organization typically straightforward valid certificate must obtained starttls must enabled receiving organization email server prevent downgrade attacks organizations send domain 'starttls policy list' full-featured email clients provide native support s/mime secure email digital signing message encryption using certificates encryption options include pgp gnu privacy guard gnupg free commercial software desktop application webmail add-ons available well pgp protect messages also hard use correct way researchers carnegie mellon university published paper 1999 showing people could n't figure sign encrypt messages using current version pgp eight years later another group carnegie mellon researchers published follow-up paper saying although newer version pgp made easy decrypt messages people still struggled encrypting signing messages finding verifying people public encryption keys sharing keys encryption difficult users security compliance managers companies government agencies automate process employees executives using encryption appliances services automate encryption instead relying voluntary co-operation automated encryption based defined policies takes decision process users hands emails routed gateway appliance configured ensure compliance regulatory security policies emails require automatically encrypted sent recipient works organization uses encryption gateway appliance emails automatically decrypted making process transparent user recipients behind encryption gateway need take extra step either procuring public key logging online portal retrieve message | [
2543,
5722,
1528,
5808,
6795,
803,
6100,
2566,
6908,
3794,
7567,
2239,
2779,
5773,
3226,
6049,
1986,
2616
] | Test |
7,726 | 3 | AMD_K9:amd k9 amd k9 represents microarchitecture amd designed replace k8 processors featuring dual-core processing k9 appears originally ambitious 8 issue per clock cycle core redesign k7 k8 processor core one point k9 greyhound project amd worked k7 design team beginning early 2001 tape-out revision a0 scheduled 2003 l1 instruction cache said hold decoded instructions essentially intel trace cache existence massively parallel cpu design concept heavily multi threaded applications also revealed planned successor k8 reportedly canceled conceptualization phase 6 months work one time k9 internal codename dual-core amd64 processors brand athlon 64 x2 however amd distanced old k series naming convention seeks talk portfolio products tailored different markets | [
2539,
5799,
5804,
5559,
5055,
1961,
694,
780,
1797,
2172
] | Validation |
7,727 | 4 | Chain_of_trust:chain trust computer security chain trust established validating component hardware software end entity root certificate intended ensure trusted software hardware used still retaining flexibility chain trust designed allow multiple users create use software system would difficult keys stored directly hardware starts hardware boot software digitally signed signing authority sign boot programs enforce security running programs signed allowing signed code access certain features machine process may continue several layers process results chain trust final software trusted certain properties illegally modified signature would invalid previous software would executed previous software trusted turn would loaded signature invalid trustworthiness layer guaranteed one back trust anchor would possible hardware check suitability signature every single piece software however would produce flexibility chain provides chain given link replaced different version provide different properties without go way back trust anchor use multiple layers application general technique improve scalability analogous use multiple certificates certificate chain computer security digital certificates verified using chain trust trust anchor digital certificate root certificate authority ca certificate hierarchy structure certificates allows individuals verify validity certificate issuer certificates issued signed certificates reside higher certificate hierarchy validity trustworthiness given certificate determined corresponding validity certificate signed chain trust certificate chain ordered list certificates containing end-user subscriber certificate intermediate certificates represents intermediate ca enables receiver verify sender intermediate certificates trustworthy process best described page intermediate certificate authority see also x.509 certificate chains description concepts widely used standard digital certificates | [
363,
359,
6515,
6795,
1805
] | Validation |
7,728 | 3 | Architectural_state:architectural state architectural state part cpu holds state process typically held processor registers includes include actual computation units alu instance | [
2567,
1237,
3156,
352,
5487,
7412
] | Test |
7,729 | 4 | Steve_Gibson_(computer_programmer):steve gibson computer programmer steven steve tiberius gibson born 26 march 1955 american software engineer security researcher security proponent early 1980s gibson worked light pen technology use apple atari systems 1985 founded gibson research corporation best known spinrite software gibson started working computers teenager got first computing job stanford university artificial intelligence lab 15 years old studied electrical engineering computer science university california berkeley gibson hired programmer california pacific computer company 1980 worked copy protection company products gibson founded gibson laboratories laguna hills california 1981 gibson labs developed light pen apple ii atari platforms went business 1983.. 1985 gibson founded gibson research corporation grc computer software development firm 1986 1993 gibson wrote tech talk column infoworld magazine 1999 gibson created one first adware removal programs called optout 2001 gibson predicted microsoft implementation sock_raw protocol initial release windows xp would lead widespread chaos making easier windows xp users create denial service dos attacks year company website brought dos attack attacks continued two weeks gibson blogged attacks ultimately successful efforts track hacker three years windows xp release microsoft limited raw socket support service pack 2 2005 gibson launched weekly podcast called security leo laporte twit.tv archives hosted grc website 2006 gibson raised possibility windows metafile vulnerability bug actually backdoor intentionally engineered system response microsoft mark russinovich microsoft technet stated bug appeared coding error gibson reasoning based upon microsoft abort procedure documentation misleading 2013 proposed sqrl way simplify process authentication without risk revelation information transaction third party grc created number utilities freeware | [
6873,
74,
1766,
730,
7686,
4585,
6326
] | Test |
7,730 | 3 | WDC_65C265:wdc 65c265 western design center wdc w65c265s microcontroller complete fully static 16-bit computer fabricated single chip using hi-rel low power cmos process w65c265s complements established growing line 65xx products wide range microcomputer applications w65c265s developed hi-rel applications minimum power required w65c265s consists w65c816s static central processing unit cpu 8 kb read memory rom 576 bytes random access memory ram processor defined cache software control eight 16-bit timers maskable interrupts high performance interrupt-driven parallel interface bus pib four universal asynchronous receivers transmitters uart baud rate timers monitor watch dog timer restart interrupt twenty-nine priority encoded interrupts built-in emulation features time day tod clock features twin tone generators tgx bus control register bcr external memory bus control interface circuitry peripheral devices abort input low cost virtual memory interface many low power features innovative architecture demonstrated high performance w65c265s cpu well instruction simplicity result system cost-effectiveness wide range computational power | [
7960,
4846,
7519,
804,
5208,
468,
7531,
3365,
5296,
6720,
1556,
7905,
7654,
6919,
2237,
4532,
6753,
7668,
7222,
1237,
3918,
5087
] | Test |
7,731 | 7 | YellowDog:yellowdog yellowdog limited uk software company headquartered bristol yellowdog hybrid multi-cloud management platform intelligent predictive analytics company currently applications two industries 3d rendering media entertainment batch processing financial services company vision creating world people create discover unleashed limited computing power yellowdog founded gareth williams january 2015 incorporated yellowdog limited january 2015 first render application launched sale november 2015 launched second application batch processing financial services march 2018 originally envisioned peer peer power sharing network yellowdog soon changed power source private providers public cloud infrastructure idle capacity handful company data centers uses power give creative firms processing power need produce complex 3d renderings work yellowdog received crowdfunding seedrs 2015 subsequent investment private equity networks vc investment yellowdog gives creative firms processing power need produce complex 3d renderings work standard yellowdog released october 2015 standard yellowdog yellowdog widely used application supports 3ds max maya cinema 4d v-ray corona redshift mental ray software use across visual effects animation cgi naked yellowdog yellowdog deployed first customer october 2016 allows yellowdog support multiple combinations software supported standard yellowdog yellowdog premise released march 2018 finovate europe 2018 support batch processing banks financial services first public presentation product given live finovate europe 2018 yellowdog headquarters located bristol uk engine shed located bristol quarter enterprise zone engine shed new use part old temple meads station brunel original building partnership university bristol hosts business incubators including setsquared supports hi-tech startup companies public consultation engine shed 2 took place november 2016 yellowdog base engine shed encourages innovation collaboration networks based growth plans yellowdog double size 2018 | [
6025,
7055
] | Test |
7,732 | 0 | Lexical_Markup_Framework:lexical markup framework language resource management lexical markup framework lmf iso 24613:2008 iso international organization standardization iso/tc37 standard natural language processing nlp machine-readable dictionary mrd lexicons scope standardization principles methods relating language resources contexts multilingual communication goals lmf provide common model creation use lexical resources manage exchange data among resources enable merging large number individual electronic resources form extensive global electronic resources types individual instantiations lmf include monolingual bilingual multilingual lexical resources specifications used small large lexicons simple complex lexicons written spoken lexical representations descriptions range morphology syntax computational semantics computer-assisted translation covered languages restricted european languages cover natural languages range targeted nlp applications restricted lmf able represent lexicons including wordnet edr parole lexicons past lexicon standardization studied developed series projects like genelex edr eagles multext parole simple isle iso/tc37 national delegations decided address standards dedicated nlp lexicon representation work lmf started summer 2003 new work item proposal issued us delegation fall 2003 french delegation issued technical proposition data model dedicated nlp lexicons early 2004 iso/tc37 committee decided form common iso project nicoletta calzolari cnr-ilc italy convenor gil francopoulo tagmatica france monte george ansi usa editors first step developing lmf design overall framework based general features existing lexicons develop consistent terminology describe components lexicons next step actual design comprehensive model best represented lexicons detail large panel 60 experts contributed wide range requirements lmf covered many types nlp lexicons editors lmf worked closely panel experts identify best solutions reach consensus design lmf special attention paid morphology order provide powerful mechanisms handling problems several languages known difficult handle 13 versions written dispatched national nominated experts commented discussed various iso technical meetings five years work including numerous face-to-face meetings e-mail exchanges editors arrived coherent uml model conclusion lmf considered synthesis state art nlp lexicon field iso number 24613 lmf specification published officially international standard 17 november 2008 iso/tc37 standards currently elaborated high level specifications deal word segmentation iso 24614 annotations iso 24611 a.k.a maf iso 24612 a.k.a laf iso 24615 a.k.a synaf iso 24617-1 a.k.a semaf/time feature structures iso 24610 multimedia containers iso 24616 a.k.a mlif lexicons iso 24613 standards based low level specifications dedicated constants namely data categories revision iso 12620 language codes iso 639 scripts codes iso 15924 country codes iso 3166 unicode iso 10646 two level organization forms coherent family standards following common simple rules linguistics constants like /feminine/ /transitive/ defined within lmf recorded data category registry dcr maintained global resource iso/tc37 compliance iso/iec 11179-3:2003 constants used adorn high level structural elements lmf specification complies modeling principles unified modeling language uml defined object management group omg structure specified means uml class diagrams examples presented means uml instance object diagrams xml dtd given annex lmf document lmf composed following components extensions specifically dedicated morphology mrd nlp syntax nlp semantics nlp multilingual notations nlp morphological patterns multiword expression patterns constraint expression patterns following example lexical entry associated lemma clergyman two inflected forms clergyman clergymen language coding set whole lexical resource language value set whole lexicon shown following uml instance diagram elements lexical resource global information lexicon lexical entry lemma word form define structure lexicon specified within lmf document contrary languagecoding language partofspeech commonnoun writtenform grammaticalnumber singular plural data categories taken data category registry marks adorn structure values iso 639-3 clergyman clergymen plain character strings value eng taken list languages defined iso 639-3 additional information like dtdversion feat data expressed following xml fragment example rather simple lmf represent much complex linguistic descriptions xml tagging correspondingly complex first publication lmf specification ratified iso paper became 2015 9th cited paper within language resources evaluation conferences lrec papers semantic representation african languages asian languages european languages semitic languages book published 2013 lmf lexical markup framework entirely dedicated lmf first chapter deals history lexicon models second chapter formal presentation data model third one deals relation data categories iso-dcr 14 chapters deal lexicon system either civil military domain either within scientific research labs industrial applications wordnet-lmf prolmf duelme uby-lmf lg-lmf relish globalatlas global atlas wordscape | [
8057,
6172,
5642,
7721,
3620,
1543,
6428,
6015,
2214,
737,
4884,
6208,
1209,
1114,
5948,
506,
1774,
2057,
2872,
1777,
2877,
3053,
5429,
611,
3916,
698,
5008,
1435,
7144
] | Test |
7,733 | 3 | Burroughs_Medium_Systems:burroughs medium systems burroughs b2500 burroughs b4900 series mainframe computers developed manufactured burroughs corporation pasadena california united states 1966 1991 aimed business world instruction set optimized cobol programming language also known burroughs medium systems contrast burroughs large systems burroughs small systems b2500 b3500 computers announced 1966 operated directly cobol-68 primary decimal data types strings 100 digits one ebcdic ascii digit character two 4-bit binary-coded decimal bcd digits per byte portable cobol programs use binary integers b2500 either even memory addresses memory addressed 4-bit digit big-endian style using 5-digit decimal addresses floating point numbers also used base 10 rather binary base 100 mantissa digits typical cobol statement 'codice_1 may use operands different lengths different digit representations different sign representations statement compiled single 12-byte instruction 3 memory operands complex formatting printing accomplished executing single codice_2 instruction detailed format descriptors high level instructions implemented translate buffer e.g ebcdic ascii conversion table buffer sort table using sort requirements table extreme cases single instructions could run several hundredths second mcp could terminate over-long instructions could interrupt resume partially completed instructions resumption prerequisite page style virtual memory operands cross page boundaries machine matched cobol closely cobol compiler simple fast cobol programmers found easy assembly programming well original instruction set operations memory-to-memory visible data registers arithmetic done serially one digit time beginning most-significant digits working rightwards least-significant digits backwards manual right-to-left methods complicated allowed result writing suppressed overflow cases serial arithmetic worked well cobol languages like fortran bpl much less efficient standard word-oriented computers three reserved memory locations used address indexing 'registers third index register dedicated pointing current procedure stack frame call/return stack reserved memory locations controlled operand sizes size constant b3500 similar b2500 faster cycle time expansion choices b2500 maximum 60 k bytes core memory 2 microsecond cycle time b3500 maximum 500 k bytes 1-microsecond cycle time b2500/3500 weighed b2500/b3500 machines followed b2700/b3700/b4700 1972 b2800/b3800/b4800 1976 b2900/b3900/b4900 1980 first range load microcode floppy disk rather implementing hardware read-only memory finally unisys v series machines v340-v560 1985-90 machines prior b4800 cache memory every operand byte result byte required separate main memory cycle limited program performance compensate b3700/b4700 generation used semiconductor main memory faster expensive power hungry dram used competing machines unusual use decimal numbers memory addresses initially problem merely involved using 1-in-5 rather 1-in-8 decoder logic core memory row selects bank selects later machines used standard memory chips expected binary addresses 1000-byte block logical memory could trivially mapped onto subset 1024 bytes chip 2.3 waste denser chips larger total memories entire decimal address crunched shorter quasi binary form sending address chips done cache memory cycle conversion logic slowed machine cycle somewhat attempted redesign 1975 address space called ms-3 medium systems 3rd generation project cancelled machines b2900 allowed input numbers 'undigit values 9 arithmetic gave unspecified results used form hexadecimal arithmetic within mcp also application programmers later versions discontinued instead supported two new opcodes binary decimal decimal binary support addressing hard drives available burroughs acquisition memorex unisys cancelled v series hardware development 1991 support ended 2004 b4900 later machines integer operations 10 digits less handled parallel longer operands continued use serial method floating point operations limited 17 digits precision later medium systems machines added accumulator register accumulator/memory instructions using 32-bit 7-digit integers 48-bit 80-bit floating point values aligned 16-bit word boundaries operating system called mcp master control program shared many architectural features mcp burroughs large systems stack machines entirely different internally coded assembly language algol-derivative programs separate address spaces dynamically relocated base register otherwise virtual memory paging segmentation larger programs squeezed limited code address space explicit overlays nonresident parts mcp also heavily overlaid initially code data shared single 300,000 digit address space later machines separate million-digit spaces program code process data instructions address fields extended 5 digits 6 digits 4 real index registers added early machines used burroughs head-per-track disk systems rather now-standard movable head platter disks one attempt speed mcp overlays carefully laid likely-next overlays would soon arrive read head current overlay completed similar time-dependent layout optimizations early delay-line drum computers turned impractical maintain software changes better results consistently achieved totally randomized layout mcp overlays operating system system software coded bpl burroughs programming language systems programming language derived algol large system espol systems language initial cobol compiler supported ansi 68 specification supported codice_3 syntax allow inline assembly language coding lacked support relative indexed file support later added ansi 74 version compiler released 1982 mcp allowed programs communicate via core-to-core transmissions codice_4 using storage queues codice_5 implemented system calls using codice_6 instruction exposed languages cobol codice_7 unheard except largest ibm s/360 systems time even major operational headache manage interactions multiple program streams medium systems series effective multi-programming machines even basic versions b2500 could support multiprogramming usable scale larger medium systems processors supported major data center activities banks financial institutions well many businesses government customers medium system preferred platform many data processing professionals medium system computer could simultaneously running batch payroll system inputting bank checks micr reader sorter compiling cobol applications supporting on-line transactions test runs new applications colloquially called 'the mix console command 'codice_8 would shows jobs executing unusual running eight ten programs medium-size b2500 medium system installations often tape clusters four drives integrated mid-height cabinet magnetic tape input output free-standing tape drives also available much expensive tape major storage medium computers early days often used father-son batch updating additional disk becoming cheaper time moved became relegated library/backup device contained data files sometimes program files using mfsolt utility particular application customer/client cobol machine code tape resident disk files job headers card input card print spooling accounting system parameter driven —a blank verse unknown b2500 user | [
708,
5012,
8066,
1180,
5737,
1743,
7733,
1400,
3990,
336,
1785,
2438,
4915
] | Test |
7,734 | 9 | Chakra_(JScript_engine):chakra jscript engine chakra jscript engine developed microsoft 32-bit version internet explorer 9 ie9 web browser jscript engine developed closed source proprietary software microsoft developed different javascript engine based jscript newer microsoft edge browser also called chakra chakra javascript engine open-sourced mit license distinctive feature engine jit compiles scripts separate cpu core parallel web browser though microsoft past pointed elements rendering marshalling important browser overall performance improvements engine response evolving competing browsers compared ie8 lagging behind terms client-side script processing speed sunspider tests performed november 18 2009 showed pdc version ie9 executing scripts much faster ie8 slower firefox 3.6 chrome 4 webkit nightly test performed march 15 2010 showed first ie9 platform preview using then-current version chakra faster firefox spidermonkey slower safari squirrelfish extreme chrome v8 opera carakan march 8 2011 microsoft published results showing 32-bit internet explorer 9 faster safari firefox tracemonkey chrome opera march 2011 performance tests zdnet concluded internet explorer 9 32-bit chrome 10 firefox 4 release candidate pretty evenly matched 2012 subsequent versions chakra version included internet explorer 10 introduced additional performance changes including jit compilation x64 arm architectures optimizations related floating point math garbage collection last call jsconf 2015 microsoft announced open sourcing chakracore engine january 2016 github chakracore essentially chakra engine powers microsoft edge browser platform-agnostic bindings i.e without specific interfaces utilised within windows universal app platform january 13 2016 microsoft released chakracore mit license github promised | [
2198,
5378,
7176,
6110,
54,
422,
3663,
432,
6495,
4026,
4755,
4759,
7619,
6172,
2658,
3719,
3028,
7660,
3398,
1970,
5172,
3057,
7687,
1237,
1616,
183,
3076,
8054,
555,
3092,
8076,
5563,
562,
6991,
5571,
2040,
6294,
237,
8118,
6660,
2451... | Validation |
7,735 | 3 | TwinBee:twinbee various twinbee sequels released arcade home console markets following original game spawned audio drama anime adaptations japan twinbee played 2-players simultaneously player takes control cartoon-like anthropomorphic spacecraft player 1 taking control twinbee titular ship player 2 controls winbee game control consists eight-way joystick two buttons one shooting enemies air dropping bombs ground enemies similarly xevious player primary power-ups bells uncovered shooting floating clouds 're hidden player continues shooting bell appears change one four colors regular yellow bells grant bonus points white bell upgrade player gun twin cannon blue bell increases player speed five speed levels green bell allow player create image copies ship additional firepower red bell provide player ship barrier allows sustain damage green red bells combined together power-ups also retrieved ground enemies alternate bell gives player ship three-way gun star eliminates on-screen enemies games genre getting shot single enemy bullet cause player lose life however bullet strikes either side ship instead player ship lose one arms player ship loses arms lose ability throw bombs player must wait ambulance arrive player must navigate ship ambulance repair arms however player ship loses arms second time ambulance arrive two players playing time align ships vertically horizontally together perform powerful attacks twinbee originally appeared arcade game later ported msx family computer famicom version re-released japan famicom mini label game boy advance game officially released first time outside japan part nintendo ds march 2007 name rainbowbell north america although twinbee name restored european release twinbee released japan august 10 2011 regions september 22 2011 nintendo 3ds part 3d classics series release featured amongst games nintendo entertainment system super nes released 3ds tech demo called classic games e3 2010 arcade version twinbee made available microsoft game room service xbox 360 console windows-based pcs december 1 2010 also msx version re-released windows egg project august 19 2014 playstation 4 published hamster corporation japan nes port re-released nintendo switch online november 14 2018 worldwide sp version titled twinbee second helping donburi island released june 12 2019 twinbee version nintendo 3ds received total 68/100 metacritic mixed positive average user score 6.8 | [
4759,
7854
] | Test |
7,736 | 2 | The_Core_Pocket_Media_Player:core pocket media player core pocket media player tcpmp software media player operates portable devices windows-based pcs discontinued still available official mirror site supported operating systems include palm os symbian os microsoft windows ce mobile also available microsoft zune hd via hack called liberate tcpmp also hardware accelerated playback ati intel 2700g mobiles tapwave zodiac dell axim x50v/x51v development free version software discontinued corecodec favour commercially licensed coreplayer though tcpmp still regarded one versatile media players pocketpc palm os mobile devices according corecodec.com website september 2002 development team planned continue development releases open source version player offsite code would also incorporated commercial player 2004 corecodec.org open source player released betaplayer 0.01a windows ce windows mobile renamed core pocket media player july 2005 upon release palm os windows ce/mobile operating systems release tcpmp symbian os remarked upon information available forums tcpmp project page indicates development languages used assembly c 2006 corecodec inc. discontinued development tcpmp focus commercial coreplayer platform tcpmp supports many audio video image formats including ac3 he-aac later removed amr divx flac h.263 h.264 jpeg monkey audio mjpeg mpeg-1 mp2 mp3 musepack ms-mpeg4-v3 png speex tiff tta vorbis wav wavpack xvid supports many container formats including 3gp asf avi matroska mpeg ogg ogm quicktime windows desktop platform third-party codec support h.264 third-party plugin support youtube videos flash video formats program received consistently positive reviews performance versatility functionality minor criticism user interface issues hpc factor magazine evaluating version 0.66 declared excellent noting need improvement menu space usage complete lack documentation version 0.70 described best free multimedia player pocket pc palm os platform smartphone pocket pc magazine november 2005 2006 treo central review gave score 4/5 use palm os-equipped treo devices pretty cool logical interface albeit drawbacks supporting almost every video encapsulation known humankind without conversion prior playback smartdevice central reviewed version 0.71 palm treo 700 2007 called impressive solid piece software summarizing user interface resembling black-and-white macintosh app late 1980s absolutely eye candy whatsoever corecodec inc. discontinued development tcpmp 2006 renamed coreplayer developed commercial sale one review referred quirky rock solid tcpmp bulletproof compared early version new player later reviews mentioned problems stability | [
224,
3915,
4759,
6516,
5571,
532,
578,
8024
] | Test |
7,737 | 9 | JAWS_Scripting_Language:jaws scripting language jaws scripting language proprietary programming language facilitates interoperability jaws windows screen reading program practically application–both proprietary off-the-shelf jaws scripting language jsl compiled language allowing source code protection jaws scripting commonly also cumulatively refers customization jaws use built-in user-editable utilities called managers editing configuration files directly combination writing actual scripts scripting language api exposes functionality including combination traditional jaws scripting msaa server direct scripting document object model scripting ensure optimal performance jaws end-users | [] | Validation |
7,738 | 4 | NetBackup:netbackup computing veritas netbackup called symantec netbackup prior symantec divestiture veritas enterprise-level heterogeneous backup recovery suite provides cross-platform backup functionality large variety windows unix linux operating systems netbackup features central master server manages media servers containing backup media clients core server platforms include solaris hp-ux aix tru64 linux windows netbackup opscenter comes bundled netbackup 7.0 distribution replaces netbackup operations manager nom component used previous versions manage multiple netbackup environments netbackup comes support many hardware devices like tape drives tape libraries disk units supports among many features hot backups major database products like oracle natively backup restore virtual machines major virtualization products like vmware infrastructure use network data management protocol ndmp tape vaulting netbackup also enables lan-free server-free backups san fabric environments | [
1438,
3842,
4759,
5552,
4398,
4138,
2390,
2117,
2032,
578,
2488,
7838,
7010,
1666,
5856,
5516,
3915,
4645,
7597,
6962
] | Test |
7,739 | 4 | John_Viega:john viega john viega born february 22 1974 american computer security author researcher professional earned ba university virginia undergraduate worked randy pausch stage 3 research group early contributor alice viega earned ms computer science also university virginia john viega co-authored widely used gcm mode operation aes along david a. mcgrew also co-designed predecessor cwc mode john viega also pioneer static analysis security vulnerabilities responsible first publicly available tool its4. well prominent open source rough auditing tool security rats also founded secure software first commercial vendor tools bought fortify software john viega also original author owasp clasp lightweight process relating software development security also former editor-in-chief ieee security privacy magazine addition viega original author gnu mailman mailing list program john viega executive vice president products engineering bae systems applied intelligence joined bae systems 2014 acquisition silversky cloud security provider funded goldman sachs bessemer ventures prior silversky viega mcafee cto saas prior mcafee chief security architect currently teaches nyu previously taught virginia tech co-author building secure software addison wesley 2001 first book teach developers write secure software since co-authored number additional books computer security including myths security o'reilly 2009 beautiful security o'reilly 2009 network security openssl ’ reilly 2002 secure programming cookbook ’ reilly 2003 19 deadly sins software security mcgraw hill 2005 | [
4995,
4906
] | Validation |
7,740 | 2 | Michael_Simms_(software_developer):michael simms software developer michael simms creator tux games website founder linux game publishing simms began using linux university 1992 writing contributing open source software since 1993 strong belief operating systems file formats need open source order make computing competitive 2000 2001 also worked wcities london lead product architect simms beta tester loki software linux ports descent 3 response unable order versions loki titles british reseller spurred create tux games one first online linux game stores website went live ten seconds midnight 1 january 2000 selling first title 3 january response loki demise effect would tux games simms invested £350,000 company porting windows game titles linux linux game publishing founded 15 october 2001 port publish new games linux simms remained ceo well head development decade likes play majesty strategy games 31 january 2012 simms announced stepping ceo handing control clive crous | [
3938,
3084,
462,
7429,
1351,
1822,
4401,
5292,
3780,
5829,
1192,
578,
7463,
7559,
5759,
589,
412,
4435,
3133,
2689,
3404,
7855,
966,
968,
2260,
8149
] | Test |
7,741 | 7 | Logicworks:logicworks logicworks cloud computing managed hosting company headquartered new york city offices seattle washington d.c. london logicworks enterprise cloud automation managed service provider company founded february 1993 1998 logicworks changed focus standard web hosting complex types managed hosting high points years included logicworks getting first mysql enterprise partner designation 2003 expanding private cloud hosting 2007 focus cloud continues today starting logicworks cloud 2010 adding another data center bring company three 2011 april 2011 logicworks received 7.6 million venture funding round logicworks cloud offerings marketed traditional cloud computing offers instead remote hosting solutions december 14 2016 logicworks announced raised 135 million private equity firm pamplona capital grow automation consulting business logicworks provides managed services amazon web services cloud infrastructure called managed amazon web services logicworks adds management layer top aws cloud strategize architect implement scale aws cloud instances tools applications 2015 logicworks added aws premier partner network since logicworks added many services including logicworks private cloud offerings based vmware ’ virtualization platform logicworks specializes hipaa pci compliance hosting infrastructure design aws private cloud environments | [
2988,
7613,
632,
5908,
1634,
3091,
6262,
6806,
3627,
5927,
2212,
5135,
1757,
3028,
842,
5064,
330,
2961,
7037,
2700,
1514,
5889
] | Test |
7,742 | 2 | Debug_new:debug new debug_new refers technique c++ overload and/or redefine operator new operator delete order intercept memory allocation deallocation calls thus debug program memory usage often involves defining macro named debug_new makes new become something like new __file__ __line__ record file/line information allocation microsoft visual c++ uses technique microsoft foundation classes ways extend method avoid using macro redefinition still able display file/line information platforms many inherent limitations method applies c++ catch memory leaks c functions like malloc however simple use also fast compared complete memory debugger solutions | [
7438,
1435,
572
] | Test |
7,743 | 6 | Next3:next3 next3 journaled file system linux based ext3 adds snapshots support yet retains compatibility ext3 on-disk format next3 implemented open-source software licensed gpl license snapshot read-only copy file system frozen point time versioning file systems like next3 internally track old versions files make snapshots available special namespace advantage copy-on-write next3 writes new data blocks containing old data retained allowing snapshot version file system maintained next3 snapshots created quickly since data composing snapshot already stored also space efficient since unchanged data shared among file system snapshots traditional linux logical volume manager volume level snapshots implementation requires storage space allocated advance next3 uses dynamically provisioned snapshots meaning require pre-allocation storage space snapshots instead allocating space needed storage space conserved sharing unchanged data among file system snapshots since next3 aims forward backward compatible earlier ext3 on-disk structures identical ext3 file system mounted read existing ext3 implementations modification next3 like ext3 lacks number features recent designs extents snapshots next3 performance equivalent ext3 performance snapshots minor overhead per write metadata block copy-on-write smaller overhead ~1 per write data block move-on-write 2011 next4 project porting next3 snapshot capabilities ext4 file system mostly completed porting attributed members pune institute computer technology pict chinese academy sciences | [
3599,
1438,
2547,
7161,
4672,
7165,
3626,
6117,
6854,
5437,
4375,
6500,
6505,
5457,
460,
1534,
7976,
4406,
821,
7258,
5130,
1561,
836,
5843,
6558,
2683,
5859,
5865,
4444,
5518,
6231,
869,
2704,
1605,
174,
2710,
1624,
5900,
4480,
4855,
7... | Test |
7,744 | 4 | PeerBlock:peerblock peerblock free open-source personal firewall blocks packets coming going maintained list black listed hosts peerblock windows successor software peerguardian currently maintained linux blocks incoming outgoing connections ip addresses included blacklists made available internet addresses specified user peerblock mainly uses blacklists provided iblocklist.com peerblock 1.0 based code peerguardian 2 rc1 test3 vista version adds support 32- 64-bit windows vista windows 7 windows 8 peerguardian project ended developer phoenix labs encouraged current peerguardian users migrate peerblock peerblock development small team developers led mark bulas hosting well signed driver funded donations public future donations intended contribute future signed drivers hosting possibly rent virtual private server team able build real online-update feature future releases peerblock introduced 2017 peerblocklist.com offers modern blocklists p2p format compatible peerblock peerblock multiple features latest version program include constantly updating blocklist managed home site manager lets choose lists include block program allows user turn ip http trackers well including log showing time source ip address destination protocol tracker list settings allows users customize program interface well operations september 2013 i-blocklist supplier blocking lists peerblock uses supported unlimited free list updating since september 2013 updates limited weekly except paid subscribers peerblock hard-coded use i-blocklist lists entered revenue-sharing agreement i-blocklist late 2015 blocklists longer available without payment subscription late 2017 peerblocklist.com began offering free blocklists malicious hosts ad-servers peerblock peerguardian users | [
1249,
3165,
1809,
2984,
3172,
798,
4759,
806,
7714,
2379,
7343,
994,
3185,
4492,
7351,
4138,
385,
2390,
7536,
2296,
2746,
5571,
6107,
578,
2664,
3637,
8100,
6456,
3551,
1291,
7275,
499,
3394,
6560,
2681,
4977,
7289,
7478,
3223,
3484,
35... | Test |
7,745 | 9 | Harlequin_RIP:harlequin rip harlequin rip raster image processor first released 1990 name scriptworks running command-line application render postscript language files unix developed harlequin software company based cambridge england harlequin rip started life 1986 final year university project software developer andy cave project build subset postscript interpreter could preview result converting tex/latex files postscript phd students would n't waste much paper new laserwriter although subset required cave ended creating quite complete implementation 1987 cave joined harlequin limited founding rip division bringing work 'd done bath university early 1990s harlequin commissioned xenotron develop raster image processor rip run macintosh computers drive ultre-based image setters exposing onto film resin-coated rc paper macintosh version proved successful harlequin signed number original equipment manufacturer oem partners sell including pongrass ecrm autologic xitron koronix purup graphic enterprises compose 1992 dos variation core rip developed also sold oem partners replaced version running microsoft windows 1993 1999 harlequin group went receivership bought global graphics harlequin group including staff assets renamed global graphics software limited unix-based command-line version rip phased years later rip finally renamed scriptworks harlequin rip 2004 onwards global graphics expanded reach harlequin rip producing number variants different market sectors harlequin rip sold oem partners builds prepress system digital front end dfe controller therefore sold variety names always easy identify whether system uses harlequin rip current versions harlequin rip interpret harlequin embedded sdk also supports printer command language 5e pcl 5c pcl xl including hpgl printer job language pjl file formats interpreted natively without conversion intermediate format pdf converted postscript vice versa example global graphics claims processing without conversion allows higher speeds avoids artifacts arising conversion native processing live transparency pdfs recognized several awards publishing essential impact award rip year 1997 1998 silver award pre-press news publishing awards 1997 rip/server product year harlequin rip also explicitly supports pdf/x-1a:2001 pdf/x-1a:2003 pdf/x-3:2002 pdf/x-3:2003 pdf/x-4 pdf/x-4p pdf/x-5g pdf/x-5pg set reject files comply standards include conformance information control strip proof harlequin oem partners built dfes full support additional formats personalized print markup language ppml around harlequin rip number extra components available variants harlequin rip leading descriptions harlequin server rip prepress workflow box included additional options include harlequin host renderer launched 2005 version 1.3 released late 2009 core rip functionality hhr tracked harlequin server rip except hhr currently following additional features comparison hsr 8.3 hhr supported linux windows harlequin embedded sdk ebd optimized use within home office printers end supports several versions printer control language pcl well printer job language pjl hewlett-packard graphics language hpgl ebd version 3 released 2009 supported variety real-time near-real-time operating systems including embedded windows xp linux vxworks threadx variety hardware architectures including intel freescale arm without system-on-a-chip soc around cpu global graphics announced partnership conexant provide combination hardware page description language pdl software home small office printers | [
4884,
6826,
4759,
4780,
8190,
6015,
6016,
578
] | Test |
7,746 | 6 | LHA_(file_format):lha file format lha freeware compression utility associated file format created 1988 originally named lharc complete rewrite lharc tentatively named lhx eventually released lh renamed lha avoid conflicting then-new ms-dos 5.0 lh load high command according early documentation lha pronounced like la although longer much used west lha remains popular japan used id software compress installation files earlier games including doom quake lha ported many operating systems still main archiving format used amiga computer although competed lzx mid 1990s due aminet world largest archive amiga-related software files standardising stefan boberg implementation lha amiga microsoft released windows xp add-on microsoft compressed lzh folder add-on designed japanese version operating system japanese version windows 7 ships lzh folder add-on built-in users non-japanese versions windows 7 enterprise ultimate also install lzh folder add-on installing optional japanese language pack windows update lzh archive compression method stored five-byte text string third seventh bytes file lharc compresses files using algorithm yoshizaki earlier lzhuf product modified lzari developed uses huffman coding instead arithmetic coding lzari uses lempel–ziv–storer–szymanski arithmetic coding compression method applied source data method introduced lharc version 1 supports 4 kib sliding window support maximum 60 bytes matching length dynamic huffman encoding used method supports 8 kib sliding window support maximum 256 bytes matching length dynamic huffman encoding used methods 4 5 6 7 support 4 8 32 64 kib sliding window respectively support maximum 256 bytes matching length static huffman encoding used lh5 first introduced lharc 2 followed lh6 lha 2.66 msdos lh7 lha 2.67 beta msdos lha never compresses lh4 technically compression method used .lzh archive indicate compressed object empty directory joe jared extended lzss use larger dictionaries dictionary sizes 64 128 256 512 1024 2048 kib respectively unlha32.dll uses method testing purposes uses 128–256 kib dictionary compression methods created pmarc cp/m archiver created miyo archive usually .pma extension popcom compressed executable archive compression method applied source data used indicate pmarc self-extracting archive larc uses file format .lzh written kazuhiko miki haruhiko okumura ken masuyama extension name .lzs supports 2 kib sliding window support maximum 17 bytes matching length similar lzs except dictionary size match length changed compression method applied source data supports 4 kib sliding window support maximum 17 bytes matching length copies lhice marked version 1.14 according okumura lhice written yoshi bug timestamps since year 2011 set 1980 meaning utilities need patched | [
4213,
7058,
97,
985,
3688,
1534,
1352,
6431,
6009,
6992,
1471,
307,
5833,
7827,
5661,
4700,
4244,
7555,
1955,
7201,
3032,
7384,
2589,
1214,
6380,
594,
510,
3219,
1675,
3222,
7387,
4354,
5191,
1127,
2334,
6940,
8126,
4732,
4006,
5256,
10... | Test |
7,747 | 4 | Law_Enforcement_Information_Exchange:law enforcement information exchange law enforcement information exchange database maintained naval criminal investigative service eugene r. fidell described database constituting domestic spying according ncis website naval criminal investigative service ncis launched law enforcement information exchange linx initiative 2003 linx designed enhance information sharing local state federal law enforcement areas strategic importance department navy linx provides participating law enforcement partner agencies secure access regional crime incident data tools needed process enabling investigators search across jurisdictional boundaries help solve crimes resolve suspicious events linx designed facilitate cooperation sharing ownership control data remains agency provided | [
2895
] | Test |
7,748 | 4 | Anti-tamper_software:anti-tamper software anti-tamper software tamper-resistant software software makes harder attacker modify measures involved passive obfuscation make reverse engineering difficult active tamper-detection techniques aim make program malfunction operate modified essentially tamper resistance implemented software domain shares certain aspects also differs related technologies like copy protection trusted hardware though often used combination anti-tampering technology typically makes software somewhat larger also performance impact provably secure software anti-tampering methods thus field arms race attackers software anti-tampering technologies tampering malicious gain control aspect software unauthorized modification alters computer program code behaviour examples include installing rootkits backdoors disabling security monitoring subverting authentication malicious code injection purposes data theft achieve higher user privileges altering control flow communication license code bypassing purpose software piracy code interference extract data algorithms counterfeiting software applications vulnerable effects tampering code changes throughout lifecycle development deployment operation maintenance anti-tamper protection applied either internally externally application protected external anti-tampering normally accomplished monitoring software detect tampering type defense commonly expressed malware scanners anti-virus applications internal anti-tampering used turn application security system generally done specific code within software detect tampering happens type tamper proofing defense may take form runtime integrity checks cyclic redundancy checksums anti-debugging measures encryption obfuscation execution inside virtual machine become common anti-tamper method used recent years commercial software used example starforce securom anti-tamper software uses white-box cryptography cryptographic keys revealed even cryptographic computations observed complete detail debugger recent research trend tamper-tolerant software aims correct effects tampering allow program continue unmodified simple easily defeated scheme kind used diablo ii video game stored critical player data two copies different memory locations one modified externally game used lower value anti-tamper software used many types software products including embedded systems financial applications software mobile devices network-appliance systems anti-cheating games military license management software digital rights management drm systems general-purpose packages developed wrap existing code minimal programing effort example securom similar kits used gaming industry though downside semi-generic attacking tools also exist counter malicious software observed using anti-tampering techniques example mariposa botnet | [
74,
2632,
6748,
3896,
7093,
1805
] | Train |
7,749 | 2 | List_of_features_in_Android:list features android list features android operating system android devices include still/video cameras touchscreens gps accelerometers gyroscopes barometers magnetometers dedicated gaming controls proximity pressure sensors thermometers accelerated 2d bit blits hardware orientation scaling pixel format conversion accelerated 3d graphics | [
4655,
3933,
5372,
6427,
1095,
6809,
393,
3291,
2574,
740,
6452,
7189,
4340,
42,
6462,
3310,
2591,
4352,
5771,
6132,
4725,
5775,
1136,
7956,
1152,
1534,
5473,
7628,
5821,
474,
3009,
6183,
822,
5127,
3383,
136,
8006,
6209,
3043,
6219,
622... | Test |
7,750 | 9 | ACL2:acl2 acl2 computational logic applicative common lisp software system consisting programming language extensible theory first-order logic automated theorem prover acl2 designed support automated reasoning inductive logical theories mostly purpose software hardware verification input language implementation acl2 written common lisp acl2 free open-source software acl2 programming language applicative side-effect free variant common lisp acl2 untyped acl2 functions total — every function maps object acl2 universe another object universe acl2 base theory axiomatizes semantics programming language built-in functions user definitions programming language satisfy definitional principle extend theory way maintains theory logical consistency core acl2 theorem prover based term rewriting core extensible user-discovered theorems used ad-hoc proof techniques subsequent conjectures acl2 intended industrial strength version boyer–moore theorem prover nqthm toward goal acl2 many features support clean engineering interesting mathematical computational theories acl2 also derives efficiency built common lisp example specification basis inductive verification compiled run natively 2005 authors boyer-moore family provers includes acl2 received acm software system award pioneering engineering effective theorem prover ... formal methods tool verifying safety-critical hardware software acl2 numerous industrial applications 1995 j strother moore matt kaufmann tom lynch used acl2 prove correctness floating point division operation amd k5 microprocessor wake pentium fdiv bug interesting applications page acl2 documentation summary uses system industrial users acl2 include amd centaur technology ibm intel oracle rockwell collins | [
6507,
1716,
6876,
1445,
6611,
6888,
2915,
1361,
3370,
5571,
6191,
4332,
4878,
5494,
5757,
6116,
3212,
3556,
7385,
6210,
1116,
6471,
940,
1676,
4535,
8025,
5077,
4543,
2249,
6489,
1890,
960,
3915,
3250
] | Test |
7,751 | 2 | P.I.P.S.:p.i.p.s p.i.p.s term recursive acronym symbian software libraries means p.i.p.s posix symbian os intended help c language programmers migration desktop server middleware applications symbian os based mobile smartphone devices pips software libraries provides c c++ application programming interfaces standard c libraries p.i.p.s environment support true signalling basic signal support emulated using threads open c open c++ extensions nokia p.i.p.s contrast mere p.i.p.s. series 60 phones name result internal competition symbian developer marketing department organised bruce carney developer marketing erik jacobson product manager full-stops inserted symbian legal department ensure trademark copyright infringements | [
5499,
5571,
1989,
5666,
740,
1435
] | Test |
7,752 | 2 | OpenOSPFD:openospfd openospfd isc licensed implementation open shortest path first protocol network routing software suite allows ordinary general purpose computers used routers exchanging routes computer systems speaking ospf protocol openospfd developed esben nørby claudio jeker openbsd project companion daemon openbgpd software developed alternative packages quagga routing software suite licensed gpl openospfd developed openbsd ports exist freebsd netbsd design goals openospf include secure non-exploitable reliable lean easy use configuration language intended powerful easy enough users | [
6414,
2001,
2453,
191,
1261,
5373,
994,
2650,
4951,
2746,
5571,
6630,
6456,
7189,
7275,
1572,
4162,
6918,
1394,
7289,
4177,
3572,
4990,
1133,
2883,
1245,
6242,
1435
] | Test |
7,753 | 4 | Gpg4win:gpg4win gpg4win email file encryption package versions microsoft windows uses gnupg public-key cryptography data encryption digital signatures original creation gpg4win supported germany federal office information security however gpg4win included tools free open source software typically non-proprietary option privacy recommended windows users | [
6025,
6458,
4990,
6049,
7402,
3350,
5808,
4759,
5571,
4014,
5773
] | Test |
7,754 | 4 | Communications_&_Information_Services_Corps:communications amp information services corps communications information services corps cis – formerly army corps signals – one combat support corps irish defence forces military ireland responsible installation maintenance operation communications information systems command control administration defence forces facilitation accurate real-time sharing intelligence army naval service air corps branches home overseas cis corps headquartered mckee barracks dublin comes command officer colonel rank known director cis corps formerly army corps signals communications information services corps responsible development operation information technology telecommunications systems support defence forces tasks also responsible coordinating communications – radio line – information systems communications research updating communications line modern developments operational requirements cis corps tasked utilising networking information technologies order dramatically increase defence force operational effectiveness provision timely accurate information appropriate commander along real time efficient sharing information intelligence army naval service air corps well multinational partners involved international peacekeeping actors required role includes development maintenance secure nationwide defence forces telecommunications network dftn support protected voice data services provision maintenance encrypted military communications equipment use defence forces personnel home abroad cis corps units dispersed throughout df giving communications support army brigades naval service air corps defence forces training centre dftc defence forces headquarters dfhq cis corps base workshops detailed maintenance research development conducted cis corps collar flash features angel gabriel messenger god behind signal shield caption cór comharthaíochta irish translation 'signals corps translation communications information services corps cór seirbhísí cumarsáide agus eolais communications information services cis corps works defence forces intelligence branch directorate military intelligence j2 regards signals intelligence sigint houses dedicated sigint element within corps df cis corps ability intercept monitor communications remotely collect data process irish legislation criminal justice surveillance act 2009 interception postal packets telecommunications messages regulation act 1993 provides defence forces legal authority conduct domestic intelligence operations involving espionage electronic communications stored electronic information order safeguard maintain security state cis corps along garda síochána national police force provide significant domestic support role national cyber security centre ncsc department communications climate action environment countering cyber-attacks protecting critical national infrastructure securing government communications cis responsible cyber security within defence forces maintains capability area purpose protecting networks users domestic foreign 2016 establishment computer incident response team cirt dfhq cis company revealed july 2015 leaked email correspondence hacking team – private italian spying eavesdropping software company – reportedly showed members irish cis corps discussions company purchase intrusion surveillance solutions lawful interception online communications monitoring incoming outgoing emails browsing activity skype calls remotely switching webcams microphones remotely taking control devices defence forces spokesperson said operational security reasons could comment specific elements activities cis corps confirmed goods services purchased company question soldiers join communications information services corps one following apprenticeship trades personnel basic military training cis school runs large number cis related courses including degree programme military communications cis technicians association institute technology carlow 3 sections cis school providing training areas operational procedures technical proficiency simulation procedural operations section proc/ops technical section simulation section dirt range digital indoor shooting range trainees assessed marksmanship skills various small arms weapons used df helps develop proficiencies methodically without firing live ammunition regular basis €1 million facility based department defence properties kilworth camp county cork reserve defence forces rdf units integrated permanent defence forces pdf units part single force concept | [
3528,
2566,
7518,
803,
3241,
5973,
5509
] | Test |
7,755 | 3 | Goody_(video_game):goody video game goody platform game developed gonzalo gonzo suárez released 1987 spanish company opera soft game released amstrad cpc ms-dos msx zx spectrum platforms experienced thief john nelson brainner stravinsky known goody mission break bank spain equipped ladder goody explores catacombs city buildings along way may collect treasure needed purchase tools dynamite drill find access code main vault many objects enemies remote-control combat helicopters vipers gorillas policeman rodríguez ghosts evil moon try stop goody remake game linux windows titled goody remake released coptron game studios 2007 version brings brand new graphics music theme sound effects keeps gameplay atmosphere authentic goody version mobile phones created exelweiss published ebrain mobile 2007 called goody returns version uses 2.5d graphics video game called speakerman released 2019 art style game world heavily inspired goody | [
6380,
578
] | Validation |
7,756 | 4 | Virtual_private_server:virtual private server virtual private server vps virtual machine sold service internet hosting service virtual dedicated server vds also similar meaning vps runs copy operating system os customers may superuser-level access operating system instance install almost software runs os many purposes functionally equivalent dedicated physical server software-defined able much easily created configured priced much lower equivalent physical server however share underlying physical hardware vpses performance may lower depending workload executing virtual machines force driving server virtualization similar led development time-sharing multiprogramming past although resources still shared time-sharing model virtualization provides higher level security dependent type virtualization used individual virtual servers mostly isolated may run full-fledged operating system independently rebooted virtual instance partitioning single server appear multiple servers increasingly common microcomputers since launch vmware esx server 2001 physical server typically runs hypervisor tasked creating releasing managing resources guest operating systems virtual machines guest operating systems allocated share resources physical server typically manner guest aware physical resources save allocated hypervisor vps runs copy operating system customers superuser-level access operating system instance install almost software runs os however due number virtualization clients typically running single machine vps generally limited processor time ram disk space ultimately used decrease hardware costs condensing failover cluster single machine thus decreasing costs dramatically providing services server roles features generally designed operate isolation example windows server 2019 requires certificate authority domain controller exist independent servers independent instances windows server additional roles features adds areas potential failure well adding visible security risks placing certificate authority domain controller poses potential root access root certificate directly motivates demand virtual private servers order retain conflicting server roles features single hosting machine also advent virtual machine encrypted networks decreases pass-through risks might otherwise discouraged vps usage legitimate hosting server many companies offer virtual private server hosting virtual dedicated server hosting extension web hosting services several challenges consider licensing proprietary software multi-tenant virtual environments unmanaged self-managed hosting customer left administer server instance unmetered hosting generally offered limit amount data-transferred fixed bandwidth line usually unmetered hosting offered 10 mbit/s 100 mbit/s 1000 mbit/s high 10gbit/s means customer theoretically able use ~3 tb 10 mbit/s ~300 tb 1000 mbit/s line per month although practice values significantly less virtual private server shared bandwidth fair usage policy involved unlimited hosting also commonly marketed generally limited acceptable usage policies terms service offers unlimited disk space bandwidth always false due cost carrier capacities technological boundaries | [
3761,
4211,
7343,
4495,
4594,
4498,
4948,
6806,
5571,
1280,
6731,
7508,
7744,
3487,
249,
2961,
6403,
4014,
3756
] | Test |
7,757 | 1 | Comparison_of_triplestores:comparison triplestores comparison triplestores also known subject-predicate-object databases database management systems built database engines scratch others built top existing commercial relational database engines e.g. sql-based like early development online analytical processing olap databases intermediate approach allowed large powerful database engines constructed little programming effort initial phases triplestore development long-term though seems native triplestores advantage performance difficulty implementing triplestores sql although triples may thus stored implementing efficient querying graph-based rdf model e.g. mapping sparql onto sql queries difficult following table overview available triplestores technical implementation support sparql world wide web consortium w3c recommendations available application programming interfaces api | [
1905,
3928,
5894,
2451,
5983,
1445,
3368,
6543,
3542,
6364,
7999,
6029,
4252,
1768,
2054,
5419,
5338,
5778,
4635,
4543,
6489,
7213,
5965,
7303,
2530,
784,
4463,
87,
1435
] | Validation |
7,758 | 9 | Roger_Moore_(computer_scientist):roger moore computer scientist roger d. moore november 16 1939 – march 21 2019 1973 recipient larry breed richard lathwell grace murray hopper award association computing machinery acm given work design implementation apl\ 360 setting new standards simplicity efficiency reliability response time interactive systems moore cofounder i. p. sharp associates held senior position company many years contributed subalgol compiler stanford university wrote algol 60 compiler ferranti-packard 6000 ict 1900 along work programming language apl also instrumental development ipsanet private packet switching data network roger d. moore born redlands california graduation worked operator burroughs 220 computer stanford time provided support larry breed ’ card stunt system also spent time studying burroughs 220 balgol compiler resulted butterfly described george forsythe grader program written balgol-language procedure compiled together procedure called butterfly written moore result relocatable machine-language procedure mechanism equating variables variables balgol program form balgol compiler ’ machine-language library procedures sin write read etc forsythe anticipated problem described bob braden balgol stanford outlived b220 hardware 1962 stanford contracted ibm obtain ibm 7090 campus computing created great consternation forsythe ’ office significant body faculty students familiar balgol high compiling speed bac vital academic environment subject community production-oriented system software offered ibm including slow fortran compiler cumbersome operating system would moved academic computing stanford backward several years address problem december 1961 moore hired forsythe work subalgol compiler ibm 7090 braden breed hired soon afterward completion subalgol hired ferranti-packard write algol 60 compiler fp6000 compiler part software package included sale fp6000 international computers tabulators december 1964 employees ferranti-packard computer group laid along six former fp employees formed i. p. sharp associates vice-president incorporation retirement 1989 1966 larry breed richard lathwell began work apl\360 interpreter lastly apl\360 owes much superior time-sharing performance roger d. moore i.p sharp associates toronto principally responsible supervisor design described extent deserves team received grace murray hopper award association computing machinery acm given work design implementation apl\360 setting new standards simplicity efficiency reliability response time interactive systems 1970 moore became project leader ipsa speculative dos/360 cobol compiler project although compiler satisfactory performance market accept ipsa offered apl time-sharing service starting 1969 1975 inflexibility communication error intolerance time-division multiplexing longer tolerable became chief architect ipsanet packet switching computer network 1976 system deployed north america london 1984 ipsa released sharp apl ibm pc package included 370 emulator written moore retiring ipsa early 1989 became interested opera chamber music along attending many performances supported concerts commissions advanced music education moore funded composing many works | [
6977,
811,
470,
6263,
1361,
908,
3464,
6285,
839,
2315,
1114,
752,
1116,
5322,
851,
1774,
1308,
5424,
6846,
8137,
3060,
1892,
6064,
356
] | Test |
7,759 | 3 | Compaq_Portable_series:compaq portable series compaq first computers portable 'lunchbox 'luggable computers belong compaq portable series computers measured approximately 1×1 foot side approx 2½ ft wide products evolved laptops notebooks created offing new level portability caused market explode portables portable portable ii crt monitors others portable iii portable 386 flat single-color usually amber plasma displays portables came/could come internal hard disk drives .5 shock mount springs diskette drives usually 5 double- quadruple-density drives batteries and/or dual-isa expansion chassis one full-drive-height wide later products included mono color lcd screens battery powered | [
7698,
3764,
2278,
900,
5735,
3882,
5060,
1581,
6127,
1134,
4736,
4277,
3755,
4018
] | Validation |
7,760 | 3 | Helix_HeadRoom:helix headroom headroom dos context switching multitasking memory manager produced helix software company late 1980s early 1990s headroom managed multiple terminate stay resident programs first tsr manager allow sharing address space interrupts among tsrs dos headroom v1.0 released september 1988 april 1989 helix software released headroom v1.1 together headroom network extensions version added support network communications processes headroom network extensions intercepted buffered netbios tcp/ip communications requests allowing headroom manage network communications software mainframe terminal emulators e-mail programs background communications programs would continue programs swapped headroom would reactivate swapped-out programs activity occurred netbios tcp/ip sockets october 1989 helix software released headroom v2.0 included support microsoft windows lim ems v4.0 starting march 1990 version headroom bundled ast research rampage rampage plus sixpack memory expansion boards june 1990 helix software licensed technology headroom digital communications associates use irma boards irmalan software january 1991 helix released final version headroom v2.03 thereafter incorporated headroom features netroom lan memory manager decision caused market confusion | [
4417,
4759,
3236,
3905
] | Test |
7,761 | 9 | Zonnon:zonnon zonnon programming language along oberon modula pascal language line jürg gutknecht author programming language zonnon general purpose programming language pascal modula-2 oberon family conceptual model based objects definitions implementations modules computing model concurrent based active objects interact via syntax controlled dialogs language developed eth zürich institute computer systems prof. jürg gutknecht zonnon introduces concept 'active objects used represent real world concurrent objects within computer programs zonnon language report written brian kirk director robinsons associates david lightfoot oxford brookes university working prof. jürg gutknecht eth zürich dr. eugene zueff евгений зуев moscow state university first book zonnon published n. i. lobachevsky state university nizhny novgorod a.k.a nizhni novgorod state university zonnon member pascal family languages two beneficial consequences general purpose language b immediately familiar pascal modula-2 oberon programmers pascal programs domain algorithms data structures successfully compiled zonnon compiler minor modifications however perspective “ programming-in-the-large ” zonnon much elaborate compared predecessors four different kinds program units zonnon objects modules definitions implementations first two instantiated runtime third compile time unit abstraction fourth unit composition brief characterization zonnon uses compositional inheritance model based aggregation typically object module composed number functional components presenting clients form abstract definition set definitions plus object ’ intrinsic interface set public elements object constitutes interface object clients zonnon allows adding behavior objects modules purpose notion active object imported active oberon language generalized towards unified model hierarchic activities activities encapsulated threads come two flavors local activities agent activities local activities express intrinsic object dynamics typical context block statements representing “ launch logic ” set mutually independent activities assumption end block acts barrier passed activities terminated agent activities control interoperability objects terms formal dialogs agent activity within “ callee ” object serves template formal dialog caller callee agent activities typically implement parser predefined syntax constitutes kind contract two communication partners formal dialogs generalization asynchronous method calls reflected form syntax borrowed ordinary method calls | [
6507,
5948,
5639,
5730,
4589
] | Test |
7,762 | 5 | Web_Cache_Communication_Protocol:web cache communication protocol web cache communication protocol wccp cisco-developed content-routing protocol provides mechanism redirect traffic flows real-time built-in load balancing scaling fault tolerance service-assurance failsafe mechanisms cisco ios release 12.1 later releases allow use either version 1 wccpv1 version 2 wccpv2 protocol wccp allows utilization cisco cache engines caches running wccp localize web traffic patterns network enabling content requests fulfilled locally traffic localization reduces transmission costs download time wccpv1 wccpv2 whilst originally designed cisco content cache appliance since added support products including vendors also implemented wccp support products allows clustering transparent deployment networks using cisco routers/switches without additional hardware wccp particular use vendors web cache/proxy/security appliances redirection web traffic list includes | [
496,
2488,
4596,
7637,
5181,
3338,
6305,
7522,
3637,
3756,
88
] | Validation |
7,763 | 8 | List_of_web_service_frameworks:list web service frameworks list web service frameworks | [
5631,
2833,
6986,
7637,
4422,
1286,
6025,
6029,
5500,
5075,
5874,
4276,
2530,
7315
] | Test |
7,764 | 4 | General_Dynamics_Mission_Systems:general dynamics mission systems general dynamics mission systems business unit american defense aerospace company general dynamics general dynamics mission systems integrates secure communication information systems technology general dynamics mission systems core manufacturing secure communications networks radios satellite technology defense cyber public safety intelligence communities general dynamics mission systems formed january 2015 general dynamics combined company c4 systems advanced information systems general dynamics c4 systems originally owned gte operated gte government systems general dynamics acquired gte government systems 1999 general dynamics advanced information systems provided mission-related systems development integration operations support general dynamics c4 systems leading integrator secure communications information systems technology lte general dynamics mission systems cell wheels cow deployable emergency lte solution used first responders public safety officials mobile cell tower able cover six square miles network created 2013 fortress lte technology includes virtual core network vcn enodeb base stations lte band 14 outdoor omni-directional user equipment c-band lte user equipment lte usb stick modem 4g evolved node b enodeb base stations software defined radios house digital baseband radio frequency rf circuits compact rugged mountable enclosure eliminate external interfaces reduce installation errors setup time range enodeb form factors offered different deployment scenarios support standard 4g lte band classes frequency ranges 400 mhz 6 ghz virtual core network vcn virtual 4g core network deployed wide range cots computing platforms vcn evolved packet core epc solution cyber cyber defense products include taclane network encryptors protecd r data-at-rest encryptors gem x™ encryptor manager pitbull operating system trusted network environment maritime strategic systems general dynamics mission systems acquired bluefin robotics february 2016 manufacturer unmanned undersea vehicles uuvs perform wide range missions u.s. military commercial customers independence-variant littoral combat ship lcs built general dynamics mission systems open architecture computing infrastructure open ci austal contracted build u.s. navy prime contractor subsequent 3.5 billion block buy 2010 august 2016 company successfully completed at-sea testing matador torpedo detection system build canada innovation program bcip tests conducted boat royal canadian navy ship matador acoustic processing system detecting tracking heavyweight anti-ship torpedoes radio communications cm-300/350 series version 2 radios latest additions air traffic control atc radios based faa nexcom segment 2 radio requirements rack mounted transmitter receiver systems specifically designed meet dynamic mission requirements air traffic control centers commercial airports military air stations range installations radio astronomy meerkat telescope array precursor telescope south africa ’ planned square kilometer array ska comprises 64 radio antennas south africa ’ northern cape province completed 2016 meerkat largest powerful radio telescope southern hemisphere ska array completed 2024 meerkat covers eight kilometers facilitate research cosmic magnetism galactic evolution large-scale structure cosmos dark matter nature transient radio sources among science projects space general dynamics mission systems provides integrated ground segments mobile user objective system muos used u.s. navy soon provide cell phone-like communications warfighters move intelligence systems tac-maas motion imagery processing exploitation system stanag 4609 nga motion imagery standard profile misp compliant international equivalent product d-vex sold australian-based subsidiary general dynamics mediaware win-t program win-t warfighter information network-tactical win-t army tactical communications system general dynamics army prime contractor win-t part general dynamics mission systems tactical voice data communications systems soldier network increment 1 fully deployed began fielding 2004 completed fielding 2012 november 2007 general dynamics announced 78 million order indefinite delivery quantity contract win-t increment 1 april 2015 general dynamics mission systems awarded 36 million army contract maintenance repair products related increment 1 june 2015 general dynamics secured contract increment 2 valued 219 million increment 2 includes additional capabilities mobile broadband increment 1 2 equipment remain field battalion company levels increment 3 completed | [
7554,
1671
] | Test |
7,765 | 5 | Telnet:telnet telnet application protocol used internet local area network provide bidirectional interactive text-oriented communication facility using virtual terminal connection user data interspersed in-band telnet control information 8-bit byte oriented data connection transmission control protocol tcp telnet developed 1969 beginning rfc 15 extended rfc 855 standardized internet engineering task force ietf internet standard std 8 one first internet standards name stands teletype network historically telnet provided access command-line interface usually operating system remote host including network equipment operating systems configuration utility including systems based windows nt however serious security concerns using telnet open network internet use purpose waned significantly favor ssh term telnet also used refer software implements client part protocol telnet client applications available virtually computer platforms telnet also used verb telnet means establish connection using telnet protocol either command line client graphical interface example common directive might change password telnet server log run passwd command cases user would telnetting unix-like server system network device router telnet client-server protocol based reliable connection-oriented transport typically protocol used establish connection transmission control protocol tcp port number 23 telnet server application telnetd listening telnet however predates tcp/ip originally run network control program ncp protocols even though telnet ad hoc protocol official definition march 5 1973 name actually referred teletype network protocol rfc 206 nic 7176 telnet makes connection clear many extensions made telnet negotiable options protocol architecture extensions adopted internet standards ietf documents std 27 std 32 extensions widely implemented others proposed standards ietf standards track see telnet best understood context user simple terminal using local telnet program known client program run logon session remote computer user communications needs handled telnet server program telnet initially developed 1969 users networked computers computer departments academic institutions large private government research facilities environment security nearly much concern became bandwidth explosion 1990s rise number people access internet extension number people attempting hack people servers made encrypted alternatives necessary experts computer security sans institute recommend use telnet remote logins discontinued normal circumstances following reasons security-related shortcomings seen usage telnet protocol drop rapidly especially public internet favor secure shell ssh protocol first released 1995 ssh practically replaced telnet older protocol used days rare cases access decades old legacy equipment support modern protocols ssh provides much functionality telnet addition strong encryption prevent sensitive data passwords intercepted public key authentication ensure remote computer actually claims happened early internet protocols extensions telnet protocol provide transport layer security tls security simple authentication security layer sasl authentication address concerns however telnet implementations support extensions relatively little interest implementing ssh adequate purposes note large number industrial scientific devices telnet available communication option built standard rs-232 port use serial server hardware appliance provide translation tcp/telnet data rs-232 serial data cases ssh option unless interface appliance configured ssh ibm 5250 3270 workstation emulation supported via custom telnet clients tn5250/tn3270 ibm servers clients servers designed pass ibm 5250 data streams telnet generally support ssl encryption ssh include 5250 emulation os/400 also known ibm port 992 default port secured telnet data octets except 0xff transmitted telnet sometimes used telnet client applications establish interactive raw tcp session due commonly mistaken belief session use iac functionally identical example user could make http request hand using command line version telnet client application follows case however network virtual terminal nvt rules requirement bare carriage return character cr ascii 13 followed nul ascii 0 character distinguish telnet protocol raw tcp sessions hand many systems possess true raw tcp clients netcat socat unix putty windows also used manually talk services without specialized client software nevertheless telnet still sometimes used debugging network services smtp irc http ftp pop3 servers issue commands server examine responses protocols ftp really uses telnet data format another difference telnet raw tcp session telnet 8-bit clean default 8-bit mode may negotiated high-bit-set octets may garbled mode requested requested non-telnet connection 8-bit mode named binary option intended transmit binary data characters though standard suggests interpretation codes 0000–0176 ascii offer meaning high-bit-set data octets attempt introduce switchable character encoding support like http nothing known actual software support | [
4655,
7148,
362,
3932,
709,
5373,
4676,
4677,
6802,
7168,
7170,
4683,
5378,
20,
6432,
1462,
7533,
7534,
7537,
2566,
5039,
3291,
6446,
2574,
7910,
3638,
4333,
2219,
3640,
3976,
2944,
4709,
7916,
5760,
3312,
4352,
7214,
7217,
2612,
3337,
... | Test |
7,766 | 7 | Microsoft_Dynamics_365:microsoft dynamics 365 dynamics 365 product line enterprise resource planning erp customer relationship management crm applications announced microsoft july 2016 general release november 1 2016 part microsoft dynamics product line dynamics 365 sold two editions business edition small medium-sized enterprises smes smbs enterprise edition medium large organizations business edition includes financials application based project code-named 'madeira enterprise edition comprises dynamics crm applications field service sales project service automation customer service plus microsoft powerapps together microsoft premier erp product known dynamics 365 operations july 1 2017 dynamics 365 line repackaged crm applications called customer engagement plan erp application called microsoft dynamics 365 finance operations however available part unified operations plan also includes standalone applications dynamics 365 talent dynamics 365 retail together two plans form dynamics 365 plan microsoft dynamics 365 contains 11 core modules | [
3668,
7766,
1115,
4759,
5258,
5571,
696,
1165,
7332,
4015
] | Train |
7,767 | 2 | Active_object_(Symbian_OS):active object symbian os active object framework callback-based form multitasking computer systems specifically form cooperative multitasking important feature symbian operating system within framework active objects may make requests asynchronous services e.g sending sms message asynchronous request made control returned calling object immediately i.e without waiting call complete caller may choose things returns control back operating system typically schedules tasks puts machine sleep makes request calling object includes reference asynchronous task completes operating system identifies thread containing requesting active object wakes active scheduler thread identifies object made request passes control back object implementation active objects symbian based around thread request semaphore incremented thread makes asynchronous request decremented request completed outstanding requests thread put sleep practice may many active objects thread task interact requesting things active objects threads may even request things implementation old idea developed handle software interruptions 70s operating system acting first object peripheral second one | [
5571
] | Test |
7,768 | 0 | Text_nailing:text nailing text nailing tn information extraction method semi-automatically extracting structured information unstructured documents tn combines two concepts 1 human-interaction narrative text identify highly prevalent non-negated expressions 2 conversion expressions notes non-negated alphabetical-only representations create homogeneous representations traditional machine learning approaches text classification human expert required label phrases entire notes supervised learning algorithm attempts generalize associations apply new data contrast using non-negated distinct expressions eliminates need additional computational method achieve generalizability tn developed massachusetts general hospital tested multiple scenarios including extraction smoking status family history coronary artery disease identifying patients sleep disorders improve accuracy framingham risk score patients non-alcoholic fatty liver disease classify non-adherence type-2 diabetes comprehensive review regarding extracting information textual documents electronic health record available importance using non-negated expressions achieve increased accuracy text-based classifiers emphasized letter published communications acm october 2018 sample code extracting smoking status narrative notes using nailed expressions available github july 2018 researchers virginia tech university illinois urbana–champaign referred tn example progressive cyber-human intelligence pchi chen asch 2017 wrote machine learning situated peak inflated expectations soften subsequent crash “ trough disillusionment ” fostering stronger appreciation technology ’ capabilities limitations letter published communications acm beyond brute force emphasized brute force approach may perform better traditional machine learning algorithms applied text letter stated ... machine learning algorithms applied text rely assumption language includes infinite number possible expressions contrast across variety medical conditions observed clinicians tend use expressions describe patients conditions viewpoint published june 2018 concerning slow adoption data-driven findings medicine uri kartoun co-creator text nailing states ... text nailing raised skepticism reviewers medical informatics journals claimed relies simple tricks simplify text leans heavily human annotation tn indeed may seem like trick light first glance actually fairly sophisticated method finally caught attention adventurous reviewers editors ultimately accepted publication human in-the-loop process way generate features using domain experts using domain experts come features novel concept however specific interfaces method helps domain experts create features likely novel case features experts create equivalent regular expressions removing non-alphabetical characters matching smokesppd equal regular expression /smokes ^a-za-z *ppd/ using regular expressions features text classification novel given features classifier manually set threshold authors decided performance set documents classifier parameters classifier case threshold set manually given features documents almost machine learning algorithm able find threshold likely better one authors note using support vector machines svm hundreds documents give inferior performance specify features documents svm trained/tested fair comparison would use features document sets used manual threshold classifier | [
7848
] | Validation |
7,769 | 4 | Actiance:actiance actiance inc formerly known facetime communications american-based multinational corporation develops platforms required enable security management compliance unified communications web 2.0 social media channels headquartered redwood city california actiance supports leading social networks unified communications providers instant messaging platforms including facebook linkedin twitter aol google yahoo skype microsoft ibm cisco established 1997 actiance provided call center crm enablement instant messaging web chat email working closely aol yahoo msn microsoft actiance established industry first cap agreements certified access programs providing enhanced access public im networks 2000 actiance awarded innovative use real-time collaboration microsoft exchange conference 2001 company launched first compliance security solution im networks im auditor aimed specifically financial services sector needed comply government regulations enabled financial services organizations ability leverage power public instant messaging networks aol microsoft yahoo time-sensitive communications ensuring administrative controls place comply government regulations 2003 50 top 100 financial services firms worldwide needed comply securities exchange commission nasd record retention supervisory requirements using im auditor whilst others still questioning whether im place business networks actiance introduced first network appliance control use im enterprise 2004 capable preventing unauthorized im connections stopping peer-to-peer p2p filesharing sites kazaa grokster morpheus real time guardian rtg identified controlled access growing number applications traversed network without department ’ knowledge actiance continued add features rtg including support unified communication platforms microsoft office communications server ibm lotus sametime 2005 response growing threat worms spyware traversing im networks zero day defence system added 2008 actiance added new capabilities rtg ’ successor unified security gateway usg providing managers management security control 140 social networking sites 20,000 individual facebook widgets 400 web real-time applications making usg first secure web gateway combine content monitoring management security web 2.0 applications social networks instant messaging unified communications url filtering malware web antivirus protection 2010 saw another first actiance launched vantage imauditor ’ successor included stringent security compliance controls skype enterprise vantage provides granular security policy controls compliance features real time unified communications uc – providing management widest variety uc real time communications platforms including microsoft office communications server ibm lotus sametime public instant messaging platforms windows live skype web conferencing industry focused networks like reuters bloomberg yellowjacket later year include support microsoft lync server also 2010 actiance launched socialite enable security management compliance solution enterprises using social networks socialite provides granular control applications facebook linkedin twitter allows organisations comply regulatory compliance demanded organizations financial industry regulatory authority finra financial services authority available software-as-a-service deployment saas on-premises installation module usg socialite enable allows organizations control social media features communications users corporate network situated remotely january 2011 facetime communications announced changed name actiance following purchase facetime brand apple june 2011 actiance announced socialite engage new platform allows distributed teams share content engage clients prospects analyze impact content social media sites designed specifically enable investment insurance professionals distribute pre-approved content socialite engage enables organization manage social media secure compliant environment allowing users see glance content impact also leverages third party data sources internal systems data feeds highlights channels effective identifies potential sales leads | [
6025,
2880,
1014,
1805,
6092
] | Test |
7,770 | 7 | Cloud-based_design_and_manufacturing:cloud-based design manufacturing cloud-based design manufacturing cbdm refers service-oriented networked product development model service consumers able configure products services reconfigure manufacturing systems infrastructure-as-a-service iaas platform-as-a-service paas hardware-as-a-service haas software-as-a-service saas adapted original cloud computing paradigm introduced realm computer-aided product development cloud-based design manufacturing gaining significant momentum attention academia industry cloud-based design manufacturing includes two aspects cloud-based design cloud-based manufacturing another related concept cloud manufacturing general popular cloud-based design cbd refers networked design model leverages cloud computing service-oriented architecture soa web 2.0 e.g. social network sites semantic web technologies support cloud-based engineering design services distributed collaborative environments cloud-based manufacturing cbm refers networked manufacturing model exploits on-demand access shared collection diversified distributed manufacturing resources form temporary reconfigurable production lines enhance efficiency reduce product lifecycle costs allow optimal resource allocation response variable-demand customer generated tasking enabling technologies cloud-based design manufacturing include cloud computing web 2.0 internet things iot service-oriented architecture soa term cloud-based design manufacturing cbdm initially coined dazhong wu david rosen dirk schaefer georgia tech 2012 purpose articulating new paradigm digital manufacturing design innovation distributed collaborative settings main objective cbdm reduce time cost associated maintaining information communication technology ict infrastructures design manufacturing enhancing digital manufacturing design innovation distributed collaborative environments adapting rapidly changing market demands 2014 research group also published worldwide first two books subjects cloud-based design manufacturing cbdm social product development spd springer edited dirk schaefer cbdm exhibits following key characteristics cbdm differs traditional collaborative distributed design manufacturing systems web-based systems agent-based systems number perspectives including 1 computing architecture 2 data storage 3 sourcing process 4 information communication technology infrastructure 5 business model 6 programming model 7 communication similar cloud computing cbdm services categorized four major deployment models public cloud private cloud hybrid cloud community cloud | [
2961,
6828,
6922,
7290,
5447
] | Train |
7,771 | 4 | Chosen-plaintext_attack:chosen-plaintext attack chosen-plaintext attack cpa attack model cryptanalysis presumes attacker obtain ciphertexts arbitrary plaintexts goal attack gain information reduces security encryption scheme modern ciphers aim provide semantic security also known ciphertext indistinguishability chosen-plaintext attack therefore design generally immune chosen-plaintext attacks correctly implemented chosen-plaintext attack adversary possibly adaptively ask ciphertexts arbitrary plaintext messages formalized allowing adversary interact encryption oracle viewed black box attacker ’ goal reveal part secret encryption key may seem infeasible practice attacker could obtain ciphertexts given plaintexts however modern cryptography implemented software hardware used diverse range applications many cases chosen-plaintext attack often feasible see also practice chosen-plaintext attacks become extremely important context public key cryptography encryption key public attackers encrypt plaintext choose two forms chosen-plaintext attacks general batch chosen-plaintext attack carried follows consider following extension situation last step cipher indistinguishable encryptions chosen-plaintext attack running experiment =1 adversary ca n't guess correctly probability non-negligibly better 1/2 following examples demonstrate ciphers meet security definitions may broken chosen-plaintext attack following attack caesar cipher allows full recovery secret key intricate complex encryption methodologies decryption method becomes resource-intensive however core concept still relatively following attack one-time pad allows full recovery secret key suppose message length key length equal world war ii us navy cryptanalysts discovered japan planning attack location referred af believed af might midway island locations hawaiian islands codewords began prove hypothesis af corresponded midway island asked us forces midway send plaintext message low supplies japanese intercepted message immediately reported superiors af low water confirming navy hypothesis allowing position force win battle also world war ii allied codebreakers bletchley park would sometimes ask royal air force lay mines position n't abbreviations alternatives german naval system grid reference hope germans seeing mines would use enigma machine encrypt warning message mines clear message removed giving allies enough information message break german naval enigma process planting known-plaintext called gardening allied codebreakers also helped craft messages sent double agent juan pujol garcía whose encrypted radio reports received madrid manually decrypted re-encrypted enigma machine transmission berlin helped codebreakers decrypt code used second leg supplied original text modern day chosen-plaintext attacks cpas often used break symmetric ciphers considered cpa-secure symmetric cipher must vulnerable chosen-plaintext attacks thus important symmetric cipher implementors understand attacker would attempt break cipher make relevant improvements chosen-plaintext attacks small part plaintext may need chosen attacker attacks known plaintext injection attacks chosen-plaintext attack powerful known-plaintext attack attacker directly target specific terms patterns without wait appear naturally allowing faster gathering data relevant cryptanalysis therefore cipher prevents chosen-plaintext attacks also secure known-plaintext ciphertext-only attacks however chosen-plaintext attack less powerful chosen-ciphertext attack attacker obtain plaintexts arbitrary ciphertexts cca-attacker sometimes break cpa-secure system example el gamal cipher secure chosen plaintext attacks vulnerable chosen ciphertext attacks unconditionally malleable | [
6372,
7862,
433,
125,
3588,
1353,
2620,
5776
] | Test |
7,772 | 8 | Scuttle_(software):scuttle software scuttle php/mysql-based open source social bookmarking application contains code php-based projects drupal jquery scuttle offers functionality social bookmarking websites tagging rss multiple languages security settings public private also supports bookmark imports delicious delicious api means programs widgets might also work backups available via xml mysql backend lacks administrator backend although one commercially available called scuttle plus advanced semantic scuttle provides anti-spam protection structured tags collaborative tag description | [
6029,
3915,
5571
] | Test |
7,773 | 2 | WinLinux:winlinux winlinux linux distribution installer runs inside windows operating system also configuration tool run inside windows set hardware options linux os installed directory existing fat32 partition means ability share windows partition disk space latest version winlinux 2003 launched like windows application shortcut causes pc reboot winlinux exiting winlinux allow pc go back windows next bootup able run linux applications ships kde default desktop distribution currently inactive | [
5200,
4759,
1629,
3444,
7251,
474,
7075,
1941,
314,
2758,
1663,
2864,
6209,
3996,
6761,
2063,
343,
1050,
4824,
5523,
5259,
1893,
5530,
5704,
6317,
7587,
7954,
6244
] | Validation |
7,774 | 4 | Interest_Flooding_Attack:interest flooding attack interest flooding attack ifa denial-of-service attack information-centric network content-centric networking ccn named data networking ndn attacker requests existing non-existing content order overload distribution infrastructure implemented sending interest packets resolved resolved fast enough thus lead malicious cpu memory consumption attack previously denoted open problem icn heuristic countermeasures available 2016 aubrey alston tamer refaei mitre corporation presented exact solution problem utilizes in-packet cryptographic mechanism remove ability high-volume interest traffic overload distribution infrastructure network | [
1691,
4114
] | Test |
7,775 | 3 | Exec_(Amiga):exec amiga exec kernel amigaos 13 kb multitasking microkernel enabled pre-emptive multitasking little 256 kb memory supplied first amiga 1000s exec provided functions multitasking memory management handling interrupts dynamic shared libraries acts scheduler tasks running system providing pre-emptive multitasking prioritized round-robin scheduling exec also provides access libraries high-level inter-process communication via message passing comparable microkernels performance problems need copy messages address spaces since amiga one address space exec message passing quite efficient fixed memory address amiga software address 4 pointer codice_1 used access libraries exec designed implemented carl sassenrath unlike newer modern operating systems exec kernel run privileged contemporary operating systems 68000 atari tos sunos used trap instructions invoke kernel functions made kernel functions run 68000 supervisor mode user software ran unprivileged user mode contrast exec function calls made library jump table kernel code normally executes user mode whenever supervisor mode needed either kernel user programs library functions codice_2 codice_3 used one limit exec kernel uncooperative program could disable multitasking long time indefinitely invoking exec calls codice_4 codice_5 later invocation corresponding codice_6 codice_7 causing environment run one task multitasking could also disabled programs software bug intent modify exec data structures code stored random-access memory ram possibly due lack memory management unit mmu support even limits exec satisfies definition preemptive scheduling algorithm using preemptive scheduling routine basing interrupt intervals clock linux kernel developer linus torvalds described amiga design cooperative even though uses preemptive scheduling policy reason argued lack memory protection tasks meant task could hinder system operating preemptively tasks would need choose stop preemptive mechanism would reduce kind inverted cooperative system kind conflation protection scheduler policy nonstandard execsg second generation kernel used amigaos 4 kernel licensed hyperion entertainment thomas frieden hans-jörg frieden exposes functions structures commodore amiga exec kernel runs powerpc cpus ultimate origin execsg unspecified | [
5275,
97,
3688,
1534,
6256,
5021,
2379,
4399,
6431,
3531,
6009,
7823,
5571,
307,
5833,
5661,
3544,
35,
4244,
7554,
7096,
7746,
1959,
7384,
6921,
1214,
1670,
4435,
594,
3222,
4175,
4354,
6385,
3905,
5079,
5962,
4006,
7942,
1604,
3751,
77... | Test |
7,776 | 0 | TERMIUM_Plus:termium plus termium plus electronic terminological database operated maintained translation bureau government canada database offers millions english french terms various specialized fields terms spanish portuguese also available multilingual database termium plus initially developed université de montréal october 1970 database initially named banque de terminologie de l ’ université de montréal btum direction marcel paré vision produce flexible bilingual language file would available btum initially funded private donors government subsidies grew help professionals field translation following years 1975 btum able obtain data user responses collaboration language services bell canada end 1974 however translation bureau canadian secretary state department showed interest operation btum goal translation bureau time standardize terminology throughout public service well federal public administration january 1976 canadian secretary state department officially acquired btum renamed database termium terminologie université de montréal system transferred central computer federal government ottawa began integrate approximately 175,000 files btum initially compiled files translation bureau working years follow bureau began sorting process along input process onto computer database grew 900,000 records 1987 terminological records grew termium database canadian government received proposal 1985 toronto-based company launch termium cd-rom format order make database accessible users fall 1987 pilot project cd-rom launched investigate responses users included services translation bureau private canadian companies data compilation investigation bureau incorporated indexing system improve speed accuracy term extraction 1990 termium cd-rom commercially available subscription annual fee 1,100 1,500 updates released every three four months 1996 termium cd-rom received award atio association translators interpreters ontario october 2009 termium plus array language tools language portal canada launched free online access termium initially developed contain terminological records canada ’ official languages english french system upgraded third-generation version 1985 contained records languages spanish order accommodate growing range users worth noting however “ multilingual ” records term source language would english french equivalent non-official language currently vast collection specialized domains fields covered termium plus ranging administration including appellations arts sciences law justice aside millions entries recorded termium plus database also contains writing tools english french language canadian style writing style guide dictionnaire des cooccurrences guide french collocations archived glossaries well link language portal canada containing various french english writing resources | [] | Test |
7,777 | 9 | Verilog:verilog verilog standardized ieee 1364 hardware description language hdl used model electronic systems commonly used design verification digital circuits register-transfer level abstraction also used verification analog circuits mixed-signal circuits well design genetic circuits 2009 verilog standard ieee 1364-2005 merged systemverilog standard creating ieee standard 1800-2009 since verilog officially part systemverilog language current version ieee standard 1800-2017 hardware description languages verilog similar software programming languages include ways describing propagation time signal strengths sensitivity two types assignment operators blocking assignment non-blocking assignment non-blocking assignment allows designers describe state-machine update without needing declare use temporary storage variables since concepts part verilog language semantics designers could quickly write descriptions large circuits relatively compact concise form time verilog introduction 1984 verilog represented tremendous productivity improvement circuit designers already using graphical schematic capture software specially written software programs document simulate electronic circuits designers verilog wanted language syntax similar c programming language already widely used engineering software development like c verilog case-sensitive basic preprocessor though less sophisticated ansi c/c++ control flow keywords if/else case etc equivalent operator precedence compatible c. syntactic differences include required bit-widths variable declarations demarcation procedural blocks verilog uses begin/end instead curly braces many minor differences verilog requires variables given definite size c sizes assumed 'type variable instance integer type may 8 bits verilog design consists hierarchy modules modules encapsulate design hierarchy communicate modules set declared input output bidirectional ports internally module contain combination following net/variable declarations wire reg integer etc concurrent sequential statement blocks instances modules sub-hierarchies sequential statements placed inside begin/end block executed sequential order within block however blocks executed concurrently making verilog dataflow language verilog concept 'wire consists signal values 4-state 1 0 floating undefined signal strengths strong weak etc. system allows abstract modeling shared signal lines multiple sources drive common net wire multiple drivers wire readable value resolved function source drivers strengths subset statements verilog language synthesizable verilog modules conform synthesizable coding style known rtl register-transfer level physically realized synthesis software synthesis software algorithmically transforms abstract verilog source netlist logically equivalent description consisting elementary logic primitives flip-flops etc available specific fpga vlsi technology manipulations netlist ultimately lead circuit fabrication blueprint photo mask set asic bitstream file fpga verilog one first popular hardware description languages invented created prabhu goel phil moorby chi-lai huang douglas warmke late 1983 early 1984 chi-lai huang earlier worked hardware description lalsd language developed professor s.y.h su phd work wording process automated integrated design systems later renamed gateway design automation 1985 hardware modeling language gateway design automation purchased cadence design systems 1990 cadence full proprietary rights gateway verilog verilog-xl hdl-simulator would become de facto standard verilog logic simulators next decade originally verilog intended describe allow simulation automated synthesis subsets language physically realizable structures gates etc developed language achieved widespread usage verilog portmanteau words verification logic increasing success vhdl time cadence decided make language available open standardization cadence transferred verilog public domain open verilog international ovi known accellera organization verilog later submitted ieee became ieee standard 1364-1995 commonly referred verilog-95 time frame cadence initiated creation verilog-a put standards support behind analog simulator spectre verilog-a never intended standalone language subset verilog-ams encompassed verilog-95 extensions verilog-95 submitted back ieee cover deficiencies users found original verilog standard extensions became ieee standard 1364-2001 known verilog-2001 verilog-2001 significant upgrade verilog-95 first adds explicit support 2 complement signed nets variables previously code authors perform signed operations using awkward bit-level manipulations example carry-out bit simple 8-bit addition required explicit description boolean algebra determine correct value function verilog-2001 succinctly described one built-in operators » generate/endgenerate construct similar vhdl generate/endgenerate allows verilog-2001 control instance statement instantiation normal decision operators case/if/else using generate/endgenerate verilog-2001 instantiate array instances control connectivity individual instances file i/o improved several new system tasks finally syntax additions introduced improve code readability e.g always named parameter override c-style function/task/module header declaration verilog-2001 version verilog supported majority commercial eda software packages confused systemverilog verilog 2005 ieee standard 1364-2005 consists minor corrections spec clarifications new language features uwire keyword separate part verilog standard verilog-ams attempts integrate analog mixed signal modeling traditional verilog advent hardware verification languages openvera verisity e language encouraged development superlog co-design automation inc acquired synopsys foundations superlog vera donated accellera later became ieee standard p1800-2005 systemverilog systemverilog superset verilog-2005 many new features capabilities aid design verification design modeling 2009 systemverilog verilog language standards merged systemverilog 2009 ieee standard 1800-2009 current version ieee standard 1800-2017 simple example two flip-flops follows operator verilog another aspect hardware description language opposed normal procedural language known non-blocking assignment action register always block executed means order assignments irrelevant produce result flop1 flop2 swap values every clock assignment operator referred blocking assignment assignment used purposes logic target variable updated immediately example statements used blocking operator instead flop1 flop2 would swapped instead traditional programming compiler would understand simply set flop1 equal flop2 subsequently ignore redundant logic set flop2 equal flop1 example counter circuit follows example delays always clause illustrates type method use i.e executes whenever entities list b e changes one changes immediately assigned new value due blocking assignment b assigned new value afterward taking account new value delay 5 time units c assigned value b value c e tucked away invisible store 6 time units assigned value tucked away signals driven within process initial always block must type reg signals driven outside process must type wire keyword reg necessarily imply hardware register definition constants verilog supports addition width parameter basic syntax width bits base letter number examples several statements verilog analog real hardware e.g display consequently much language used describe hardware examples presented classic subset language direct mapping real gates next interesting structure transparent latch pass input output gate signal set pass-through captures input stores upon transition gate signal hold output remain stable regardless input signal gate set hold example pass-through level gate would value clause true i.e gate 1 read gate true din fed latch_out continuously clause false last value latch_out remain independent value din flip-flop next significant template verilog d-flop simplest modeled significant thing notice example use non-blocking assignment basic rule thumb use posedge negedge statement within always clause variant d-flop one asynchronous reset convention reset state first clause within statement next variant including asynchronous reset asynchronous set condition convention comes play i.e reset term followed set term note model used model set/reset flip flop simulation errors result consider following test sequence events 1 reset goes high 2 clk goes high 3 set goes high 4 clk goes high 5 reset goes low followed 6 set going low assume setup hold violations example always statement would first execute rising edge reset occurs would place q value 0 next time always block executes would rising edge clk would keep q value 0 always block executes set goes high reset high forces q remain 0 condition may may correct depending actual flip flop however main problem model notice reset goes low set still high real flip flop cause output go 1 however model occur always block triggered rising edges set reset — levels different approach may necessary set/reset flip flops final basic variant one implements d-flop mux feeding input mux d-input feedback flop allows gated load function note initial blocks mentioned description split fpga asic synthesis tools structure fpga tools allow initial blocks reg values established instead using reset signal asic synthesis tools n't support statement reason fpga initial state something downloaded memory tables fpga asic actual hardware implementation two separate ways declaring verilog process always initial keywords always keyword indicates free-running process initial keyword indicates process executes exactly constructs begin execution simulator time 0 execute end block always block reached end rescheduled common misconception believe initial block execute always block fact better think initial-block special-case always-block one terminates completes first time classic uses two keywords two significant additional uses common always keyword without ... sensitivity list possible use always shown always keyword acts similar c language construct 1 .. sense execute forever interesting exception use initial keyword addition forever keyword example functionally identical always example fork/join pair used verilog create parallel processes statements blocks fork/join pair begin execution simultaneously upon execution flow hitting fork execution continues join upon completion longest running statement block fork join way written possible either sequences abc bac print order simulation first write second write depends simulator implementation may purposefully randomized simulator allows simulation contain accidental race conditions well intentional non-deterministic behavior notice vhdl dynamically spawn multiple processes like verilog order execution n't always guaranteed within verilog best illustrated classic example consider code snippet printed values b depending order execution initial blocks could zero zero alternately zero arbitrary uninitialized value display statement always execute assignment blocks completed due 1 delay note operators shown order precedence ieee 1364 standard defines four-valued logic four states 0 1 z high impedance x unknown logic value competing vhdl dedicated standard multi-valued logic exists ieee 1164 nine levels system tasks available handle simple i/o various design measurement functions simulation system tasks prefixed distinguish user tasks functions section presents short list frequently used tasks means comprehensive list pli provides programmer mechanism transfer control verilog program function written c language officially deprecated ieee std 1364-2005 favor newer verilog procedural interface completely replaces pli pli vpi enables verilog cooperate programs written c language test harnesses instruction set simulators microcontroller debuggers example provides c functions codice_1 codice_2 used write read argument current verilog task function respectively information verilog simulators see list verilog simulators | [
6507,
5893,
6071,
6329,
4028,
4926,
5458,
1725,
463,
4041,
718,
3365,
7535,
4321,
3105,
1336,
5225,
1556,
4836,
309,
2659,
486,
4703,
5936,
3799,
2672,
6128,
6753,
7209,
4359,
8024,
3230,
4092,
4093,
4637,
7305,
3156,
971,
2803,
1435,
2... | Test |
7,778 | 5 | DICOM:dicom digital imaging communications medicine dicom standard communication management medical imaging information related data dicom commonly used storing transmitting medical images enabling integration medical imaging devices scanners servers workstations printers network hardware picture archiving communication systems pacs multiple manufacturers widely adopted hospitals making inroads smaller applications like dentists doctors offices dicom files exchanged two entities capable receiving image patient data dicom format different devices come dicom conformance statements clearly state dicom classes support standard includes file format definition network communications protocol uses tcp/ip communicate systems national electrical manufacturers association nema holds copyright published standard developed dicom standards committee whose members also partly members nema also known nema standard ps3 iso standard 12052:2017 health informatics -- digital imaging communication medicine dicom including workflow data management dicom used worldwide store exchange transmit medical images dicom central development modern radiological imaging dicom incorporates standards imaging modalities radiography ultrasonography computed tomography ct magnetic resonance imaging mri radiation therapy dicom includes protocols image exchange e.g. via portable media dvds image compression 3-d visualization image presentation results reporting dicom standard divided related independent parts dicom standard developed american college radiology acr national electrical manufacturers association nema beginning 1980s difficult anyone manufacturers computed tomography magnetic resonance imaging devices decode images machines generated radiologists medical physicists wanted use images dose-planning radiation therapy acr nema joined forces formed standard committee 1983 first standard acr/nema 300 entitled digital imaging communications released 1985 soon release became clear improvements needed text vague internal contradictions 1988 second version released version gained acceptance among vendors image transmission specified dedicated 2 pair cable eia-485 first demonstration acr/nema v2.0 interconnectivity technology held georgetown university may 21–23 1990 six companies participated event dejarnette research systems general electric medical systems merge technologies siemens medical systems vortech acquired kodak year 3m commercial equipment supporting acr/nema 2.0 presented annual meeting radiological society north america rsna 1990 vendors many soon realized second version also needed improvement several extensions acr/nema 2.0 created like papyrus developed university hospital geneva switzerland spi standard product interconnect driven siemens medical systems philips medical systems first large-scale deployment acr/nema technology made 1992 us army air force part mdis medical diagnostic imaging support program based ft. detrick maryland loral aerospace siemens medical systems led consortium companies deploying first us military pacs picture archiving communications system major army air force medical treatment facilities teleradiology nodes large number us military clinics dejarnette research systems merge technologies provided modality gateway interfaces third party imaging modalities siemens spi network veterans administration navy also purchased systems contract 1993 third version standard released name changed digital imaging communications medicine abbreviated dicom new service classes defined network support added conformance statement introduced initially dicom standard referred dicom 3.0 distinguish predecessors dicom constantly updated extended since 1993 intent changes backward compatible except rare cases earlier specification incorrect ambiguous officially version standard except current standard hence 3.0 version number longer used minor versions standard e.g. thing dicom 3.1 current plans develop new incompatible version standard i.e. dicom 4.0 standard referenced without specification date release particular published edition except specific conformance requirements invoked depend retired feature longer documented current standard dicom standard achieved near universal level acceptance amongst medical imaging equipment vendors healthcare organizations standard limitations dicom standard directed addressing technical interoperability issues medical imaging framework architecture achieving useful clinical workflow integrating healthcare enterprise ihe initiative layered top dicom hl-7 defines profiles select features standards implement transactions specific medical imaging interoperability use cases though always internet compatible based transport tcp time increasing need support port 80 http transport make use easier within web browser recently family dicom restful web services defined allow mobile device friendly access dicom objects services include wado-rs stow-rs qido-rs together constitute dicomweb initiative derivations dicom standard application areas include diconde digital imaging communication nondestructive evaluation established 2004 way nondestructive testing manufacturers users share image data dicos digital imaging communication security established 2009 used image sharing airport security dicom groups information data sets example file chest x-ray image may contain patient id within file image never separated information mistake similar way image formats jpeg also embedded tags identify otherwise describe image dicom data object consists number attributes including items name id etc. also one special attribute containing image pixel data i.e logically main object header merely list attributes including pixel data single dicom object one attribute containing pixel data many modalities corresponds single image however attribute may contain multiple frames allowing storage cine loops multi-frame data another example nm data nm image definition multi-dimensional multi-frame image cases three- four-dimensional data encapsulated single dicom object pixel data compressed using variety standards including jpeg lossless jpeg jpeg 2000 run-length encoding rle lzw zip compression used whole data set pixel data rarely implemented dicom uses three different data element encoding schemes explicit value representation vr data elements vrs ob ow sq ut un format data element group 2 bytes element 2 bytes vr 2 bytes lengthinbyte 2 bytes data variable length explicit data elements implicit data elements see section 7.1 part 5 dicom standard basic format used applications including network file usage written file usually true header containing copies key attributes details application wrote added promote identical grayscale image display different monitors consistent hard-copy images various printers dicom committee developed lookup table display digitally assigned pixel values use dicom grayscale standard display function gsdf images must viewed printed devices lookup curve devices calibrated gsdf curve addition value representation attribute also value multiplicity indicate number data elements contained attribute character string value representations one data element encoded successive data elements separated backslash character dicom consists services involve transmission data network file format offline media later addition standard dicom store service used send images persistent objects structured reports etc picture archiving communication system pacs workstation dicom storage commitment service used confirm image permanently stored device either redundant disks backup media e.g burnt cd service class user scu similar client modality workstation etc. uses confirmation service class provider scp similar server archive station instance make sure safe delete images locally enables workstation find lists images objects retrieve picture archiving communication system dicom modality worklist service provides list imaging procedures scheduled performance image acquisition device sometimes referred modality system items worklist include relevant details subject procedure patient id name sex age type procedure equipment type procedure description procedure code procedure order referring physician accession number reason exam image acquisition device ct scanner queries service provider ris get information presented system operator used imaging device populate details image metadata prior use dicom modality worklist service scanner operator required manually enter relevant details manual entry slower introduces risk misspelled patient names data entry errors complementary service modality worklist enables modality send report performed examination including data images acquired beginning time end time duration study dose delivered etc helps give radiology department precise handle resource acquisition station use also known mpps service allows modality better coordinate image storage servers giving server list objects send actually sending objects dicom print service used send images dicom printer normally print x-ray film standard calibration defined dicom part 14 help ensure consistency various display devices including hard copy printout format off-line media files specified part 10 dicom standard files sometimes referred part 10 files dicom restricts filenames dicom media 8 characters systems wrongly use 8.3 conform standard information must extracted names ps3.10 section 6.2.3.2 common source problems media created developers read specifications carefully historical requirement maintain compatibility older existing systems also mandates presence media directory dicomdir file provides index summary information dicom files media dicomdir information provides substantially greater information file filename could less need meaningful file names dicom files typically .dcm file extension part dicom media requires without extension mime type dicom files defined rfc 3240 application/dicom uniform type identifier type dicom files org.nema.dicom also ongoing media exchange test connectathon process cd media network operation organized ihe organization core application dicom standard capture store distribute medical images standard also provides services related imaging managing imaging procedure worklists printing images film digital media like dvds reporting procedure status like completion imaging acquisition confirming successful archiving images encrypting datasets removing patient identifying information datasets organizing layouts images review saving image manipulations annotations calibrating image displays encoding ecgs encoding cad results encoding structured measurement data storing acquisition protocols dicom information object definitions encode data produced wide variety imaging device types including ct computed tomography mri magnetic resonance imaging ultrasound x-ray fluoroscopy angiography mammography breast tomosynthesis pet positron emission tomography spect single photon emission computed tomography endoscopy microscopy whole slide imaging oct optical coherence tomography dicom also implemented devices associated images imaging workflow including pacs picture archiving communication systems image viewers display stations cad computer-aided detection/diagnosis systems 3d visualization systems clinical analysis applications image printers film scanners media burners export dicom files onto cds dvds etc media importers import dicom files cds dvds usbs etc ris radiology information systems vna vendor-neutral archives emr electronic medical record systems radiology reporting systems many fields medicine dedicated working group within dicom dicom applicable field medicine imaging prevalent including radiology cardiology oncology nuclear medicine radiotherapy neurology orthopedics obstetrics gynecology ophthalmology dentistry maxillofacial surgery dermatology pathology clinical trials veterinary medicine medical/clinical photography dicom reserved following tcp udp port numbers internet assigned numbers authority iana 104 well-known port dicom transmission control protocol tcp user datagram protocol udp since 104 reserved subset many operating systems require special privileges use 2761 registered port dicom using integrated secure communication layer iscl tcp udp 2762 registered port dicom using transport layer security tls tcp udp 11112 registered port dicom using standard open communication tcp udp standard recommends require use port numbers according paper presented international symposium 2008 dicom standard problems related data entry major disadvantage dicom standard possibility entering probably many optional fields disadvantage mostly showing inconsistency filling fields data image objects often incomplete fields left blank filled incorrect data hand file format admits executable code maybe exists possibility contains malware dvtk open source project testing validating diagnosing communication protocols scenarios medical environments supports dicom hl7 ihe integration profiles health level 7 non-profit organization involved development international healthcare informatics interoperability standards hl7 dicom manage joint working group harmonize areas two standards overlap address imaging integration electronic medical record integrating healthcare enterprise ihe industry sponsored non-profit organization profiles use standards address specific healthcare use cases dicom incorporated variety imaging related ihe profiles systematized nomenclature medicine snomed systematic computer-processable collection medical terms human veterinary medicine provide codes terms synonyms definitions cover anatomy diseases findings procedures microorganisms substances etc dicom data makes use snomed encode relevant concepts xnview supports codice_1 codice_2 mime type codice_3 | [
5676,
6988,
207,
7637,
4759,
1554,
2115,
7951,
4650,
3383,
5191
] | Validation |
7,779 | 6 | Macfusion:macfusion macfusion open-source network file-system client based fuse curlftpfs sshfs 64-bit macintosh computers using 64-bit os macfusion needs instead old unmaintained macfuse one newer implementations fuse like osxfuse fuse4x | [
5571,
4855
] | Test |
7,780 | 6 | Xiafs:xiafs xiafs file system linux kernel conceived developed frank xia based minix file system today obsolete use except possibly historic installations linux originally used minix file system number limitations example length filenames limited 14 characters partition size limited 64 mb replace minix file system extended file system ext developed however ext retained problems poor performance lack date stamps two contenders replacing ext quickly developed ext2 xiafs two file systems included standard kernel december 1993 linux 0.99.15 ext2 xiafs goal offer good performance reasonable limitations fixing flaws ext initially xiafs stable ext2 fairly minimalistic modification minix file system well suited future extension end result xiafs changed little ext2 evolved considerably rapidly improving stability performance adding extensions ext2 shakedown time quickly became standard file system linux since ext2 developed mature robust file system xiafs original ext removed linux version 2.1.21 longer use maintained ext2 ext3 successor ext4 linux kernel exercise computer history file system tutorial xiafs ported modern linux 2013 xiafs less powerful offered less functionality ext2 maximum size file 64 mib maximum size partition 2 gib improvement ext measure ext2 xiafs used less disk space control structures greater stability time | [
3599,
2547,
7161,
4672,
6431,
3626,
5049,
6117,
759,
6854,
5437,
4375,
6500,
6505,
5457,
460,
1534,
7976,
4406,
821,
7258,
5130,
1561,
836,
5843,
2313,
6558,
2683,
5859,
5865,
4444,
5518,
6231,
869,
2704,
1605,
174,
2710,
1624,
5900,
44... | Validation |
7,781 | 3 | SPARCstation_20:sparcstation 20 sparcstation 20 a.k.a ss20 codename kodiak discontinued sun microsystems workstation based supersparc hypersparc cpu last model sparcstation family sun pizza box computers superseded ultrasparc design 1995 sparcstation 20 dual 50 mhz mbus ports allow use faster cpus sparcstation 10 two dual-cpu modules updated firmware sparcstation 20 supports maximum 4 cpus fastest cpu produced sparcstation 20 200 mhz ross hypersparc prom sparcstation 20 determines cpu compatibility version 2.25r last prom release sparcstation 20 sparcstation 20 8 200-pin dsimm slots supports maximum 512 mb memory 64 mb modules memory modules sparcstation 20 compatible sparcstation 10 sun ultra 1 computers sun4m sun4u families physically incompatible simm slots found pc computers 2 8 simm slots wider others used non-memory peripherals like caching nvsimm video vsimm cards sparcstation 20 two internal sca bays external scsi connector two bays cd-rom floppy drives earlier revisions sparcstation20 case contain cd-rom floppy bays slightly shorter standard 3.5 bay regular devices intended pc compatible computers usually fit later revisions sparcstation20 sparcstation5 narrower slot floppy drive more-standard cd-rom fit scsi host controller integrated motherboard sparcstation 20 support ide devices limitation releases openboot prom sparcstation 20 prevents booting point disk past 2 gigabyte mark sparcstation 20 one integrated amd lance 10baset ethernet interface additional ethernet interfaces added sbus card sparcstation 20 built 13w3 video socket driven optional sx cg14 framebuffer built onto vsimm vsimm available 4mb 8mb capacity capable 1280x1024 8mb 1152x900 4mb 24-bit color two vsimms installed auxiliary video board must also installed provide second 13w3 video socket alternatively sbus cards used including zx leo turbo gx cg6 others sparcstation 20 integrated sound 4 standard 3.5 mm audio jacks headphones microphone line line sparcstation 20 uses battery-backed nvram module hold data system host id serial number mac address battery chip dies nvram module must replaced modified use external battery nvram must reprogrammed mac address host id optionally m48t08-100pc1 used sunos 4.1.3_u1b onwards solaris 2.3 9 linux debian gentoo suse 7.0 7.3 probably others miros bsd netbsd openbsd run sparcstation 20 certain cpu modules sun supersparc nextstep 3.3 openstep 4.x also run | [
1254,
1258,
1923,
1263,
7982,
908,
7535,
5301,
1185,
2299,
4418,
4967,
5587,
1023,
2950,
418,
7114,
8138,
4999,
3673,
4277,
5181,
5705,
971,
6505
] | Validation |
7,782 | 3 | Graphics_Core_Next:graphics core next graphics core next gcn codename series microarchitectures well instruction set gcn developed amd gpus successor terascale microarchitecture/instruction set first product featuring gcn launched january 9 2012 gcn risc simd rather simt microarchitecture contrasting vliw simd architecture terascale gcn requires considerably transistors terascale offers advantages gpgpu computation makes compiler simpler also lead better utilization gcn graphics chips fabricated cmos 28 nm finfet 14 nm samsung electronics globalfoundries 7 nm tsmc available selected models radeon hd 7000 hd 8000 200 300 400 500 vega series amd radeon graphics cards including separately released radeon vii gcn also used graphics portion amd accelerated processing units apu playstation 4 xbox one apus gcn instruction set owned amd also owns x86-64 instruction set gcn instruction set developed specifically gpus gpgpu example micro-operation division documentation available llvm code generator compiler back-end available gcn instruction set used mesa 3d miaow open-source rtl implementation amd southern islands gpgpu instruction set aka graphics core next november 2015 amd announced boltzmann initiative amd boltzmann initiative shall enable porting cuda-based applications common c++ programming model super computing 15 amd showed heterogeneous compute compiler hcc headless linux driver hsa runtime infrastructure cluster-class high performance computing hpc heterogeneous-compute interface portability hip tool porting cuda-based applications common c++ programming model july 2017 family microarchitectures implementing identically called instruction set graphics core next seen five iterations differences instruction set rather minimal differentiate much one another exception fifth generation gcn architecture heavily modified stream processors improve performance support simultaneous processing two lower precision numbers place single higher precision number graphics command processor gcp functional unit gcn microarchitecture among tasks responsible asynchronous shaders short video amd asynchronous shaders visualizes differences multi thread preemption asynchronous shaders asynchronous compute engine ace distinct functional block serving computing purposes purpose similar graphics command processor since third iteration gcn hardware contains two schedulers one schedule wavefronts shader execution cu scheduler see new one schedule execution draw compute queues latter helps performance executing compute operations cus underutilized graphics commands limited fixed function pipeline speed bandwidth limited functionality known async compute given shader gpu drivers also need select good instruction order order minimize latency done cpu sometimes referred scheduling geometry processor contains geometry assembler tesselator vertex assembler gcn tesselator geometry processor capable tessellation hardware defined direct3d 11 opengl 4.5 see amd january 21 2017 gcn tesselator amd current sip block earlier units ati truform hardware tessellation terascale one compute unit combines 64 shader processors 4 tmus compute unit separate feed render output units rops compute unit consists cu scheduler branch message unit 4 simd vector units 16-lane wide 4 64kib vgpr files 1 scalar unit 4 kib gpr file local data share 64 kib 4 texture filter units 16 texture fetch load/store units 16 kib l1 cache four compute units wired share instruction cache 16 kib size scalar data cache 32kib size backed l2 cache simd-vu operates 16 elements time per cycle su operate one time one/cycle addition su handles operations like branching every simd-vu private memory stores registers two types registers scalar registers s0 s1 etc hold 4 bytes number vector registers v0 v1 etc represent set 64 4 bytes numbers operate vector registers every operation done parallel 64 numbers every time work actually work 64 inputs example work 64 different pixels time inputs slightly different thus get slightly different color end every simd-vu room 512 scalar registers 256 vector registers cu scheduler hardware functional block choosing simd-vu wavefronts execute picks one simd-vu per cycle scheduling confused schedulers hardware software gcn-gpus “ wavefront ” consists 64 threads nvidia gpus “ warp ” consists 32 threads amd solution attribute multiple wavefronts simd-vu hardware distributes registers different wavefronts one wavefront waiting result lies memory cu scheduler decides make simd-vu work another wavefront wavefronts attributed per simd-vu simd-vus exchange wavefronts max 10 wavefronts attributed per simd-vu thus 40 per cu amd codexl shows tables relationship number sgprs vgprs number wavefronts basically sgprs min 104 512/numwavefronts vgprs 256/numwavefronts note conjunction sse instructions concept basic level parallelism often called vector width vector width characterized total number bits simd vector unit simd-vu 10 wavefront instruction buffer takes 4 cycles execute one wavefront many implementations gcn typically accompanied several amd asic blocks including limited unified video decoder video coding engine amd trueaudio preview 2011 anandtech wrote unified virtual memory supported graphics core next specific hsa features implemented hardware need support operating system kernel subsystems and/or specific device drivers example july 2014 amd published set 83 patches merged linux kernel mainline 3.17 supporting graphics core next-based radeon graphics cards special driver titled hsa kernel driver resides directory /drivers/gpu/hsa drm-graphics device drivers reside /drivers/gpu/drm augments already existent drm driver radeon cards first implementation focuses single works alongside existing radeon kernel graphics driver kgd used perform scheduling offload assignment compute queues aces driver hardware buffering queues least one empty queue least one ace causing hws immediately assign buffered queues aces queues full queues safely assign part scheduling work performed includes prioritized queues allow critical tasks run higher priority tasks without requiring lower priority tasks preempted run high priority task therefore allowing tasks run concurrently high priority tasks scheduled hog gpu much possible letting tasks use resources high priority tasks using essentially asynchronous compute engines lack dispatch controllers first introduced fourth generation gcn microarchitecture present third generation gcn microarchitecture internal testing purposes driver update enabled hardware schedulers third generation gcn parts production use unit discards degenerate triangles enter vertex shader triangles cover fragments enter fragment shader unit introduced fourth generation gcn microarchitecture asynchronous compute engines controlling computation dispatching zerocore power long idle power saving technology shutting functional units gpu use amd zerocore power technology supplements amd powertune discrete gpus southern islands family gcn 2nd generation introduced radeon hd 7790 also found radeon hd 8770 r7 260/260x r9 290/290x r9 295x2 r7 360 r9 390/390x well steamroller-based desktop kaveri apus mobile kaveri apus puma-based beema mullins apus multiple advantages original gcn including freesync support amd trueaudio revised version amd powertune technology gcn 2nd generation introduced entity called shader engine se shader engine comprises one geometry processor 44 cus hawaii chip rasterizers rops l1 cache part shader engine graphics command processor 8 aces l2 cache memory controllers well audio video accelerators display controllers 2 dma controllers pcie interface a10-7850k kaveri contains 8 cus compute units 8 asynchronous compute engines independent scheduling work item dispatching amd developer summit apu november 2013 michael mantor presented radeon r9 290x discrete gpus sea islands family integrated apus gcn 3rd generation introduced 2014 radeon r9 285 r9 m295x tonga gpu features improved tessellation performance lossless delta color compression order reduce memory bandwidth usage updated efficient instruction set new high quality scaler video new multimedia engine video encoder/decoder delta color compression supported mesa however double precision performance worse compared previous generation discrete gpus integrated apus gpus arctic islands-family introduced q2 2016 amd radeon 400 series 3d-engine i.e gca graphics compute array gfx identical found tonga-chips polaris feature newer display controller engine uvd version 6.3 etc polaris-based chips polaris 30 produced 14 nm finfet process developed samsung electronics licensed globalfoundries slightly newer refreshed polaris 30 built 12 nm lp finfet process node developed samsung globalfoundries fourth generation gcn instruction set architecture compatible third generation optimization 14 nm finfet process enabling higher gpu clock speeds 3rd gcn generation architectural improvements include new hardware schedulers new primitive discard accelerator new display controller updated uvd decode hevc 4k resolutions 60 frames per second 10 bits per color channel discrete gpus fp64 performance gcn 4th generation gpus fp32 performance amd began releasing details next generation gcn architecture termed 'next-generation compute unit january 2017 new design expected increase instructions per clock higher clock speeds support hbm2 larger memory address space discrete graphics chipsets also include hbcc high bandwidth cache controller integrated apus additionally new chips expected include improvements rasterisation render output units stream processors heavily modified previous generations support packed math rapid pack math technology 8-bit 16-bit 32-bit numbers significant performance advantage lower precision acceptable example processing two half-precision numbers rate single single precision number nvidia introduced tile-based rasterization binning maxwell big reason maxwell efficiency increase january anandtech assumed vega would finally catch nvidia regarding energy efficiency optimizations due new dsbr draw stream binning rasterizer introduced vega also added support new shader stage – primitive shaders primitive shaders provide flexible geometry processing replace vertex geometry shaders rendering pipeline december 2018 primitive shaders ca n't used required api changes yet done vega 10 vega 12 use 14 nm finfet process developed samsung electronics licensed globalfoundries vega 20 uses 7 nm finfet process developed tsmc discrete gpus integrated apus double-precision floating-point fp64 performance gcn 5th generation gpus except vega 20 fp32 performance vega 20 fp32 performance gcn 5th generation gpus support half-precision floating-point fp16 calculations double fp32 performance | [
2539,
6599,
7335,
6610,
5371,
2016,
6351,
7442,
7826,
4694,
6545,
5670,
5939,
1023,
1961,
6655,
6562,
7666,
240,
7669,
8022,
3905,
4090,
1595,
1048,
6772,
3061,
3751,
1427,
2078,
2266,
2085
] | Test |
7,783 | 2 | Start_Input/Output:start input/output mvs/370 successor versions ibm mainframe operating systems start input/output startio macro instruction branch entry low-level device access programmer responsible providing list device-specific ccws channel program executed i/o channels control units devices number exits several may immediate returns input/output supervisor ios invokers startio must supervisor mode key 0 startio interfaces directly ios component mvs start input/output differs excp including xdap simply dasd-only subset excp excpvr following fundamental way start input/output low level facility supports e.g. selection channel paths selection exposures execute channel program high level facility supports e.g. ccw translation page fixing serialization related requests vio callers execute channel program must tcb mode ibm documents excpvr privileged unprivileged access method code uses sam-e processing dasd data sets except special cases application may use execute channel program data control block dcb opened made accessible application system open/close/end-of-volume supervisor services svcs 19 20 55 respectively callers startio must privileged must page fix storage areas related request must use global storage srb/iosb may refer device real ucb even device allocated address space device need opened startio initiation sequence usually referred front end may tcb mode srb mode startio termination sequence usually referred back end always srb mode startio always utilizes srb/iosb pair srb service request block utilized schedule processor activity required available processor connection related i/o request i/o request necessarily run processor caller running indeed cases iosb input/output supervisor block describes related i/o request passes parameters receives responses ios ios generally calls appendages enabled srb mode special cases calls appendage disabled interrupt exit die unit control block ucb device points device descriptor table ddt identified routines needed device dependent processing e.g. handling attention interrupts appending reserve ccws appending set file mask seek although use startio customers supported ibm nevertheless macro instruction associated branch entry remained remarkably stable throughout forty-year-long 2014 transition mvs/370 z/os startio sole method performing lowest-level physical i/o operations channel-attached devices mvs/370 subsequent instances os particular vsam vtam use startio course excp xdap excpvr certain instances ims/vs jes particularly channel-to-channel operations involved additional branch entry added es/390 performs essentially function original retained compatibility existing programs additional branch entry implicitly obtains address related tcb psatold rather explicitly obtaining tcb= keyword parameter original branch entry catastrophic error occur ios processing related i/o request tcb usually caller job step tcb abnormally terminated whichever tcb happened active error detected basic design ios run asynchronously tasks address spaces could tcb address space indeed tcb e.g. srb perhaps likely system wait task runs os master scheduler address space perhaps best description startio application white paper entitled start input/output interface mvs written peter haas amdahl corp subsequently liquidated haas white paper contained application program example illustrated required optional parameters exits employed startio interface detailed description excp vr startio available logic manual | [
8159,
5105,
467,
5027,
3278,
5571,
7264,
3201,
1851,
5852,
7661,
6213,
2596,
7024,
607,
5081,
3233,
7040,
7948,
4647
] | Test |
7,784 | 9 | Turing_(programming_language):turing programming language turing pascal-like programming language developed 1982 ric holt james cordy university toronto toronto ontario canada turing descendant euclid pascal sp/k features clean syntax precise machine-independent semantics turing 4.1.0 latest stable version turing turing 4.1.1 turing 4.1.2 allow stand alone .exe files created versions turing 4.1.0 outdated syntax outdated functions named british computer scientist alan turing turing used primarily teaching language high school university level two versions exist object-oriented turing turing plus systems programming variant september 2001 object oriented turing renamed turing original turing renamed classic turing turing longer supported holt software associates toronto ontario currently microsoft windows supported platform turing widely used high schools ontario introduction programming november 28 2007 turing previously commercial programming language became freeware available download developer website free charge personal commercial educational use. ref name= holtsoft/old_index /ref makers turing holt software associates since ceased operations turing seen development since november 25 2007 turing designed lightweight readable intuitive syntax entire hello world program turing syntax highlighting turing avoids semicolons braces using explicit end markers language constructs instead allows declarations anywhere complete program defining using traditional recursive function calculate factorial currently two open source alternative implementations turing open turing open source version original interpreter tplus native compiler concurrent systems programming language variant turing plus opent project develop compiler turing longer development open turing open-source implementation original turing interpreter windows written tristan hume includes speed improvements new features opengl 3d new code editor fully backwards compatible closed-source implementation tplus open-source implementation original non-object-oriented turing systems programming extensions developed university toronto ported linux solaris mac os x queen university late 1990s tplus implements turing+ turing plus concurrent systems programming language based original turing programming language features turing plus eventually subsumed present object-oriented turing language turing plus extends original turing processes monitors specified c.a.r hoare well language constructs needed systems programming binary input-output separate compilation variables absolute addresses type converters features opent abandoned open-source language compiler ide developed members dteam computer science canada shares many similarities turing fully backwards compatible addition usual graphics drawing functions turing features special functions drawing maple leaves allow easier drawing canadian flag turing+ turing plus concurrent systems programming language based turing programming language designed james cordy ric holt university toronto canada 1987 features turing+ eventually subsumed object-oriented turing turing+ extended original turing processes monitors specified c.a.r hoare well language constructs needed systems programming binary input-output separate compilation variables absolute addresses type converters features turing+ explicitly designed replace concurrent euclid systems-programming applications tunis operating system originally written concurrent euclid recoded turing+ minitunis implementation turing+ used implement several production software systems including txl programming language object-oriented turing extension turing programming language replacement turing plus created ric holt university toronto canada 1991 imperative object-oriented concurrent modules classes single inheritance processes exception handling optional machine-dependent programming integrated development environment x window system demo version versions exist sun-4 mips rs-6000 nextstep windows 95 others | [
6507,
5055,
1999,
8137,
4344,
3915,
4759,
2005,
5571,
5948,
2871,
1803
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.