node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4 values |
|---|---|---|---|---|
7,885 | 4 | Secure_state:secure state secure state information systems security term describe entities computer system divided subjects objects formally proven state transition preserves security moving one secure state another secure state thereby inductively proven system secure defined bell–lapadula model secure state built concept state machine set allowable states system transition one state another state defined transition functions system state defined secure permitted access modes subjects objects accordance security policy | [
2879,
1805
] | Train |
7,886 | 8 | PHP-Crawler:php-crawler php-crawler open-source crawling script based php mysql created implement simple possible local website search became popular small websites shared hosting script set distributed terms bsd license | [
6114,
2739,
6029,
7214,
2451,
3161,
503,
654,
80,
855,
1333,
1732
] | Test |
7,887 | 7 | Artist_Growth:artist growth artist growth cloud-based touring music business management application numerous artist managers tour managers musicians use artist growth boost team collaboration simplify event logistics track finances automate ticket requests quickly find files consolidate data customers artist growth include artists jason aldean tiësto luke combs artist management companies red light vector major record labels artist growth founded matt urmy jonathan sexton 2011 prototype platform launched 2012 desktop version arriving 2013 may 2018 pinnacle financial partners announced taking stake artist growth effort expand music entertainment sports business artist growth software platform tour management live event support application software connects artist artist tour production team artist manager talent agent business manager record label third party tour service providers key product feature sets include artist growth platform includes electronic integrations related software applications artist growth api brings interoperability entertainment industry allowing artists management teams receive data directly partners talent agencies promoters songkick bandsintown users also submit set lists bmi via artist growth app order collect compensation performance royalties 2018 artist growth integrated music tour booking agency rising star travel streamline tour scheduling software today available ios android web 2018 artist growth introduced service labelled ag finance whereby artists apply receive capital fund touring business ag finance delivered partnership music sports entertainment division pinnacle financial partners first ag finance offering announced august 2018 artists may apply receive tour advance loans underwritten booked tour guarantees offering primarily aimed artist management companies emerging artists need growth funding artist growth title best music app mtv music awards named gizmodo app day 2012 | [
6096,
1475
] | Test |
7,888 | 5 | DMS-100:dms-100 dms-100 switch digital multiplex system dms line telephone exchange switches manufactured northern telecom designed 1970s released 1979 control 100,000 telephone lines purpose dms-100 switch provide local service connections pstn public telephone network designed deliver services subscribers telephone lines trunks provides plain old telephone service pots mobility management cellular phone systems sophisticated business services automatic call distribution acd integrated services digital network isdn meridian digital centrex mdc formerly called integrated business network ibn also provides intelligent network functions cs1-r etsi inap used countries throughout world also dms-200 dms-250 variants tandem switches much hardware used dms-100 possible exception line cards used members dms family including dms-200 toll switch power distribution -48 vdc nominal dc dc converters every shelf provide necessary voltages central control complex comprises central processing unit cpu program store ps data store ds central message controller cmc cpu contains two identical 16-bit processors running hot standby mode original cpu core referred nt40 cpu implemented approximately 250 discrete logic devices across several circuit boards running 36 mhz nt40 core consisted mainly nt1x44 stack card provides register stack functions processor nt1x45 contained arithmetic logic functions nt1x46 provides registers load-route read-only memory rom nt1x47 timing control card provides micro-cycle source microstore decoding functions processor nt1x47 card also contained 2-digit hexadecimal display indicate test result codes condition core nt1x48 processor maintenance card contained thumbwheel faceplate enable various diagnostic tests cpu later modification five circuit boards faster pin-compatible discrete logic devices enabled cpu operate 40 mhz allowing central offices improve call throughput capacity 10 percent cpu configured dual hot standby mode mate exchange bus meb two cpus enables state one cpu continuously compared cpu cycle cycle basis discrepancy two cpus results maintenance circuitry determining cpu fault activity change cpu program store dedicated cpu memory program instructions required cpu processing calls maintenance administrative tasks ps associated cpu contains identical program instructions data store dedicated cpu contains dynamic information per-call basis well customer data office-specific settings cpu also associated ds containing duplicate data central message controller controls flow messages units ccc prioritizes network message controller nmc various network modules nm input/output controller ioc cpus access either cmc share message load line modules peripherals original nt40 based ccc replaced compatible dms supernode 1987 dms supernode computing module first based motorola 68020 central processing unit cpu upgraded motorola 68030 early 1990s upgraded use motorola 88100 88110 reduced instruction set computing risc cpus risc version supernode computing module known brisc bnr reduced instruction set computing cpu brisc cpu dms supernode processing capacity 1,500,000 call attempts per hour dms supernode featured increased processing capacity across distributed architecture allowing development new features services elements dms supernode uses common supernode cpu hardware design differing software used control supernode consists two main elements dms core dms bus dms core provides main computing facility made compute module system load module message controller compute module contains redundant supernode cpus handle call processing maintenance functions like nt40 core operate synchronized mode mate system load module contains necessary software every element dms switch also provides file system data storage functions magnetic tape hard disk message controller provides communications links dms core dms bus dms bus used interconnect dms core switching network input/output controller ioc manage message flows units consists redundant message switches message switches dms bus operate load-sharing mode one provides main clock source dms-100 system others synchronized messages supernode units carried optical ds512 links operating system used generations dms-100 switch called support operating system sos written high level language called protel stood procedure oriented type enforcing language developed bell northern research bnr hardware maintenance administered locally cathode-ray terminals multilevel menu system called mapci various methods used access dms remotely well including modem telnet backups hard drive work administered diskut command line program analog lines terminated individual line cards codec pull-out line drawers frames original design frames called line module lm 32 lines per drawer lms able send caller-id information class services became rare late century supplemented replaced newer line concentrating module lcm duplicated ringing generators serve lm pair lcm dc testing line card relay connect test bus lcm smaller line cards serving 64 lines per physical drawer 2 logical drawers size lm lcm require half space lm number lines majority line cards nt6x17 three relays loop start lines others include nt6x18 four relays slide switch ground start lines newer version nt6x18 eliminated ground switch nt6x18 also ability provide current reversal required coin phones business systems nt6x17ba nt6x18ba known world line card software configurable 15 million functional settings meet almost signalling transmission requirement market nt6x19 line card allows use older style neon message-waiting lamps feature also requires addition card per drawer supplies voltage type nt6x21 cards serve p-sets meridian business sets special analogue telephone proprietary nortel data link operating 8 khz provide advanced call handling services example telephone number may appear multiple p-sets even though telephone one pair wires thus providing simpler replacement key telephone systems lcme isdn service uses ntbx27 cards serve basic rate isdn lines provided ring generators lcme also support linecard types lcms served line group controller lgc communicate ds-30 connections nt6x48aa interface cards lgc number lcms per lgc depends traffic 3-4 lcm per lgc two traffic heavy remote offices anywhere kilometre 100 km host served remote line control module rlcm remote switching center rsc later vintage known rcc2 use t1 links host lgc rccs/rcc2s work like lgcs controlling lcms large remotes may 2+ rcc/rccs equipped links rccs interlinks calls within remote tie host links rccs/rcc2s usually equipped provide calling within remote office host links fail feature called esa emergency stand alone another type remote office known remote carrier urban rcu units typically reside side road large box approx 3 meters across almost 2 meters high almost meter 1980s many telcos installed early version instead pulling cable remote area much cheaper could provide approx 500 lines back needed two 'boxes work- host box called central terminal ct dial tone lines wired remote box called remote terminal rt dial tone 'came used 2-6 t1 links copper i.e ld-1 fiber telcos modernized remote boxes re-configured work directly smu peripheral host dms typically smu handle 3-6 rcus transmitters receivers service circuits trunk module tm miscellaneous trunk module mtm shelves trunks dtc digital trunk controller dtci digital trunk controller isdn pdtc pcm30 digital trunk controller shelves usually two t-1 lines per card ten cards per dtc total 480 ds0 voice channels turn century many original nt6x50aa cards still service perform t-carrier extended superframe signaling performed plug-in replacement nt6x50ab card used services pbx isdn t1s trunks also provisioned spm synchronus peripheral module capable handling 2016 ds0s nearly 4.2x dtc internal connections time switch network 2.56 mbit/s ds-30 speech links carrying thirty channels plus synchronization data channels four wires plus ground wire connections network handled nt6x40aa ds-30 interface card lgc ltc link may also ds-512 optical interfaces using nt6x44aa time switch card lgcs ltcs internally map channels nt6x48aa ds-30 nt6x50aa/ab ds1 interface links available channels nt6x40aa ds-30 nt6x40fa ds-512 interfaces network european pdtcs complemented dtcoi2 dtco2 dtcoi2 designed run pri dpnss services per existing pdtcoi msb7 peripherals dtco2 designed carry cas ss7 per existing pdtco peripheral time division switching performed e-net similar communication module 5ess switch switching network ewsd group switch axe telephone exchange also dms-200 dms-250 variants tandem switches 2006 nortel introduced communication server 1500 cs 1500 softswitch based voip modernize dms based telephone switches cs 1500 softswitch system replace dms component modules except lcms reducing footprint dms-100 one 19 rack allowing operators reduce cooling power requirements significantly successor dms-100 communication server 2000 cs2k shares many components software dms significant difference addition voip technology cs2k 2010 genband purchased nortel networks carrier voip application solutions cvas business 182.5 million nortel defunct | [
5714,
6552,
5097,
883,
2230,
2050,
5614,
6927,
899,
2534
] | Test |
7,889 | 9 | Yabasic:yabasic yabasic yet another basic free open-source basic interpreter windows unix platforms yabasic originally developed marc-oliver ihm released last stable version 2.77.3 2016 version 2.77.1 project adopted mit licence well source code moved github encourage others participate development port yabasic fltk toolkit called flyab development would source-compatible programs written yab variant yabasic enables graphical programs written using beos api ports windows mac os x linux planned flyab added ability yabasic create native graphical user interfaces supported platforms november 2008 project appears halted sony also packaged version yabasic playstation 2 demo disc shipped ps2 consoles pal territories could considered home computer games machine thus bypassing european import taxes continuation project prior new changes original author version 3 developed team centered pedro sá thomas larsen development halted project appears abandoned | [
4759,
5571,
6778,
1989,
7848,
578,
4794
] | Test |
7,890 | 3 | Apple_A10X:apple a10x apple a10x fusion 64-bit arm-based system chip soc designed apple inc. manufactured tsmc first appeared 10.5 ipad pro second-generation 12.9 ipad pro announced june 5 2017 a10x variant a10 apple claims 30 percent faster cpu performance 40 percent faster gpu performance predecessor a9x a10x features apple-designed 64-bit 2.38 ghz armv8-a six-core cpu three high-performance hurricane cores three energy-efficient zephyr cores a10x also integrates twelve-core graphics processing unit gpu appears apple customized imagination powervr cores used a10 embedded a10x m10 motion coprocessor built tsmc 10 nm finfet process die size 96.4mm a10x 34 smaller a9x smallest ipad soc a10x first tsmc 10nm chip used consumer device a10x paired 4 gb lpddr4 memory second-generation 12.9 ipad pro 10.5 ipad pro 3 gb 4k apple tv | [
6788,
3940,
6421,
5732,
722,
1799,
1094,
4320,
2926,
4690,
5037,
5740,
1473,
734,
5750,
5752,
405,
5405,
5406,
1864,
6125,
2954,
1123,
7572,
6482,
6847,
67,
6142,
2609,
1895,
4373,
7226,
4376,
2978,
5091,
446,
4749,
5450,
7601,
451,
334... | Test |
7,891 | 3 | Ken_Batcher:ken batcher ken batcher full name kenneth edward batcher emeritus professor computer science kent state university also worked computer architect goodyear aerospace akron ohio 28 years born december 1935 queens new york city father ralph r. batcher chief engineer a. h. grebe radio company bankruptcy 1932 batcher graduated iowa state university b.e degree 1957 1964 batcher received ph.d. electrical engineering university illinois graduated brooklyn technical high school among designs worked goodyear published several technical papers owns 14 patents discovered two parallel sorting algorithms odd-even mergesort bitonic mergesort also discoverer scrambling data method random access memory allows accesses along multiple dimensions memories used staran mpp parallel processors 1980 received arnstein award presented goodyear aerospace corporation technical achievement 1990 batcher awarded acm/ieee eckert-mauchly award pioneering work parallel computers holds 14 patents 2007 batcher awarded ieee seymour cray computer engineering award fundamental theoretical practical contributions massively parallel computation including parallel sorting algorithms interconnection networks pioneering designs staran mpp computers credited discovering two important parallel sorting algorithms odd-even mergesort bitonic mergesort batcher known half-serious half-humorous definition supercomputer device turning compute-bound problems i/o-bound problems author co-author journal articles br patent number followed title year issued | [
1023,
6922
] | Test |
7,892 | 7 | Adobe_Document_Cloud:adobe document cloud adobe document cloud free service adobe store share pdf files cloud access go services also allows integration adobe tools fill sign forms electronically service offers 2gb free storage seemless integration mobile desktop apps creates ecosystem users use phone apps adobe scan take pictures documents convert pdfs upload store cloud files accessed webportal adobe document cloud well adobe applications adobe acrobat dc adobe acrobat reader free service upgraded using paid subscriptions allow user create pdfs electronic documents microsoft office documents edit pdfs protect documents using passwords create fillable forms collect feedback signatures | [
6334,
2456,
6015,
6016,
3543
] | Test |
7,893 | 5 | Portmap:portmap port mapper rpc.portmap portmap rpcbind open network computing remote procedure call onc rpc service runs network nodes provide onc rpc services version 2 port mapper protocol maps onc rpc program number/version number pairs network port number version program onc rpc server started tell port mapper particular program number/version number pair implements particular transport protocol tcp udp port number using particular program number/version number pair transport protocol clients wishing make onc rpc call particular version particular onc rpc service must first contact port mapper server machine determine actual tcp udp port use versions 3 4 protocol called rpcbind protocol map program number/version number pair indicator specifies transport protocol transport-layer endpoint address program number/version number pair transport protocol port mapper service always uses tcp udp port 111 fixed port required client would able get port number port mapper service port mapper port mapper must started rpc servers started port mapper service first appeared sunos 2.0 shows different programs versions ports use example shows nfs running version 2 3 reached tcp port 2049 udp port 2049 depending transport protocol client wants use mount protocol version 1 2 running reached udp port 644 tcp port 645 depending transport protocol client wants use port mapper service discovered used distributed denial service ddos attacks distributed reflective denial service drdos attacks 2015 using spoofed port mapper request attacker amplify effects target portmap query return many times data original request | [
7796,
7637,
578,
3820
] | Test |
7,894 | 2 | Yggdrasil_Linux/GNU/X:yggdrasil linux/gnu/x yggdrasil linux/gnu/x lgx pronounced igg-drah-sill discontinued early linux distribution developed yggdrasil computing incorporated company founded adam j. richter berkeley california yggdrasil first company create live cd linux distribution yggdrasil linux described plug-and-play linux distribution automatically configuring hardware last release yggdrasil 1995 yggdrasil world tree norse mythology name chosen yggdrasil took disparate pieces software assembled complete product yggdrasil company motto free software rest us yggdrasil compliant unix filesystem hierarchy standard yggdrasil announced ‘ bootable linux/gnu/x-based unix r clone pc compatibles ’ 24 november 1992 made first release 8 december 1992 alpha release contained 0.98.1 version linux kernel v11r5 version x window system supporting 1024x768 256 colours various gnu utilities c/c++ compiler gnu debugger bison flex make tex groff ghostscript elvis emacs editors various software yggdrasil alpha release required 386 computer 8 mb ram 100 mb hard disk alpha release missing source code packages elvis beta release made 18 february 1993 beta cost us 60 lgx beta release 1993 contained 0.99.5 version linux kernel along software gnu x 22 august 1993 yggdrasil company sold 3100 copies lgx beta distribution production release version carried pricetag us 99 however yggdrasil offered free developer whose software included cd distribution according email company founder marginal cost subscription 35.70 early yggdrasil releases also available stores selling cd-rom software adam j. richter started yggdrasil company together bill selmeier richter spoke michael tiemann setting business interested joining forces cygnus richter member league programming freedom richter using 200 mb hard disk building alpha release lgx prevented practically able include source code packages contained cdrom yggdrasil incorporated published early linux compilation books linux bible gnu testament contributed significantly file system x window system functionality linux early days operation company moved san jose california 1996 1996 yggdrasil incorporated released winter 1996 edition linux internet archives six cds linux software tsx-11 sunsite gnu archive prep.ai.mit.edu x11r6 archives including free contributed x11r6 software ftp.x.org internet rfc standards total nine non-yggdrasil linux distributions company remained active least year 2000 released linux open source dvd website taken offline afterwards company released anything since company last corporate filing january 2004 california secretary state lists suspended company made offer donate 60 yggdrasil cdrom sales revenues computer systems research group founder adam j. richter later indicated company would lose much money changed offer accordingly still maintaining donations csrg company also volume discount plans | [
5200,
1629,
1535,
4670,
3444,
7251,
474,
2559,
7075,
7894,
1279,
1941,
314,
3023,
5232,
2758,
1663,
2864,
6209,
6761,
2063,
343,
4824,
5523,
7587,
4551,
1893,
5259,
5530,
5704,
3751,
6317,
7223,
8149,
7954,
6244,
788
] | Test |
7,895 | 4 | Richard_Ledgett:richard ledgett richard h. ledgett jr. former deputy director national security agency ledgett undergraduate degree psychology graduate degree strategic intelligence 1988 began working national security agency served variety positions cybersecurity division previous positions nsa included deputy director analysis production 2009–2010 deputy director data acquisition 2006–2009 assistant deputy director data acquisition 2005–2006 chief nsa/css pacific 2002–2005 2012 2013 director nsa/css threat operations center responsible round-the-clock cryptologic activities discover counter adversary cyber efforts june 2013 appointment deputy director january 2014 ledgett headed investigation leaks regarding nsa surveillance programs made edward snowden february 3 2017 ledgett announced would retiring spring successor george c. barnes august 15 2017 ledgett elected bank corporation board directors ledgett pledged increased transparency regarding nsa operations however defended operations nsa argued rare interview reuters nsa operations completely legal ledgett also accused media sensationalizing reports various nsa mass surveillance programs march 2014 ledgett stated ted talk nsa operates legally argued president james madison would proud way constitutional checks balances governed nsa mass surveillance | [
4666,
202,
7191,
228,
7568,
4727,
4988,
258,
3335
] | Test |
7,896 | 5 | Etch_(protocol):etch protocol etch open-source cross-platform framework building network services first announced may 2008 cisco systems etch encompasses service description language compiler number language bindings intended supplement soap corba methods communicating networked pieces software especially emphasis portability transport independence small size high performance etch designed incorporated existing applications systems enabling transition service-oriented architecture derived work cisco unified application environment product acquired cisco part metreos acquisition mid-2008 release planned supported java c second wave support supposed include ruby python javascript c. july 2008 etch released apache 2.0 license part open source process etch submitted apache incubator accepted new podling august 25 2008 formal vote proposed eventually passed september 2008 etch entered start-up phase within apache incubator cisco announced unified application environment end life february 8 2012 january 2013 etch become apache top-level project etch marked retired project december 2016 replacement project announced specified | [
2451,
7238,
894,
4303,
5728,
7805,
6428,
2741,
7444,
7932,
917,
4783,
3463,
3542,
3204,
1286,
6821,
5054,
840,
1392,
3031,
5408,
3558,
5677,
3479,
5863,
6387,
5075,
6137,
7488,
7299,
7857,
5874,
5965,
3915,
1511,
4742,
5007,
7315,
1333,
... | Test |
7,897 | 2 | .asec:.asec .asec file extension android secure encrypted asec file file extension specifically associated google android operating system first introduced android 2.2 code name froyo may 2010 like file extensions group characters end period represents actual format organization file purpose asec format prevent existing applications modified corrupted programs applications moved sd card use asec extension files found .android_secure folder sd card application must moved memory back device ’ local storage file decrypted asec file format basic apk android package file format | [
3848
] | Train |
7,898 | 7 | Euphoria_(software):euphoria software euphoria game animation engine created naturalmotion based dynamic motion synthesis naturalmotion proprietary technology animating 3d characters on-the-fly based full simulation 3d character including body muscles motor nervous system instead using predefined animations characters actions reactions synthesized real-time different every time even replaying scene common current video games use limp ragdolls animations generated fly euphoria employs complex method animate entirety physically bound objects within game environment engine used indiana jones game since cancelled according web site euphoria runs microsoft windows os x linux playstation 3 playstation 4 xbox 360 xbox one ios android platforms compatible commercial physics engines press release enclosed second trailer eventually confirmed grand theft auto iv first rockstar games feature euphoria red dead redemption second game use engine star wars titles force unleashed ii use euphoria games based rockstar advanced game engine rage including grand theft auto v euphoria integrated source code rage | [
5897,
2002,
2275,
4759,
5571,
4833,
1606,
578,
6759,
5709,
4130,
3571,
8195
] | Test |
7,899 | 8 | Template_Attribute_Language:template attribute language template attribute language tal templating language used generate dynamic html xml pages main goal simplify collaboration programmers designers achieved embedding tal statements inside valid html xml tags worked using common design tools tal created zope used python-based projects well following attributes used normally prefixed codice_1 tag one tal attributes evaluated fairly logical order cases tag present lends take attributes special tal tags used making codice_1 prefix optional e.g would cause code inside codice_5 tags used whenever context whatever application server defines context e.g object contains variable codice_6 true value e.g list containing least one element identifier following colon arbitrary simply needs opening closing tag macro expansion template attribute language metal complements tal providing macros allow reuse code across template files created zope used python projects well metal complements tal ability reuse code allows developer define use macros turn may slots using macro variational content specified slot generating xml documents xml namespace must specified codice_7 following attributes recognised normally requiring „ codice_8 “ prefix normally one used time cases tag present lends take attributes special cases one metal attribute needed special metal tags used making „ metal “ prefix optional e. g. sketched roundup mind tal/tales/metal used following projects besides original zope implementation exhaustive | [
5983,
865,
5965,
1445,
417,
8122,
1803
] | Test |
7,900 | 0 | Walter_Daelemans:walter daelemans walter daelemans born june 3 1960 professor computational linguistics university antwerp also research director computational linguistics psycholinguistics research center clips daelemans pioneered use machine learning techniques especially memory-based learning natural language processing europe early 1990s together antal van den bosch wrote book memory-based language processing developed software package timbl time professor tilburg university founded research group induction linguistic knowledge ilk 2003 elected fellow eccai european coordinating committee artificial intelligence “ pioneering work field artificial intelligence outstanding service european artificial intelligence community ” 2014 named fellow association computational linguistics | [
5429,
1314,
5388
] | Validation |
7,901 | 4 | MyDLP:mydlp mydlp data loss prevention solution originally available released free open source software supported data inspection channels include web mail instant messaging file transfer removable storage devices printers mydlp development project originally made source code available terms gnu general public license mydlp one first free software projects data loss prevention acquired comodo group may 2014 comodo since begun marketing enterprise version comodo security solutions subsidiary free version removed website open source code updated since early 2014 october 2010 mydlp included following subprojects mydlp network mostly written erlang performance concurrent network operations python also used exceptional cases subsystem could run platform supported erlang python mydlp endpoint developed windows platforms written c++ c mydlp web ui written php adobe flex used mysql order store user configurations october 2010 mydlp included widespread data loss prevention features text extraction binary formats incident management queue source code detection data identification methods bank account credit card several national identification numbers besides features like data classification statistical analysis trained sentences native language processor integrated naive bayes classifier claimed included | [
6029,
6006,
5965
] | Test |
7,902 | 9 | Docstring:docstring programming docstring string literal specified source code used like comment document specific segment code unlike conventional source code comments even specifically formatted comments like javadoc documentation docstrings stripped source tree parsed retained throughout runtime program allows programmer inspect comments run time instance interactive help system metadata appears first introduced original teco implementation emacs languages support docstrings include python lisp elixir clojure gherkin julia documentation supported language level form docstrings markdown elixir de facto markup language choice use docstrings lisp docstrings known documentation strings common lisp standard states particular implementation may choose discard docstrings whenever want whatever reason kept docstrings may viewed changed using documentation function instance common practice documenting code object head definition captured addition docstring syntax python language docstring python code object module class function first statement code object immediately following definition 'def 'class statement statement must bare string literal kind expression docstring code object available code object codice_1 attribute codice_2 function following python file shows declaration docstrings within python source file assuming code saved mymodule.py following interactive session showing docstrings may accessed | [
666,
4543,
5965,
1445,
4705
] | Validation |
7,903 | 3 | Lazy_Jones:lazy jones lazy jones computer game commodore 64 zx spectrum msx tatung einstein written david whittaker released terminal software 1984 spectrum version ported simon cobb lazy jones essentially collection fifteen smaller sub-games game takes place inside hotel three floors connected elevator character lazy hotel employee much care work prefers sneak rooms play video games instead main screen lazy jones hotel interior character use elevator travel freely three floors must watch enemies current hotel manager top floor ghost previous manager bottom floor haunted cleaning cart middle floor enemies walk around pursue character contact fatal floor six rooms three side elevator room entered inside rooms video game character immediately begins playing well video games hotel bar bed cleaning closet toilet bar works like video game bed cleaning closet toilet useless decorations intentionally added whittaker run ideas new games rooms visited game starts increasingly faster time one tracks lazy jones soundtrack wall sampled german electro project zombie nation 1999 hit single kernkraft 400 plot game simple- hotel care taker named jones bored decides go rooms play games various sub-games generally simplified versions famous 1970s 1980s video games space invaders frogger snake h.e.r.o breakout chuckie egg plots gameplay simple player simply must avoid incoming enemies long enough score many points player must shoot enemies score points whittaker developed sub-game individually basic first make sure worked converted one almost line line assembly code sub-game time limit sub-games possible die thus ending sub-game prematurely others end time limit expires fourteen video games follows hotel bar character stands front rather wide bar barman patron hopelessly drunk moving back forth across bar different speeds pressing fire button standing front drink barman time earns points drunk patron bars movement jumped sub-games possible die prematurely eggie chuck jay walk res q wall sub-games end time limit runs 99 red balloons laser jones outland scoot star dust hills alive reflex turk wild wafers wipeout hotel bar game chiptune music characteristic sound distinct many c64 games 21 subtunes using two voices sid chip turn use sawtooth sound one voice plays simple octave bassline part one adding melody tunes share tempo well change seamlessly playing another sub game subtune 21 named star dust used german producer team zombie nation song kernkraft 400 without permission florian senfter splank later paid undisclosed sum david whittaker use melody tune title 99 red balloons comes english name song 99 luftballons german songstress nena version reached 1 uk singles chart visage fade grey also heard | [
2907,
7388,
6780
] | Test |
7,904 | 4 | CWShredder:cwshredder cwshredder program runs microsoft windows removing coolwebsearch family spyware originally created merijn bellekom bought intermute october 19 2004 june 2005 intermute acquired trend micro program distributed trend micro currently offered two forms program updated since ownership transferred trend micro currently available version v2.19 released november 2005 still functional unclear trend micro plans update program controversy quarters whether trend micro either declare cwshredder open source compelled give ownership another party program maintained updated | [
6688,
4759,
2642,
88
] | Validation |
7,905 | 3 | MPC5xx:mpc5xx mpc5xx family processors mpc555 mpc565 32-bit powerpc embedded microprocessors operate 40 66 mhz frequently used automotive applications including engine transmission controllers delphi corporation use either mpc561 mpc565 engine controllers supply general motors nearly 2009 model gm north america vehicles using mpc5xx engine controller bosch also used mpc5xx throughout edc-16 series diesel engine controllers cummins b series diesel engine ecu generally considered microcontrollers integrated peripheral set unusual architecture mmu large on-chip sram large much 1 mb low latency access on-chip flash memories means architecture tailored control applications instead block-address translation hardware-driven fixed-page address translation prescribed first powerpc specification 5xx cores provided software-driven translation mechanism supported variable page sizes model basis embedded mmu model current power isa specification mpc5xx – powerpc 5xx family processors share common naming scheme development powerpc 5xx family discontinued favour flexible powerful powerpc 55xx family peripherals model vary frequently include analog-to-digital converters adc time processor units tpu gpio uarts/serial qsmcm mpc5xx family descends mpc8xx powerquicc family core means uses harvard architecture single issue core unlike 8xx family 5xx variants floating point unit earlier chips like mpc509 instruction cache recent chips capability contain large amounts flash memory on-board capable bursting instructions processor low-cost chips omit flash memory adds lot die area driving price chip many controller applications run long control loops large dataset low latency deterministic access data instruction routines important data stored on-chip sram available datapath processor single cycle performance quite good data must accessed off-chip frequently performance reduced chip burst data accesses external ram slow bus access protocol simple memory interface programmed setting default memory location writing base registers chips quite popular hobbyists well automotive industrial developers | [
5097,
7327,
5100,
7960,
1075,
4846,
4479,
7519,
804,
5208,
1454,
3365,
5652,
6720,
7730,
1556,
3708,
7990,
6111,
4702,
1386,
7654,
5055,
6919,
2133,
6378,
234,
7569,
2501,
1772,
6299,
6753,
2781,
2785,
6226,
5079,
2155,
5614,
2257,
3674,
... | Test |
7,906 | 9 | BASIC_A+:basic a+ basic a+ developed optimized systems software cupertino california united states provide atari 8-bit family extended basic compatible faster simpler rom-based atari basic atari basic came 8 kb rom cartridge basic a+ delivered floppy disk took 15 kb computer ram leaving 23 kb available user programs 48 kb atari 800 basic a+ offered price us 80.00 1983 including products os/a+ easmd editor/assembler extension atari basic came supplement latter reference manual documentation addition faster rom-bound counterpart basic a+ provided number extra commands dos operations player/missile graphics debugging | [
5367,
1255,
12,
2463,
6891,
4139,
5651,
2925,
7448,
5926,
5129,
5571,
5137,
5234,
2941,
3303,
1304,
6394,
4003,
7864,
1789,
5877,
4012,
4745,
1064
] | Test |
7,907 | 2 | DirectX_plugin:directx plugin computer music professional audio creation directx plugin software processing component loaded plugin host applications allow real-time processing audio effects mixing audio act virtual synthesizers directx plugins allow replacement traditional recording studio hardware rack units used professional studios software-based counterparts connected together modular way allows host manufacturers focus conviviality efficiency products specialized manufacturers focus digital signal processing aspect example plugins effects boxes reverbs delays effects pedals like guitar distortion flange chorus mixing mastering processors compressors limiters exciters sub bass enhancers stereo imagers many similar virtual studio technology later audio units apple mac os x directx plugins open standard architecture connecting audio synthesizers effect plugins audio editors hard-disk recording systems directx plug-ins based microsoft component object model com allows plugins recognised used applications via common interfaces plugins connect applications plugins pins via pass processes buffered streams audio video data architecturally directx plugins directshow filters directx plugins also two types directx effect plugins dx directx instrument plugins dxi effect plugins used generate process receive otherwise manipulate streams audio instrument plugins midi controllable directx plugins generally used synthesize sound playback sampled audio using virtual synthesizers samplers drum machines directx effect plugins developed microsoft part directshow directx instruments developed cakewalk co-operation microsoft available windows several wrapper plugins available directx plugins used applications support vst vice versa others chainer plugins also available allow chaining multiple plugins together directx plugins developed c++ using microsoft directx sdk sony audio plug-in development kit cakewalk directx wizard also delphi sdk available directx plugins superseded dmo-based signal processing filters recently media foundation transforms | [
4022,
7149,
4026,
7607,
1526,
6696,
3687,
4848,
6420,
714,
2283,
4129,
3598,
8073,
7438,
720,
6000,
1460,
2018,
5479,
6989,
6991,
7176,
7263,
2928,
8094,
5747,
1755,
4156,
930,
590,
5321,
2953,
6840,
150,
422,
7029,
519,
3052,
4448,
340... | Test |
7,908 | 9 | David_F._Bacon:david f. bacon david bacon american computer programmer bacon began working programmer age 16 worked startup senior year high school columbia college columbia university worked first david e. shaw non-von supercomputer network algorithms simulation yechiam yemini creating nest network simulator served basis number network simulators including cornell real thence lbl ns simulator bacon spent career ibm thomas j. watson research center starting programmer 1985 working hermes distributed programming language eventually becoming principal research staff member took sabbatical 2009 visiting professor computer science harvard 2015 joined google working spanner distributed database system much work focused garbage collection 2009 inducted acm fellow contributions real-time systems object-oriented language design implementation work metronome hard real-time tracing garbage collector became basis ibm websphere real time java virtual machine used software navy ddg 1000 destroyer original research subsequently selected 2013 influential paper award symposium principles programming languages work garbage collecting cyclic structures reference counted systems used number scripting languages including php 2013 published first garbage collector implemented completely hardware selected acm research highlight addition garbage collection work focused implementation concurrent object-oriented languages thesis work rapid type analysis rta used many compilers analysis frameworks construct call graphs object-oriented languages including soot go 2004 work high-performance locking java appeared list 50 influential pldi papers time | [
1616,
5476,
6029,
1011,
993
] | Train |
7,909 | 0 | Michael_Collins_(computational_linguist):michael collins computational linguist michael j. collins born 4 march 1970 researcher field computational linguistics research interests natural language processing well machine learning made important contributions statistical parsing statistical machine learning studies collins covers wide range topics parse re-ranking tree kernels semi-supervised learning machine translation exponentiated gradient algorithms general focus discriminative models structured prediction one notable contribution state-of-the-art parser penn wall street journal corpus november 11 2015 works cited 16,020 times h-index 47 collins worked researcher labs january 1999 november 2002 later held positions assistant associate professor m.i.t since january 2011 professor columbia university 2011 named fellow association computational linguistics | [
1314,
5429,
5388,
5008
] | Test |
7,910 | 4 | Device_fingerprint:device fingerprint device fingerprint machine fingerprint browser fingerprint information collected remote computing device purpose identification fingerprints used fully partially identify individual users devices even persistent cookies also zombie cookies ca n't read stored browser client ip address hidden even one switches another browser device may allow remote application detect prevent online identity theft credit card fraud also compile long-term records individuals browsing histories even 're attempting avoid tracking raising major concern internet privacy advocates computer security experts consider ease bulk parameter extraction offered web browsers security hole basic web browser configuration information long collected web analytics services effort accurately measure real human web traffic discount various forms click fraud assistance client-side scripting languages collection much esoteric parameters possible assimilation information single string comprises device fingerprint 2010 electronic frontier foundation launched website visitors test browser fingerprint collecting sample 470161 fingerprints measured least 18.1 bits entropy possible browser fingerprinting advancements canvas fingerprinting claims add another 5.7 bits firefox provides feature protect browser fingerprinting since 2015 version 41 july 2018 still experimental disabled default wwdc 2018 apple announced safari macos mojave presents simplified system information users browse web preventing tracked based system configuration motivation device fingerprint concept stems forensic value human fingerprints ideal case web client machines would different fingerprint value diversity value would never change stability assumptions would possible uniquely distinguish machines network without explicit consent users practice neither diversity stability fully attainable improving one tendency adversely impact fingerprinting methods range passive active passive fingerprinting refers techniques involve obvious querying client machine methods rely upon precise classification factors client tcp/ip configuration os fingerprint ieee 802.11 wireless settings hardware clock skew active fingerprinting assumes client tolerate degree invasive querying active method installation executable code directly client machine code may access attributes typically available means mac address unique serial numbers assigned machine hardware data useful fingerprinting programs employ digital rights management passive collection device attributes web-browser layer may occur several osi model layers normal operation various network protocols transmit broadcast packets headers one may infer client configuration parameters sorted layer examples protocols collection device fingerprints web clients browser software relies availability javascript similar client-side scripting language harvesting suitably large number parameters two classes users limited clientside scripting mobile devices running privacy software browser extensions block ads trackers separate issue single device may multiple web clients installed even multiple virtual operating systems distinct client operating system distinct internal parameters one may change device fingerprint simply running different browser machine unless new crossbrowser fingerprinting technique used furthermore sandboxed devices like iphone exhibit little uniqueness fingerprinting techniques involving technical information device browser font list sufficient create unique fingerprint | [
6788,
2451,
5806,
3775,
3857,
7637,
5571,
4600,
6541,
6363,
2577,
2219,
3819,
7765,
2435,
5181,
1805
] | Test |
7,911 | 4 | BeyondTrust:beyondtrust beyondtrust formerly symark american company develops markets supports family privileged identity management pam privileged remote access vulnerability management products unix linux windows mac os operating systems beyondtrust founded 2006 provided least privilege management software microsoft windows os unix vendor symark acquired beyondtrust 2009 2018 company acquired bomgar developer remote support pam software cases beyondtrust adopted new company name symark founded 1985 vax/vms utility software company los angeles san fernando valley name derived initials founders bob sommers doug yarrow symark also client-server computing vendor later acquiring license unix security product upm owned quest software rebranding version powerbroker symark relocated westlake village california agoura hills company focused identity access password management privileged users unix systems 2003—2008 company expanded spain portugal japan latin america time period also grew almost 300 percent one fastest growing private companies l.a. area 2003 autoprof introduced autoprof policy maker first commercial product build upon microsoft built-in group policy objects make common tasks like mapping network drives sharing printer connections easier 2005 autoprof grew 90 revenue previous year changed company name desktopstandard four million desktops management desktopstandard software across 3,500 customers 2003—2005 desktopstandard added six products portfolio rbac password management identity access management windows 2006 microsoft acquired desktopstandard products desktopstandard ceo formed new company beyondtrust around remaining policy maker application security product 2009 symark acquired windows-based business beyondtrust 2009 approximately 20 million adopted beyondtrust new company name 2011 beyondtrust acquired software likewise software acquisition expanded portfolio inside perimeter security capabilities windows unix-based systems include authentication auditing management cross-platform cloud environments may 2012 beyondtrust acquired vulnerability management pioneer eeye digital security december 2012 beyondtrust acquired blackbird group september 2014 veritas capital acquires beyondtrust 310 million october 2018 bomgar acquires beyondtrust veritas | [
496,
644,
6873,
3433,
578
] | Validation |
7,912 | 2 | Nouveau_(software):nouveau software nouveau free open-source graphics device driver nvidia video cards tegra family socs written independent software engineers minor help nvidia employees project goal create open source driver reverse engineering nvidia proprietary linux drivers managed x.org foundation hosted freedesktop.org distributed part mesa 3d project initially based 2d-only free open-source nv driver red hat developer matthew garrett others claim obfuscated nouveau licensed mit license name project comes french word nouveau meaning new suggested original author irc client french autoreplace feature suggested word nouveau typed nv nouveau gallium3d-style device driver works top direct rendering infrastructure dri composed two kernel-components drm kms driver user-space components libdrm mesa 3d nouveau intends support nvidia microarchitectures tesla fermi kepler maxwell version 1.0.13 support pascal version 1.0.15 support volta latest version 1.0.16 supports new turing technical reasons nvidia gpus boot low frequency called clock device driver set higher frequency booting due lack documentation gpu nouveau lacked capability beginning result was/is major loss performance proven benchmarks compared performance nvidia proprietary device driver nouveau june 2014 breakthrough finally achieved initial re-clocking support added nouveau version 1.0.14 pascal support level maxwell 2 version 1.0.15 patch gtx 970 4gb accelerations pascal maxwell 2 level unlike amd nvidia provides documentation gpus developers nouveau forced use clean-room reverse engineering obtain necessary data enable write nouveau project uses several custom-made programs reverse engineering mmiotrace memory mapped i/o trace renouveau valgrind mmt renouveau reverse engineering nouveau program licensed gnu gpl using sdl collects data nouveau reverse engineering work users proprietary nvidia drivers help development nouveau providing information hardware nvidia cards renouveau renouveau works copying current graphics card mmio register space drawing graphics taking another copy mmio outputting difference text file runs six dozen different tests user computer makes tar.bz2 archive submits e-mail automatically transferred project ftp servers developers analyze kernel direct access hardware includes graphics card end-user software accesses various interfaces specific task nouveau written gallium3d-type device driver means shares large amounts code gallium3d drivers shared core mainlined mesa 3d distributed various linux distributions mesa 3d drivers includes supports multiple rendering interfaces designed give user-space programs e.g video games cad software access correspondent sip blocks free open-source implementation direct3d version 9 mainlined mesa 3d used nouveau however since software using direct3d programmed windows software used together wine linux rendering interface opengl developed khronos group implementations api part nvidia amd proprietary catalyst another implementation written free software enthusiasts brian paul intel coordinated mesa 3d gallium3d-type driver nouveau needs minor adaptations work implementation mesa 3d supports multiple interfaces designed give user-space programs e.g gstreamer handbrake access correspondent sip blocks also possible use ic designed rendering calculations purpose though approach consumes much electrical power compared utilizing purevideo sip block nouveau supports purevideo provides access vdpau partly xvmc nouveau support nvidia nvenc mesa galliumcompute also main project nvidia amd part near beta opencl 1.0 1.1 1.2 nouveau support cuda project coriander conversion cuda code opencl 1.2 possible cuda support therefore possible full opencl 1.2 support galliumcompute around year 2006 nvidia introduced falcon fast logic controller gpus 4th risc-v workshop july 2016 nvidia employees introduced plans replace falcon new proprietary custom design based risc-v instruction set nouveau started 2005 stéphane marchesin series patches upon nv driver officially announced february 2006 fosdem event first live demo nouveau linux.conf.au 2007 2010 nouveau accepted 2.6.33 version linux kernel experimental driver 26 march 2012 nouveau driver marked stable promoted staging area linux 3.4 nouveau gained major internal architecture overhaul linux 3.7 nouveau originally used direct rendering infrastructure dri mesa 3d rendering 3d computer graphics allows accelerate 3d drawing using graphics processing unit gpu directly 3d application february 2008 work dri support ceased moved new gallium3d nvidia publicly announced would release documentation gpus intent address areas impact out-of-the-box usability nvidia gpus nouveau nvidia alexandre courbot committed extensive patch set add initial support gk20a tegra k1 nouveau red hat employee ben skeggs committed patch adds support pascal-based gp104 chip found geforce gtx 1070 geforce gtx 1080-branded graphics cards linux kernel status 2016 future work introduced xdc2016 status new efforts opencl shown fosdem nouveau driver 3d counterpart mesa used default open-source driver nvidia cards many linux distributions including fedora 11 opensuse 11.3 ubuntu 10.04 debian compiz recommends nouveau nvidia proprietary driver june 2014 codethink reported run wayland-based weston compositor linux kernel 3.15 making use egl 100 open-source graphics driver stack tegra k1 october 2016 netbsd added experimental nouveau support netbsd 7 comparison benchmarks nouveau generally provides inferior performance nvidia proprietary graphics device drivers systems one unable boot linux properly due certain bugs nouveau thus nouveau disabled specifying kernel option nomodeset prior booting often done pressing codice_1 grub menu appending codice_2 linux line made permanent adding similar option codice_3 | [
2270,
6692,
2091,
5103,
3084,
6610,
7442,
4685,
6011,
4954,
573,
1556,
5571,
578,
7093,
1864,
2143,
7669,
1128,
1595,
1138,
169,
6058,
6586,
7310,
352,
1989,
3751,
8141,
2080,
1435
] | Test |
7,913 | 2 | Oryx/Pecos:oryx/pecos oryx/pecos proprietary operating system developed scratch bell labs beginning 1978 express purpose running large-scale pbx switching equipment operating system first used flagship system 75 recently used variations including definity g3 generic 3 switches manufactured t/lucent technologies spinoff avaya last system based oryx/pecos avaya g3 csi running release 13.1 definity software formal end sale february 5 2007 although widely believed unix-like variant developed directly bell labs case based version unix oryx/pecos consists kernel oryx associated processes running top pecos system named pecos street bounds westminster co campus colorado bell labs location oryx last word alphabetically os office dictionary oryx purportedly origin unicorn myth system loosely based thoth developed university waterloo demos developed los alamos scientific labs features normally found commercial operating systems found oryx/pecos features include one historical link oryx/pecos unix authors article proposed future development implementation unix execution environment top oryx/pecos fact project undertaken denver however project never became official product lucent even though completed successfully introduced internally eli version oryx/pecos 5th release e release persons working large office environments using lucent technologies avaya-branded telephones likely using oxyx-pecos indirectly due narrow focus proprietary nature operating system remains obscure 2005 avaya discontinued use oryx/pecos operating system instead porting become application ran linux new incarnation known communication manager also early 2000s definity one later ip 600 s8100 earlier attempt phase away os definity one ran windows nt 4.0 linux emulator also emulated oryx/pecos system allegedly according administrators used specific system failure attempt windows run top oryx/pecos linux problem however due robust nature carrier-grade equipment widespread use t/lucent/avaya pbx systems oryx/pecos probably continue supported indefinitely | [
5571,
3751,
578
] | Test |
7,914 | 9 | Plua:plua plua port programming language lua 5.0.3 along small ide palm computing platform lua programming language designed tecgraf computer graphics technology group puc-rio brazil plua includes extensions lua better support palm platform development ceased plua latest stable version plua 2.0 downloaded discussion board prior version plua 1.1 port lua 4.0 extensions differ somewhat versions new version thus sometimes called plua 2 avoid confusion plua special functions extensions support palm platform including compiler interpreter approximately 150 kb compiled helloworldapp.prc shown approximately 2 kb classic hello world program old version written follows text saved normal memo palm executed tapping run button ide alternatively program compiled prc palm os program file executable palm platform provided runtime program present ide breakdown program equivalent program new extensions written follows breakdown program first line comment rest little different | [
1361,
7379,
6121,
3368,
6778
] | Train |
7,915 | 1 | Object-relational_impedance_mismatch:object-relational impedance mismatch object-relational impedance mismatch set conceptual technical difficulties often encountered relational database management system rdbms served application program multiple application programs written object-oriented programming language style particularly objects class definitions must mapped database tables defined relational schema term object-relational impedance mismatch derived electrical engineering term impedance matching objects instances reference one another therefore form graph mathematical sense network including loops cycles relational schemas contrast tabular based relational algebra defines linked heterogeneous tuples groupings data fields row different types field object-oriented programs well designed techniques result encapsulated objects whose internal representation hidden object-oriented framework underlying properties given object expected exposed interface outside one implemented alongside object however object-relational mapping necessarily exposes underlying content object interact interface object implementation specify hence object-relational mapping violates encapsulation object since many object-relational mappers automatically generate public fields corresponding database columns relational thinking private versus public access relative need object-oriented oo model absolute characteristic data state relational oo models often conflicts relativity versus absolutism classifications characteristics object-oriented paradigm objects interfaces together provide access internals object relational model hand utilizes derived relation variables views provide varying perspectives constraints ensure integrity similarly essential oop concepts classes objects inheritance polymorphism supported relational database systems proper mapping relational concepts object-oriented concepts made relational database tables linked associations found object-oriented analysis major mismatch existing relational oo languages type system differences relational model strictly prohibits by-reference attributes pointers whereas oo languages embrace expect by-reference behavior scalar types operator semantics vastly different models causing problems mapping example sql systems support string types varying collations constrained maximum lengths open-ended text types tend hinder performance oo languages consider collation argument sort routines strings intrinsically sized available memory subtle related example sql systems often ignore trailing white space string purposes comparison whereas oo string libraries typically possible construct new data types matter constraining possible values primitive types oo language another mismatch differences structural integrity aspects contrasted models oo languages objects composed objects—often high degree—or specialize general definition may make mapping relational schemas less straightforward relational data tends represented named set global unnested relation variables relations sets tuples conforming header see tuple relational calculus ideal counterpart oo languages constraints oo languages generally declared manifested exception raising protection logic surrounding code operates encapsulated internal data relational model hand calls declarative constraints scalar types attributes relation variables database whole semantic differences especially apparent manipulative aspects contrasted models however relational model intrinsic relatively small well-defined set primitive operators usage query manipulation data whereas oo languages generally handle query manipulation custom-built lower-level case- physical-access-path-specific imperative operations oo languages support declarative query sublanguages oo languages typically deal lists perhaps hash tables manipulative primitives necessarily distinct set-based operations relational model concurrency transaction aspects significantly different also particular transactions smallest unit work performed databases much larger relational databases operations performed classes oo languages transactions relational databases dynamically bounded sets arbitrary data manipulations whereas granularity transactions oo language typically level individual assignments primitive-typed fields general oo languages analogue isolation durability atomicity consistency ensured writing fields primitive types working around impedance mismatch problem object-oriented programs starts recognition differences specific logic systems employed mismatch either minimized compensated object-relational impedance mismatch problem universal problem oo databases name suggests impedance problem occurs relational databases common solution problem use alternative database nosql xml database attempts building object-oriented database management systems oodbms would avoid impedance mismatch problem less successful practice relational databases however partly due limitations oo principles basis data model research performed extending database-like capabilities oo languages notions transactional memory one common solution impedance mismatch problem layer domain framework logic scheme oo language used model certain relational aspects runtime rather attempt static mapping frameworks employ method typically analogue tuple usually row dataset component generic entity instance class well analogue relation advantages approach may include disadvantages may include mixing levels discourse within oo application code presents problems common mechanisms used compensate biggest challenge provide framework support automation data manipulation presentation patterns within level discourse domain data modelled address reflection and/or code generation utilized reflection allows code classes addressed data thus provide automation transport presentation integrity etc data generation addresses problem addressing entity structures data inputs code generation tools meta-programming languages produce classes supporting infrastructure en masse schemes may still subject certain anomalies levels discourse merge instance generated entity classes typically properties map domain e. g. name address well properties provide state management framework infrastructure e. g. ismodified argued christopher j date others truly relational dbms would pose problem domains classes essentially one thing native mapping classes relational schemata fundamental design mistake individual tuples within database table relation ought viewed establishing relationships entities representations complex entities however view tends diminish influence role object-oriented programming using little field type management system impedance mismatch programming domain objects user interface sophisticated user interfaces allow operators managers non-programmers access manipulate records database often require intimate knowledge nature various database attributes beyond name type particular considered good practice end-user productivity point view design user interfaces ui prevents illegal transactions cause database constraint violated entered requires much logic present relational schemata duplicated code certain code-development frameworks leverage certain forms logic represented database schema referential integrity constraints issues handled generic standard fashion library routines rather ad hoc code written case-by-case basis argued sql due limited set domain types alleged flaws makes proper object domain-modelling difficult sql constitutes lossy inefficient interface dbms application program whether written object-oriented style however sql currently widely accepted common database language marketplace use vendor-specific query languages seen bad practice avoidable database languages business system 12 tutorial proposed none widely adopted dbms vendors current versions mainstream object-relational dbmss like oracle microsoft sql server point may non-issue engines functionality given database arbitrarily extended stored code functions procedures written modern oo language java oracle microsoft .net language sql server functions invoked in-turn sql statements transparent fashion user neither knows cares functions/procedures originally part database engine modern software-development paradigms fully supported thus one create set library routines re-used across multiple database schemas vendors decided support oo-language integration dbms back-end realized despite attempts iso sql-99 committee add procedural constructs sql sql never rich set libraries data structures today application programmers take granted reasonable leverage directly possible rather attempting extend core sql language consequently difference application programming database administration blurred robust implementation features constraints triggers may often require individual dual dba/oo-programming skills partnership individuals combine skills fact also bears division responsibility issue however would point contention moot due fact 1 rdbmses never intended facilitate object modelling 2 sql generally seen lossy inefficient interface language one trying achieve solution rdbmses designed sql efficient designed namely query sort filter store large sets data would additionally point inclusion oo language functionality back-end simply facilitates bad architectural practice admits high-level application logic data tier antithetical rdbms canonical copy state located database model generally assumes database management system authoritative repository state concerning enterprise copies state held application program — temporary copies may date underlying database record subsequently modified transaction many object-oriented programmers prefer view in-memory representations objects canonical data view database backing store persistence mechanism another point contention proper division responsibility application programmers database administrators dba often case needed changes application code order implement requested new feature functionality require corresponding changes database definition organizations database definition responsibility dba due need maintain production database system 24 hours day many dbas reluctant make changes database schemata deem gratuitous superfluous cases outright refuse use developmental databases apart production systems help somewhat newly developed application goes live dba need approve changes programmers view intransigence however dba frequently held responsible changes database definition cause loss service production system—as result many dbas prefer contain design changes application code design defects far less likely catastrophic consequences organizations non-dysfunctional relationship dbas developers though issue present decision change database schema would driven business needs new requirement persist additional data performance boost critical application would trigger schema modification example key philosophical differences oo relational models summarized follows result object-relational impedance mismatch often argued partisans sides debate technology ought abandoned reduced scope database advocates view traditional procedural languages compatible rdbms many oo languages suggest less oo style ought used particular argued long-lived domain objects application code ought exist objects exist created query made disposed transaction task complete conversely oo advocates argue oo-friendly persistence mechanisms oodbms ought developed used relational technology ought phased many programmers dbas hold neither viewpoints view object-relational impedance mismatch mere fact life information technology deal also argued o/r mapping paying situations probably oversold advantages besides drawbacks skeptics point worth think carefully using add little value cases | [
2624,
184,
6345,
4775,
8097,
2124,
6462,
2054,
4356,
2878,
7303,
784,
6594,
1803
] | Test |
7,916 | 5 | External_Data_Representation:external data representation external data representation xdr standard data serialization format uses computer network protocols allows data transferred different kinds computer systems converting local representation xdr called encoding converting xdr local representation called decoding xdr implemented software library functions portable different operating systems also independent transport layer xdr uses base unit 4 bytes serialized big-endian order smaller data types still occupy four bytes encoding variable-length types string opaque padded total divisible four bytes floating-point numbers represented ieee 754 format xdr developed mid 1980s sun microsystems first widely published 1987 xdr became ietf standard 1995 xdr data format use many systems including xdr standard exists three different versions following rfcs | [
4469,
6871,
6966,
709,
4580,
2281,
4676,
3775,
3855,
3525,
2644,
1543,
3777,
6505,
7170,
1364,
7173,
7637,
6538,
5571,
2118,
736,
2119,
6908,
5492,
2219,
3207,
3383,
3797,
3799,
5142,
2043,
3314,
6216,
7805,
7932,
3819,
3820,
3821,
7217,
... | Test |
7,917 | 4 | William_O._Studeman:william o. studeman william oliver bill studeman born january 16 1940 retired admiral united states navy former deputy director central intelligence agency two extended periods acting director central intelligence deputy director central intelligence served administrations george h. w. bush bill clinton three directors central intelligence robert gates r. james woolsey jr. john m. deutch studeman retired navy 1995 almost 35 years service 1988 1992 director national security agency director naval intelligence september 1985 july 1988 6 february 2004 studeman appointed iraq intelligence commission independent panel tasked investigating u.s. intelligence surrounding united states 2003 invasion iraq iraq weapons mass destruction wmd studeman retired 2005 northrop grumman corporation vice president deputy general manager mission systems position focused strategies programs business development marketing related intelligence information warfare well corporate cross-sector integration managing technology partnerships concepts related netcentricity isr io/iw advanced command environments served position approximately 9 years studeman served corporate boards government university corporate advisory boards recently commissioner presidential commission wmd currently serving national advisory board bio-security public interest declassification board also member defense science board well national geospatial-intelligence agency advisory board defense intelligence agency joint military intelligence college national reconnaissance office national labs advisory boards chairman board naval intelligence foundations member board national cryptologic museum foundation 1962 received bachelor degree history university south sewanee tennessee studeman holds master degree public international affairs george washington university elliott school international affairs navy also distinguished graduate naval war college national war college well recipient honorary doctorate strategic intelligence defense intelligence college receive second honorary doctorate degree fall university south studeman recipient numerous service commendations citations including navy distinguished service medal legion merit two gold stars 2007 studeman awarded william oliver baker award intelligence national security alliance also received service medals governments france brazil south korea | [
4210,
820,
6627,
1278,
3716,
228,
4429,
7917,
5412,
5767,
5509,
4988,
2343,
4996,
1701,
4201
] | Test |
7,918 | 4 | HYPR_Corp:hypr corp hypr corp venture-backed new york based company founded 2014 provides enterprises decentralized authentication technology accessing mobile web internet things iot applications hypr corp founded 2014 new york city team security researchers 800,000 private seed capital concluding 3 million growth funding round october 2016 ventures 10 million series funding round september 2017. company ’ decentralized authentication product unveiled international consumer electronics show ces january 2015 las vegas listed one top 10 best technologies ces 2015 zdnet company board member fast identity online fido alliance consortium global enterprises working towards open standards strong authentication 2017 gartner named firm cool vendor transforming multichannel unified retail commerce 2018 ceo co-founder george avetisov named forbes 30 30 list enterprise technology category hypr provides decentralized biometric tokenization scheme claims gives enterprises option replace use centralized password-based systems firm says forcing malicious attackers divert attention centralized validation server many client-side devices biometric tokenization decreases viability attack client-server authentication channel rendering common large-scale server-side data breach unscalable attack vector | [
4133
] | Test |
7,919 | 2 | Palm_Pre_2:palm pre 2 palm pre 2 styled palm prē 2 slider smartphone designed marketed palm inc. hewlett-packard multi-touch screen physical sliding keyboard smartphone third use palm linux-based mobile operating system webos releasing version 2.0 pre 2 functions camera phone portable media player location navigation capabilities pre also serves personal information manager number communication collaboration applications bluetooth wi-fi connectivity built-in palm pre 2 announced october 19 2010 initial launch date october 22 2010 french carrier sfr also announced pre 2 would coming united states carrier verizon wireless rogers wireless canada also unlocked umts developer phone additions include flat gorilla glass screen instead curved plastic predecessors surrounded plastic trim faster processor upgraded camera plastic door covered microusb port previous iterations considered flimsy removed otherwise pre 2 size design predecessors pre 2 last mobile phone branded palm name pre 3 veer touchpad branded hp devices august 11 2010 webos developer geoff gauchet discovered unknown device code name roadrunner accessing foursquare app using new version webos version 2.0 october 12 2010 several specifications pre 2 including processor speed memory leaked france sfr website prior official launch october 22 november 18 2010 pre 2 became available u.s. unlocked developer device december 20 2010 pre 2 launched canada rogers wireless february 17 2011 pre 2 launched u.s. verizon wireless pre 2 first phone use version 2.0 hp palm webos last version available pre 2 version 2.2.4 subject carrier approval certain models however | [
1066,
2538,
7326,
4754,
3764,
2370,
1167,
289,
2551,
3524,
4317,
6443,
488,
578,
1284,
740,
1202,
5236,
6378,
1581,
1582,
4627,
3734,
1973,
950,
3405,
2338,
1237,
1702,
7049
] | Test |
7,920 | 1 | Storm_(software):storm software storm python programming library object-relational mapping one sql databases python objects allows python developers formulate complex queries spanning multiple database tables support dynamic storage retrieval object information mysql postgresql sqlite database support built storm api allows support others storm also supports django zope web frameworks natively twisted support planned .20 release storm developed canonical ltd. python use launchpad landscape applications subsequently released 2007 free software project free software released gnu lesser general public license contributors required assign copyrights canonical version control done bazaar issue tracking launchpad | [
2180,
3863,
5965,
3915,
7156,
5571,
6594,
5956,
417,
1989,
2660
] | Validation |
7,921 | 8 | Event-driven_SOA:event-driven soa event-driven soa form service-oriented architecture soa combining intelligence proactiveness event-driven architecture organizational capabilities found service offerings event-driven soa typical soa platform orchestrated services centrally pre-defined business processes assuming already triggered defined business process older approach sometimes called soa 1.0 account events occur across outside specific business processes thus complex events pattern activities—both non-scheduled scheduled—should trigger set services accounted traditional soa 1.0 architecture soa 2.0 architecture event-driven soa lets business users monitor analyze enrich events make connections among disparate events first appear intuitively obvious makes enriched events visible others especially business analysts marketing directors also allows soa 2.0 system possibly automate actions take address unique pattern soa 2.0 ability create high-level business events numerous low-level system events events created filtering real-time data middleware applications databases web services example infusing defining detail dependencies causal relationships discovered correlating events clear enriched events produced soa 2.0 environment customer shopping cart abandonment rate escalated last days notification marketing department could initiate research competitors done cause customers buy products elsewhere common product shopping carts prices offered competition practice relationship streamed events processed causal vector engine performs lookup based recently viewed events assigns causal vector event relationship discovered causes b causal vector engine checks b ’ causal vector rule index contains reference engine may handle events different transactions simultaneously perhaps different order occurred unlike sequential procedural systems clients must poll change requests event-driven soa allows systems components respond dynamically real time events occur soa 2.0 complements extends soa 1.0 introducing long-running processing capabilities long running processing capability enables architecture collect various asynchronous events long period time correlate events causal relationships soa 2.0 event patterns designed implemented look event relationships span days weeks months certain criteria met trigger business process address event pattern soa 2.0 event-driven programming structured around concept decoupled relationships event producers event consumers event consumer n't care event occurs rather concerned invoked event occurred systems applications separate event producers event consumers typically rely event dispatcher channel channel contains event queue acts intermediary event producers event handlers prototypical soa 2.0 paradigm contains four essential elements soa 2.0 web services composed two ways orchestration choreography orchestration central process takes control involved web services coordinates execution different operations web services involved operation involved soa 2.0 services know need know part composition higher business process central coordinator orchestration knows orchestration centralized explicit definitions operations order invocation soa 2.0 services choreography hand rely central coordinator rather soa 2.0 service involved choreography knows exactly execute operations based defined trigger criteria interact choreography collaborative effort focused exchange messages participants choreography need aware business process operations execute messages exchange timing message exchanges bpel follows orchestration paradigm choreography covered standards wsci web services choreography interface ws-cdl web services choreography description language causal relationships inherent world around us intrinsic decision making human intelligence processes gathers relationships faster current artificial computational capability one fundamental obstacles artificial intelligence absence automated ability relate events together human uses human intuition using causal vector engine perception causality enhanced appropriate spatiotemporal conditions based structural temporal rules written engine perception complex causal semantics additive mediated bidirectional causalities need coded engine distinguish events related appear related fact engine uses preponderant causal vector rate-of-change propagation code relationship among events establishes partial order validates causality perceived multiple occurrences engine plays replays event sequence different temporal order infer could related topological connections compares replays rules preprogrammed analyst multiple low-level system events processed causal vector engine compared rules trigger higher-level business events causality vector engine cve console application displays events real-time business analysts streams events observed occur much like stock ticker cve console app several windows list events different contexts business analysts see cve relationships sequential window shows events date-timestamp order one windows various orders cve works list rules creates implied relationships events various buttons controls exist console application enable business analysts create relationships events on-the-fly define rules respond relationships business analysts infuse additional defining detail sql query statement attached rule event context cve app works much like modern-day stock trading application mutual funds managers use manage risk example cve application engine seen silk enterprise service bus esb implementations contain facility called mediation example mediation flows part websphere enterprise service bus intercept mule also supports mediation flows mediation flows modify messages passed existing services clients use services mediation flow mediates intervenes provide functions message logging data transformation routing typically functions implemented using interception design pattern messages pass esb esb enriches messages destined channel monitoring high-level business event message esb may query database obtain additional information data entity within message example based customer id esb mediation flow could get zip code customer resides based ip address originating request end-user esb mediation flow could lookup country state county ip address examples represent data enrichment concept adding additional value existing data based intent high-level business event eventually triggered esb mediation flow one component types service component architecture sca like sca component program accesses mediation flow exports provides mediation flow forwards messages external services via imports special kinds imports exports jms called jms bindings enable developers specify binding configuration write data handling code mediation flow consists series mediation primitives manipulate messages flow bus developers coded custom binding export import start focus mediation flow component websphere integration developer assembly editor done jms custom binding mediation component operation flow component interface represented request response service data objects sdo framework provides unified framework data application development sdo developers need familiar specific api order access utilize data sdo developers simply work data multiple data sources relational databases entity ejb components xml pages web services service component architecture javaserver pages pages mediation flows entirely independent bindings used imports exports fact purpose conversion sdo dataobject instance outside flow implementation mediation flows built without knowledge protocol format messages sent mediation module business-level trigger condition enables soa 2.0 architecture establish real-time customer intelligence marketing automation customer loyalty solutions among features business objects model real-world entities architecture customers accounts loans travel itineraries state one objects changes monitoring agent notices change significant compared list criteria monitor event created passed monitoring agents example detection actual business problem opportunity could lead increased revenue customer cancels order extra manufacturing capacity could reduce profitability production run soa 2.0 event could notify marketing department create special sales campaign would resell excess capacity thereby recapturing original profitable cost-per-unit automatic monitoring events operational business process activities processes execute see immediate action needs taken either inside outside enterprise monitoring agents continually test specific business conditions changes business operations necessary agents alert people make recommendations send messages applications invoke whole business processes conditions changes occur triggered business process directly support revenue growth cost containment responsiveness business conditions ability pursue new market opportunities resulting business processes could also measure operational progress toward achieving goals control operational costs communicating needed needs know report performance status key processes key decision makers example could construct crm event abandoned shopping cart message parsing transaction customer id time using filters extract value goods cart tapping correlation capabilities system add causal indicators whether commerce site suffering performance problems crm event might also include customer value rank customer database another example based types independent service calls received soa 2.0 platform could identify product defect detecting underlying pattern separate complaints triggering alert engineering production possible defect example 3 potential use event-driven soa could virtual electricity market home clothes dryers bid price electricity use real-time market pricing system real-time market price control system could turn home electricity customers active participants managing power grid monthly utility bills customers set limits much would pay electricity run clothes dryer example electricity providers willing transmit power price would alerted grid could sell electricity dryer one side consumer devices bid power based much owner device willing pay set ahead time consumer side suppliers enter bids automatically electricity generators based much would cost start run generators electricity suppliers could perform real-time market analysis determine return-on-investment optimizing profitability reducing end-user cost goods event-driven soa software could allow homeowners customize many different types electricity devices found within home desired level comfort economy event-driven software could also automatically respond changing electricity prices little five-minute intervals example reduce home owner electricity usage peak periods electricity expensive software could automatically lower target temperature thermostat central heating system winter raise target temperature thermostat central cooling system summer event-driven soa software could shut heating element water heaters pre-set response limits established individual homeowners example market price electricity given hour exceeded home owner limit home owner could plan go without recharging water hot temperature hour prices high opt delay hot water temperature recharge next hour electricity market prices might lower criteria would managed home owner personal computer internet connection programming various devices around home consume electricity management software approves consumption savings represented technique enabled event-driven soa like improving gas mileage vehicle makes home energy use efficient enabling consumption electricity real-time prices lower inhibiting consumption electricity real-time prices higher one mechanism used soa 1.0 enterprise service bus implementations publish/subscribe facility implementing esb functionality pub/sub messages advanced knowledge system events needed create soa 2.0 message patterns enterprise implemented many publish functions soa middleware analysts set task strategizing available publish messages could assembled unique pattern detect soa 2.0-enriched trigger causal vector engine cve mechanics implemented simply expandable view sql constructs written stored procedures causes b causality must occur within n number transactions sql order timestamp clause creates result set increments counter transactions occurred within timeframe n number matching b occurrence transactions creation additional stored procedures accomplished cve console application using standard database developer toolkit domain algorithms fever/flu/infection domain logic cited reference used derive sql code applies selected business rules use case using cves soa environments improve business agility application soa 2.0 principles identify business opportunities would otherwise missed identified much later functional magnetic resonance imaging fmri using granger causality analysis gca detects causal effects among brain regions results one sample test demonstrated positive causal effect rfic dorsal anterior cingulate cortex dacc oracle cve analytical engine uses set theoretical models evaluates data business analyst configures causal factors he/she specifies criteria indicating models consider causal factor | [
6507,
3166,
6415,
3776,
5646,
6105,
7999,
1760,
7017,
4530,
3813,
5685,
5424,
7580,
2517,
1600,
360
] | Test |
7,922 | 8 | Acadine_Technologies:acadine technologies acadine technologies holdings limited systems software company specializing mobile operating systems mobile wearable internet things iot devices core product h5os web-centric operating system primarily based open web standard html5 derived firefox os whose development company founder li gong overseen president mozilla corporation acadine technologies founded march 25 2015 based hong kong operations beijing taipei palo alto london initially started name gone fishing startup recruited various staff mozilla apart gong including james ho former mozilla cto andreas gal employees mozilla taiwan mozilla announced december 2015 would cease efforts partner mobile carriers use firefox os smartphones reported acadine would take mission h5os released first version h5os 17th feb 2016 announced july 15 2015 acadine technologies received 100m first-round funding tsinghua unigroup international hong kong entity controlled tsinghua university chinese government year li gong stated company already seeking second round funding international investors main rationale dispel early incorrect perception somehow china-backed company really pure silicon valley-style startup april 27 2016 reported funds tsinghua unigroup transferred acadine started reorganization h5os discontinued may 2016 never publicly released | [] | Test |
7,923 | 2 | Omega_Drivers:omega drivers omega drivers unofficial third-party device drivers ati nvidia graphics cards created angel trinidad differed official drivers offer customization extra features compatible ati graphics cards nvidia cards use detonator drivers drivers tweaked versions officially released ati nvidia mainly using registry tweaks offering alternative installer custom drivers compiled source code website omega ati driver based ati catalyst drivers driver particularly notable resolving 3d compatibility problems affecting past versions ati drivers versions 7.8-7.12 agp cards driver includes various third party utilities including 'multires entech taiwan ati tray tools tweaking utility drivers recognized ati best alternative drivers internet according terry makedon nvidia previously attempted legal action versions omega drivers company since allowed omega drivers nvidia cards made recently amd began offering upgraded driver known catalyst omega driver amd claims change brand due significant feature additions mentioned existence omega drivers omega drivers noted affiliated amd-distributed catalyst omega driver | [] | Test |
7,924 | 7 | MapReduce:mapreduce mapreduce programming model associated implementation processing generating big data sets parallel distributed algorithm cluster mapreduce program composed map procedure method performs filtering sorting sorting students first name queues one queue name reduce method performs summary operation counting number students queue yielding name frequencies mapreduce system also called infrastructure framework orchestrates processing marshalling distributed servers running various tasks parallel managing communications data transfers various parts system providing redundancy fault tolerance model specialization split-apply-combine strategy data analysis inspired map reduce functions commonly used functional programming although purpose mapreduce framework original forms key contributions mapreduce framework actual map reduce functions example resemble 1995 message passing interface standard reduce scatter operations scalability fault-tolerance achieved variety applications optimizing execution engine single-threaded implementation mapreduce usually faster traditional non-mapreduce implementation gains usually seen multi-threaded implementations multi-processor hardware use model beneficial optimized distributed shuffle operation reduces network communication cost fault tolerance features mapreduce framework come play optimizing communication cost essential good mapreduce algorithm mapreduce libraries written many programming languages different levels optimization popular open-source implementation support distributed shuffles part apache hadoop name mapreduce originally referred proprietary google technology since genericized 2014 google longer using mapreduce primary big data processing model development apache mahout moved capable less disk-oriented mechanisms incorporated full map reduce capabilities mapreduce framework processing parallelizable problems across large datasets using large number computers nodes collectively referred cluster nodes local network use similar hardware grid nodes shared across geographically administratively distributed systems use heterogeneous hardware processing occur data stored either filesystem unstructured database structured mapreduce take advantage locality data processing near place stored order minimize communication overhead mapreduce framework system usually composed three operations steps mapreduce allows distributed processing map reduction operations maps performed parallel provided mapping operation independent others practice limited number independent data sources and/or number cpus near source similarly set 'reducers perform reduction phase provided outputs map operation share key presented reducer time reduction function associative process often appears inefficient compared algorithms sequential multiple instances reduction process must run mapreduce applied significantly larger datasets single commodity server handle – large server farm use mapreduce sort petabyte data hours parallelism also offers possibility recovering partial failure servers storage operation one mapper reducer fails work rescheduled – assuming input data still available another way look mapreduce 5-step parallel distributed computation five steps logically thought running sequence – step starts previous step completed – although practice interleaved long final result affected many situations input data might already distributed sharded among many different servers case step 1 could sometimes greatly simplified assigning map servers would process locally present input data similarly step 3 could sometimes sped assigning reduce processors close possible map-generated data need process map reduce functions mapreduce defined respect data structured key value pairs map takes one pair data type one data domain returns list pairs different domain codice_3 → codice_4 map function applied parallel every pair keyed codice_5 input dataset produces list pairs keyed codice_6 call mapreduce framework collects pairs key codice_6 lists groups together creating one group key reduce function applied parallel group turn produces collection values domain codice_8 → codice_9 reduce call typically produces either one value v3 empty return though one call allowed return one value returns calls collected desired result list thus mapreduce framework transforms list key value pairs list values behavior different typical functional programming map reduce combination accepts list arbitrary values returns one single value combines values returned map necessary sufficient implementations map reduce abstractions order implement mapreduce distributed implementations mapreduce require means connecting processes performing map reduce phases may distributed file system options possible direct streaming mappers reducers mapping processors serve results reducers query canonical mapreduce example counts appearance word set documents document split words word counted map function using word result key framework puts together pairs key feeds call reduce thus function needs sum input values find total appearances word another example imagine database 1.1 billion people one would like compute average number social contacts person according age sql query could expressed using mapreduce k1 key values could integers 1 1100 representing batch 1 million records k2 key value could person age years computation could achieved using following functions mapreduce system would line 1100 map processors would provide corresponding 1 million input records map step would produce 1.1 billion n,1 records values ranging say 8 103 mapreduce system would line 96 reduce processors performing shuffling operation key/value pairs due fact need average per age provide millions corresponding input records reduce step would result much reduced set 96 output records would put final result file sorted count info record important processing reduced one time add count records computed average would wrong example reduce files 1 2 new file average 9 contacts 10-year-old person 9+9+9+9+9 /5 reduce file 3 lose count many records 've already seen end average 9.5 contacts 10-year-old person 9+10 /2 wrong correct answer 9.166 55 6 9*3+9*2+10*1 3+2+1 software framework architecture adheres open-closed principle code effectively divided unmodifiable frozen spots extensible hot spots frozen spot mapreduce framework large distributed sort hot spots application defines input reader divides input appropriate size 'splits practice typically 64 mb 128 mb framework assigns one split map function input reader reads data stable storage typically distributed file system generates key/value pairs common example read directory full text files return line record map function takes series key/value pairs processes generates zero output key/value pairs input output types map often different application word count map function would break line words output key/value pair word output pair would contain word key number instances word line value map function output allocated particular reducer application partition function sharding purposes partition function given key number reducers returns index desired reducer typical default hash key use hash value modulo number reducers important pick partition function gives approximately uniform distribution data per shard load-balancing purposes otherwise mapreduce operation held waiting slow reducers finish i.e reducers assigned larger shares non-uniformly partitioned data map reduce stages data shuffled parallel-sorted exchanged nodes order move data map node produced shard reduced shuffle sometimes take longer computation time depending network bandwidth cpu speeds data produced time taken map reduce computations input reduce pulled machine map ran sorted using application comparison function framework calls application reduce function unique key sorted order reduce iterate values associated key produce zero outputs word count example reduce function takes input values sums generates single output word final sum output writer writes output reduce stable storage mapreduce programs guaranteed fast main benefit programming model exploit optimized shuffle operation platform write map reduce parts program practice author mapreduce program however take shuffle step consideration particular partition function amount data written map function large impact performance scalability additional modules combiner function help reduce amount data written disk transmitted network mapreduce applications achieve sub-linear speedups specific circumstances designing mapreduce algorithm author needs choose good tradeoff computation communication costs communication cost often dominates computation cost many mapreduce implementations designed write communication distributed storage crash recovery tuning performance mapreduce complexity mapping shuffle sorting grouping key reducing taken account amount data produced mappers key parameter shifts bulk computation cost mapping reducing reducing includes sorting grouping keys nonlinear complexity hence small partition sizes reduce sorting time trade-off large number reducers may impractical influence split unit size marginal unless chosen particularly badly say 1mb gains mappers reading load local disks average minor processes complete quickly data fits main memory single machine small cluster using mapreduce framework usually effective since frameworks designed recover loss whole nodes computation write interim results distributed storage crash recovery expensive pays computation involves many computers long runtime computation task completes seconds restarted case error likelihood least one machine failing grows quickly cluster size problems implementations keeping data memory simply restarting computation node failures —when data small enough— non-distributed solutions often faster mapreduce system mapreduce achieves reliability parceling number operations set data node network node expected report back periodically completed work status updates node falls silent longer interval master node similar master server google file system records node dead sends node assigned work nodes individual operations use atomic operations naming file outputs check ensure parallel conflicting threads running files renamed possible also copy another name addition name task allowing side-effects reduce operations operate much way inferior properties regard parallel operations master node attempts schedule reduce operations node rack node holding data operated property desirable conserves bandwidth across backbone network datacenter implementations necessarily highly reliable example older versions hadoop namenode single point failure distributed filesystem later versions hadoop high availability active/passive failover namenode mapreduce useful wide range applications including distributed pattern-based searching distributed sorting web link-graph reversal singular value decomposition web access log stats inverted index construction document clustering machine learning statistical machine translation moreover mapreduce model adapted several computing environments like multi-core many-core systems desktop grids multi-cluster volunteer computing environments dynamic cloud environments mobile environments high-performance computing environments google mapreduce used completely regenerate google index world wide web replaced old ad hoc programs updated index ran various analyses development google since moved technologies percolator flumejava millwheel offer streaming operation updates instead batch processing allow integrating live search results without rebuilding complete index mapreduce stable inputs outputs usually stored distributed file system transient data usually stored local disk fetched remotely reducers david dewitt michael stonebraker computer scientists specializing parallel databases shared-nothing architectures critical breadth problems mapreduce used called interface low-level questioned whether really represents paradigm shift proponents claimed challenged mapreduce proponents claims novelty citing teradata example prior art existed two decades also compared mapreduce programmers codasyl programmers noting writing low-level language performing low-level record manipulation mapreduce use input files lack schema support prevents performance improvements enabled common database system features b-trees hash partitioning though projects pig piglatin sawzall apache hive ysmart hbase bigtable addressing problems greg jorgensen wrote article rejecting views jorgensen asserts dewitt stonebraker entire analysis groundless mapreduce never designed intended used database dewitt stonebraker subsequently published detailed benchmark study 2009 comparing performance hadoop mapreduce rdbms approaches several specific problems concluded relational databases offer real advantages many kinds data use especially complex processing data used across enterprise mapreduce may easier users adopt simple one-time processing tasks mapreduce programming paradigm also described danny hillis 1985 thesis widely-used time program connection machine special hardware support accelerate map reduce google granted patent mapreduce however claims patent granted mapreduce similar existing products example map reduce functionality easily implemented oracle pl/sql database oriented language supported developers transparently distributed database architectures clusterpoint xml database mongodb nosql database mapreduce tasks must written acyclic dataflow programs i.e stateless mapper followed stateless reducer executed batch job scheduler paradigm makes repeated querying datasets difficult imposes limitations felt fields machine learning iterative algorithms revisit single working set multiple times norm | [
2902,
5014,
6415,
10,
5372,
5728,
6427,
2569,
6817,
6461,
3309,
2591,
6472,
5775,
6137,
434,
1511,
6498,
6153,
84,
3676,
5455,
7238,
4762,
7967,
6176,
5117,
5476,
831,
1564,
5141,
136,
2317,
840,
2673,
7285,
3396,
8012,
2683,
855,
6937,... | Validation |
7,925 | 4 | HTTP_Strict_Transport_Security:http strict transport security http strict transport security hsts web security policy mechanism helps protect websites protocol downgrade attacks cookie hijacking allows web servers declare web browsers complying user agents interact using secure https connections never via insecure http protocol hsts ietf standards track protocol specified rfc 6797 hsts policy communicated server user agent via https response header field named nowiki strict-transport-security /nowiki hsts policy specifies period time user agent access server secure fashion website using hsts must never accept clear text http either connect http systematically redirect users https consequence user-agent capable tls able connect site anymore hsts specification published rfc 6797 19 november 2012 approved 2 october 2012 iesg publication proposed standard rfc authors originally submitted internet-draft 17 june 2010 conversion internet-draft specification name altered strict transport security sts http strict transport security specification applies http http response header field defined hsts specification however remains named strict-transport-security last so-called community version then-named sts specification published 18 december 2009 revisions based community feedback original draft specification jeff hodges paypal collin jackson adam barth published 18 september 2009 hsts specification based original work jackson barth described paper forcehttps protecting high-security web sites network attacks additionally hsts realization one facet overall vision improving web security put forward jeff hodges andy steingruebl 2010 paper need coherent web security policy framework server implements hsts policy supplying header https connection hsts headers http ignored example server could send header future requests domain next year max-age specified seconds 31,536,000 equal one non-leap year use https codice_1 web application issues hsts policy user agents conformant user agents behave follows nowiki rfc 6797 /nowiki hsts policy helps protect web application users passive eavesdropping active network attacks man-in-the-middle attacker greatly reduced ability intercept requests responses user web application server user browser hsts policy effect web application important security vulnerability hsts fix ssl-stripping man-in-the-middle attacks first publicly introduced moxie marlinspike 2009 blackhat federal talk new tricks defeating ssl practice ssl tls stripping attack works transparently converting secure https connection plain http connection user see connection insecure crucially way knowing whether connection secure many websites use tls/ssl therefore way knowing without prior knowledge whether use plain http due attack simply website n't implemented tls/ssl additionally warnings presented user downgrade process making attack fairly subtle vigilant marlinspike sslstrip tool fully automates attack hsts addresses problem informing browser connections site always use tls/ssl hsts header stripped attacker user first visit google chrome mozilla firefox internet explorer microsoft edge attempt limit problem including pre-loaded list hsts sites unfortunately solution scale include websites internet see limitations hsts also help prevent one cookie-based website login credentials stolen widely available tools firesheep hsts time limited sensitive attacks involving shifting victim computer time e.g using false ntp packets initial request remains unprotected active attacks uses insecure protocol plain http uri initial request obtained insecure channel applies first request activity period specified advertised hsts policy nowiki max-age /nowiki sites set period several days months depending user activity behavior google chrome mozilla firefox internet explorer/microsoft edge address limitation implementing hsts preloaded list list contains known sites supporting hsts list distributed browser uses https initial request listed sites well previously mentioned pre-loaded lists scale cover entire web potential solution might achieved using dns records declare hsts policy accessing securely via dnssec optionally certificate fingerprints ensure validity requires running validating resolver avoid last mile issues junade ali noted hsts ineffective use phony domains using dns-based attacks possible man-in-the-middle interceptor serve traffic artificial domain hsts preload list made possible dns spoofing attacks simply domain name misleadingly resembles real domain name www.example.org instead www.example.com even hsts preloaded list hsts ca n't prevent advanced attacks tls beast crime attacks introduced juliano rizzo thai duong attacks tls orthogonal hsts policy enforcement see discussion overall hsts security considerations hsts used near-indelibly tag visiting browsers recoverable identifying data supercookies persist browser incognito privacy modes creating web page makes multiple http requests selected domains example twenty browser requests twenty different domains used theoretically one million visitors distinguished 2 due resulting requests arriving via http vs. https latter previously recorded binary bits established earlier via hsts headers depending actual deployment certain threats e.g cookie injection attacks avoided following best practices | [
363,
794,
887,
5984,
6795,
1168,
1173,
2644,
1460,
5824,
8189,
8093,
6540,
6908,
5399,
6458,
6553,
2587,
4071,
7567,
7925,
1401,
57,
3899,
1970,
6758,
2691,
2876,
6049,
4990,
2789,
3057,
7214,
7217,
3588,
353,
1059,
1513,
2620,
359,
342... | Test |
7,926 | 3 | Balance_of_Power_(video_game):balance power video game balance power computer strategy game geopolitics cold war created chris crawford published 1985 macintosh mindscape followed ports variety platforms next two years game player takes role president united states general secretary soviet union goal improve player country standing world relative superpower yearly turn random events occur may effects player international prestige player choose respond events various ways may prompt response superpower creates brinkmanship situations two nations potentially escalating nuclear war ends game crawford already well-known especially eastern front 1941 1984 announcement moving macintosh platform work new concept generated considerable interest widely reviewed release including extremely positive review new york times magazine praised inventive non-action gameplay nevertheless exciting distinct named computer gaming world one innovative computer games time balance power successful mac combined ports ultimately sold quarter million units player may choose either president united states general secretary communist party soviet union must lead chosen superpower eight years seeking maximize prestige avoiding nuclear war turn one year long beginning year player presented set incidents crises various countries around globe must choose response one responses may range action diplomatic notes superpower military maneuvers response met counter-response may vary backing escalation player gets chance initiate actions deal opponent responses core mechanic similar bruce ketchledge 1983 game geopolitique 1990 published ssi one difference earlier game negotiations resolved games backing negotiation results loss prestige reverberate politically likewise games brinkmanship may result global war geopolitique wars actually fought in-game game continued balance power war ends game instantly following message ignited n accidental nuclear war animated display mushroom cloud parts bodies flying air reward failure crawford made name years atari late 1970s early 1980s smash hit eastern front 1941 made one game authors known name helped ensure later releases also successful degree early 1984 atari rapidly going bankrupt due effects north american video game crash 1983 march laid majority staff including crawford ample severance enough allow write new game freelancer considering sequel eastern front political game inca empire eventually decided write cold war game peace crawford cited bob dylan blowin wind emotional inspiration game considering atari platform lost cause crawford began looking new 16-bit platforms coming market dismissed ibm pc crude amiga likely fail business reasons thus chose macintosh platform develop time non-trivial decision development tools mac programmers buy apple lisa write code platform april 1984 interview origins game fair crawford stated working game macintosh entitled arms race based philosophy h-bombs n't kill people geopolitics kills people may initial concept fleshed game would take place top world map could show various details events would presented newspaper stories following algorithmic concept developed considering headlines national enquirer events outcomes would expressed terms prestige points crawford difficulty finding publisher balance power due small part lingering effects 1983 crash random house eventually agreed publish considerable ill crawford editor assigned prior experience video games random house ultimately cancelled contract demanded crawford return 10,000 advance payment almost causing lose home wife demanded get real job work saved friend infoworld heard troubles published two-part column game article seen producer newly formed mindscape agreed publish betas ready february 1985 polished spring summer game released september immediate sensation given world height cold war fame small part helped review new york times magazine written david l. aaron jimmy carter deputy assistant president national security affairs called close one might get cut-and-thrust international politics without going confirmation senate game immediate hit initial macintosh apple ii platforms release microsoft windows 1.0 1986 made multiplatform best seller followed versions atari st 1987 amiga among others total game sold 10 million heyday time total sales gaming hardware software combined 500 million 1986 crawford published book also called balance power details internals game great depth explains background politics formulas used calculate prestige related parameters account lengthy gestation around 2013 fulfilling 2011 promise crawford released source code several games public domain among balance power computer gaming world stated balance power stands prestigious circle innovative computer games time academy awards computer games bop would get votes best picture best director 1985 1992 survey magazine wargames modern settings gave game four stars five 1994 survey gave three stars 1996 magazine listed game game scene 11 list 15 best ways die computer gaming dragon recommended game called superb game global strategy goes beyond games wherein thoughtful calculated geopolitics could prevent worldwide nuclear war well truly entertaining thought-provoking simulation world geopolitics involves player quest prevent worldwide nuclear holocaust promoting either u.s.a. russia world prominence marvelous program everyone experience least byte praised game 1986 describing mac version best game ever seen computer ... means get program info gave amiga version four-plus stars five approving complex gameplay good user interface complaining lack sound obvious macintosh influence magazine concluded excellent game bob ewald reviewed balance power space gamer/fantasy gamer 81 ewald commented conclusion type game appeals problems worth suffering however 're hardcore wargamer n't interested diplomacy suggest pass one compute presented opposing views game may 1988 magazine included balance power list favorite games calling impressive recreation world geopolitical landscape ... call one many bluffs 'll see chilling message ignited nuclear war orson scott card however wrote review game crawford— best designer simulation games 've seen —was leaning shoulder bullying playing game way sweet delusion long united states nice n't anything offend russians go home n't play way 'll stop game nasty remark world destroyed nuclear war added since nuclear war fought crawford could know would cause one lot experts claim soviets seem behave lot nicer stand disarm crawford sure right balance power n't game propaganda 1989 compute stated 1990 edition multipolar features welcome additions game year card stated magazine 1988 list caused reevaluate game playing 1990 edition stating detailed carefully extrapolated future world 've worked still criticizing geopolitical absurdities forcing united states passively accept soviet troops syria contrary happened yom kippur war advisors mexico start nuclear war card concluded outcomes probably reflected computer limitations rather crawford political views advised players pretend balance power set alien planet astonishingly similar earth play solely based game assumptions world chuck moss disagreed card revised view describing balance power computer gaming world 1992 reflect ing extreme bias part designers called pacific treatise ... nuclear war erupted u.s. much sent five million dollars panama crawford stated 1987 proud work game feel made world better place ... think made small number people much realistic appraisal world affairs 1996 computer gaming world ranked 78th best game time calling wonderful game political intrigue felt like cold war n't require detail shadow president cyberjudas year ranked 75th top game time next generation commented although game premises hopelessly outdated u.s.s.r. disagree politics ai balance power combined unique play style make classic 2006 guardian listed first list 10 political games everyone play balance power crawford began work entirely new game released 1987 selling thousand copies mindscape disappointed pressured crawford follow-up balance power company pressed hard crawford felt owed one publishing siboot sequel released 1989 balance power 1990 edition apple iigs windows macintosh amiga atari st. crawford n't consider proper sequel saying simply tidying adding bells whistles balance power 1990 edition adds countries advisors help player new multi-polar level allows countries generate events declaring war countries 2-player hotseat mode 1992 crawford left game industry make something interactive artistic many false starts emerged erasmatron later re-released name storytron systems used make complex interactive storylines demo crawford used storytron build balance power 21st century version begins 12 september 2001 mostly involves us interactions asia emerging powers success crawford describes crap balance power basis number play mail versions manually run based moves posted internet forum systems one long-running example hosted eregime | [
6380,
4759
] | Test |
7,927 | 4 | List_of_data_breaches:list data breaches list data breaches using data compiled various sources including press reports government news releases mainstream news articles list includes involving theft compromise 30,000 records although many smaller breaches occur continually breaches large organizations number records still unknown also listed various methods used breaches also listed hacking common breaches occur north america estimated average cost data breach 150 million 2020 global annual cost forecast 2.1 trillion estimated first half 2018 alone 4.5 billion records exposed result data breaches 2019 collection 2.7 billion identity records consisting 774 million unique email addresses 21 million unique passwords posted web sale | [
860,
7101,
4000,
3486,
1805
] | Validation |
7,928 | 4 | Electromagnetic_attack:electromagnetic attack cryptography electromagnetic attacks side-channel attacks performed measuring electromagnetic radiation emitted device performing signal analysis attacks specific type sometimes referred van eck phreaking intention capture encryption keys electromagnetic attacks typically non-invasive passive meaning attacks able performed observing normal functioning target device without causing physical damage however attacker may get better signal less noise depackaging chip collecting signal closer source attacks successful cryptographic implementations perform different operations based data currently processed square-and-multiply implementation rsa different operations emit different amounts radiation electromagnetic trace encryption may show exact operations performed allowing attacker retrieve full partial private keys like many side-channel attacks electromagnetic attacks dependent specific implementation cryptographic protocol algorithm electromagnetic attacks often done conjunction side-channel attacks like power analysis attacks electronic devices emit electromagnetic radiation every wire carries current creates magnetic field electronic devices create small magnetic fields use magnetic fields unintentionally reveal information operation device properly designed electronic devices affected phenomenon term ‘ device ’ refer anything desktop computer mobile phone smart card electromagnetic waves type wave originate charged particles characterized varying wavelength categorized along electromagnetic spectrum device uses electricity emit electromagnetic radiation due magnetic field created charged particles moving along medium example radio waves emitted electricity moving along radio transmitter even satellite case electromagnetic side-channel attacks attackers often looking electromagnetic radiation emitted computing devices made circuits electronic circuits consist semiconducting materials upon billions transistors placed computer performs computations encryption electricity running transistors create magnetic field electromagnetic waves emitted electromagnetic waves captured using induction coil analog digital converter sample waves given clock rate convert trace digital signal processed computer electronic device performing computations synced clock running frequencies order mega-hertz mhz giga-hertz ghz however due hardware pipelining complexity instructions operations take multiple clock cycles complete therefore always necessary sample signal high clock rate often possible get information operations sampling order kilo-hertz khz different devices leak information different frequencies example intel atom processor leak keys rsa aes encryption frequencies 50 mhz 85 mhz android version 4.4 bouncy castle library implementation ecdsa vulnerable key extraction side channel attacks around 50 khz range every operation performed computer emits electromagnetic radiation different operations emit radiation different frequencies electromagnetic side-channel attacks attacker interested frequencies encryption occurring signal processing responsible isolating frequencies vast multitude extraneous radiation noise isolate certain frequencies bandpass filter blocks frequencies outside given range must applied electromagnetic trace sometimes attacker know frequencies encryption performed case trace represented spectrogram help determine frequencies prevalent different points execution depending device attacked level noise several filters may need applied electromagnetic attacks broadly separated simple electromagnetic analysis sema attacks differential electromagnetic analysis dema attacks simple electromagnetic analysis sema attacks attacker deduces key directly observing trace effective asymmetric cryptography implementations typically traces needed though attacker needs strong understanding cryptographic device implementation cryptographic algorithm implementation vulnerable sema attacks perform different operation depending whether bit key 0 1 use different amounts power and/or different chip components method prevalent many different types side-channel attacks particular power analysis attacks thus attacker observe entire computation encryption deduce key example common attack asymmetric rsa relies fact encryption steps rely value key bits every bit processed square operation multiplication operation bit equal 1 attacker clear trace deduce key simply observing multiplication operations performed cases simple electromagnetic analysis possible provide enough information differential electromagnetic analysis dema attacks complex effective symmetric cryptography implementation sema attacks additionally unlike sema dema attacks require much knowledge device attacked fact circuits emit high-frequency signals may leak secret information known since 1982 nsa classified 2000 right around time first electromagnetic attack encryption shown researchers since many complex attacks introduced smart cards often colloquially referred “ chip cards ” designed provide secure financial transaction traditional credit card contain simple embedded integrated circuits designed performed cryptographic functions connect directly card reader provides power necessary perform encrypted financial transaction many side-channel attacks shown effective smart cards obtain power supply clock directly card reader tampering card reader simple collect traces perform side-channel attacks works however also shown smart cards vulnerable electromagnetic attacks well field-programmable gate arrays fpga commonly used implement cryptographic primitives hardware increase speed hardware implementations vulnerable software based primitives 2005 implementation elliptic curve encryption shown vulnerable sema dema attacks aria block cipher common primitive implemented fpgas shown leak keys contrast smart cards simple devices performing single function personal computers many things thus much difficult perform electromagnetic side-channel attacks due high levels noise fast clock rates despite issues researchers 2015 2016 showed attacks laptop using near-field magnetic probe resulting signal observed seconds filtered amplified digitized offline key extraction attacks require expensive lab-grade equipment require attacker extremely close victim computer however researchers able show attacks using cheaper hardware distances half meter attacks however required collection traces expensive attacks smartphones particular interest electromagnetic side-channel attacks since advent mobile phone payment systems apple pay e-commerce systems become increasingly commonplace likewise amount research dedicated mobile phone security side channel attacks also increased currently attacks proofs concept use expensive lab-grade signal processing equipment one attacks demonstrated commercial radio receiver could detect mobile phone leakage three meters away however attacks using low-end consumer grade equipment also shown successful using external usb sound card induction coil salvaged wireless charging pad researchers able extract user signing key android openssl apple commoncrypto implementations ecdsa widely used theoretical encryption schemes mathematically secure yet type security consider physical implementations thus necessarily protect side-channel attacks therefore vulnerability lies code specific implementation shown insecure luckily many vulnerabilities shown since patched vulnerable implementations include definitely limited following attacks described thus far mainly focused use induction detect unintended radiation however use far-field communication technologies like radios also used side-channel attacks although key extraction methods far-field signal analysis demonstrated therefore rough characterization potential adversaries using attack range highly educated individuals low medium funded cartels following demonstrates possible scenarios point sale systems accept payment mobile phones smart cards vulnerable induction coils hidden systems record financial transactions smart cards mobile phone payments keys extracted malicious attacker could forge card make fraudulent charges private key belgarric et al propose scenario mobile payments performed bitcoin transactions since android implementation bitcoin client uses ecdsa signing key extracted point sale types attacks slightly complex magnetic card stripe skimmers currently used traditional magnetic strip cards many public venues starbucks locations already offering free public wireless charging pads previously shown coils used wireless charging used detection unintended radiation therefore charging pads pose potential hazard malicious charging pads might attempt extract keys addition charging user ’ phone coupled packet sniffing capabilities public wi-fi networks keys extracted could used perform man-in-the-middle attacks users far-field attacks discovered attacker needs point antenna victim perform attacks victim need actively charging phone one public pads several countermeasures electromagnetic attacks proposed though one perfect solution many following countermeasures make electromagnetic attacks harder impossible one effective ways prevent electromagnetic attacks make difficult attacker collect electromagnetic signal physical level broadly hardware designer could design encryption hardware reduce signal strength protect chip circuit wire shielding faraday cage effective reducing signal well filtering signal introducing extraneous noise mask signal additionally electromagnetic attacks require attacking equipment close target distance effective countermeasure circuit designers also use certain glues design components order make difficult impossible depackage chip without destroying many electromagnetic attacks especially sema attacks rely asymmetric implementations cryptographic algorithms effective countermeasure ensure given operation performed given step algorithm gives information value bit randomization order bit encryption process interrupts clock cycle randomization effective ways make attacks difficult classified national security agency program tempest focuses spying systems observing electromagnetic radiation securing equipment protect attacks federal communications commission outlines rules regulating unintended emissions electronic devices part 15 code federal regulations title 47 fcc provide certification devices produce excess emissions instead relies self-verification procedure | [
1811,
4930,
464,
807,
3100,
119,
2566,
7548,
6637,
740,
744,
6647,
7200,
4805,
5765,
6657,
1587,
5333,
6763,
161,
433,
1320,
613,
1146,
4917,
3426
] | Test |
7,929 | 8 | Telemetry_(company):telemetry company telemetry independent online advertising security optimization firm offices london new york city january 2017 telemetry shut amid declining revenues telemetry founded 2009 anthony rushton russell irwin beau chesluk three began collaborating 2001 created branded online video games name jaildog launched online tv station wedigtv 2007 winning 2008 international interactive emmy award best international interactive tv network order get telemetry ground rushton irwin chesluk invested £10,000 money within two years launch company valued £175 million telemetry system initially developed exclusively video embedding code online video record click-through mouse activity real-time 2012 company expanded display forms online advertising january 2017 telemetry shut amid declining revenues telemetry private company working independently online digital video advertisers agencies provide impartial detailed analytics auditing real time company tracks efficiency exposure gained online digital advertising campaigns order ensure accountability determine true value campaign exposing inflated reach impressions investigates whether ads delivered suitable website desired market alongside intended type content previously advertisers rely biased analytics vender essentially reporting traditional ad server statistics designed track online digital video advertising campaigns telemetry advised programmatic buying ads bought sold per-impression basis ways impressions counted set price misleading ads purchased pre-roll sometimes placed instead banner video ads typically muted viewer still counted pre-roll impressions telemetry encourages advertisers diligent demanding details placement quality ensure ads running proper space proper time impressions trading genuine impressions telemetry occasionally facing criticism bypassing media agencies selling digital ad space working advertisers directly according 2014 estimates interactive advertising bureau approximately 36 reported web traffic considered fake corresponding amount fake ad views due hijacked computers programmed visit sites cheating advertisers pay based number times ad loaded response visit telemetry exposed large frauds perpetrated online advertising landscape 2014 investigation verizon wireless online video advertising purchases finding excess 1 million spent fake web views telemetry advice verizon eighth-largest advertiser us demanded make-goods later 2014 telemetry investigated mercedes-benz online advertising campaign detecting suspicious traffic activity finding 57 campaign viewed often automated computer programs human beings mercedes refunded false impressions telemetry also brought public attention scheme ads forcefully injected onto popular sites including walmart.com youtube others third-party sellers without site owners knowledge profits going third party june 2014 telemetry uncovered ad fraud scheme going several months websites running lucrative video ads placed banner ads cheaper websites behind operation skimming around 10 million video ad revenue per month scheme affected 75 advertisers including mcdonald coca-cola ford rushton called significant instance ad fraud telemetry seen telemetry publicly called companies name unethically monetizing digital ads without site owner permission manipulating impressions often generating negative user experience telemetry clients include reckitt benckiser anheuser-busch unilever verizon wireless l'oreal mercedes-benz | [] | Validation |
7,930 | 7 | Globus_Toolkit:globus toolkit globus toolkit open-source toolkit grid computing developed provided globus alliance 25 may 2017 announced open source support project would discontinued january 2018 due lack financial support work globus service continues available research community freemium approach designed sustain software features freely available restricted subscribers globus toolkit contains set libraries programs provides developers specific tools apps solutions common problems encountered creating distributed system services applications globus software components capabilities includes globus toolkit adheres provides implementations following standards globus toolkit implementations ogf-defined protocols provide following globus toolkit components supported ogf-defined saga c++/python api number tools function globus toolkit including xml-based web services offer way access diverse services applications distributed environment 2004 univa corporation began providing commercial support globus toolkit using business model similar red hat gram grid resource allocation manager component globus toolkit officially supports following job schedulers batch-queuing systems unofficial job schedulers used globus toolkit globus alliance announced release globus toolkit version 5 gt5 late 2009 major change abandoning gram4 although continuing support least december 2010 favor enhanced gram2 called gram5 solve scalability issues add features reliable file transfer rft service replaced new globus.org service globus.org online hosted service i.e. software-as-a-service provides higher-level end-to-end grid capabilities initially concentrating reliable high-performance fire-and-forget data transfer retain web-service functionality without technology standards considered obsolete new project called globus crux started expects release alpha version end 2009 monitoring discovery tasks currently performed mds taken new crux-based integrated information services iis releases iis planned sometime 2010 release gt 5.0.2 announced 19 july 2010 gt 5.0.3 reported due release february 2011 | [
6690,
5631,
8160,
1256,
6887,
1923,
3947,
900,
7712,
110,
3783,
5571,
578,
4159,
138,
1293,
1494,
1405,
1678,
1878,
5604,
2962,
72,
4905,
6586,
2441,
5710,
6068,
5539
] | Test |
7,931 | 8 | Apache_FreeMarker:apache freemarker freemarker free java-based template engine originally focusing dynamic web page generation mvc software architecture however general purpose template engine dependency servlets http html thus often used generating source code configuration files e-mails freemarker somewhat hectic history 2004 caused paradigm shifts significant changes multiple occasions freemarker 1 known freemarker classic separate project originally written benjamin geer mike bayer 2002 new project lead jonathan revusky released freemarker 2 started sequence several substantial changes main goal changes make template language strict i.e. detect many typos typical mistakes possible also automatic object wrapping introduced along gradual advancement type system template language language gained many power-user features powerful macro programming capabilities namespaces language reached quite settled state version 2.3 released 2004 q3 2016 product remained backward compatible significant backward incompatible changes expected freemarker 2 series future late 2015 freemarker granted apache software foundation entered apache incubator 2018-03-21 become fully accepted apache project following template processed freemarker produce something like variables like name messages coming outside template thus template author deal presentation issues template remains regardless variables coming database cookie calculated whatever ways also exact java api hence class values hidden freemarker using technique called object wrapping example messages seems list array javabeans body properties might well something different template affected long proper object wrapper used | [
865,
3915,
5571,
6681
] | Validation |
7,932 | 5 | SDXF:sdxf sdxf structured data exchange format data serialization format defined rfc 3072 allows arbitrary structured data different types assembled one file exchanging arbitrary computers ability arbitrarily serialize data self-describing format reminiscent xml sdxf text format xml — sdxf compatible text editors maximal length datum composite well elementary encoded using sdxf 16777215 bytes one less 16 mib sdxf data express arbitrary levels structural depth data elements self-documenting meaning metadata numeric character string structure encoded data elements design format simple transparent computer programs access sdxf data help well-defined functions exempting programmers learning precise data layout word exchange name reflects another kind transparency sdxf functions provide computer architecture independent conversion data serializations exchanged among computers via direct network file transfer cd without measures sdxf functions receiving side handle architectural adaptation structured data data patterns predictable complex strings text commercial example two companies want exchange digital invoices invoices following hierarchical nested structure basic element chunk sdxf serialization chunk chunk consist set smaller chunks chunks composed header prefix six bytes followed data header contains chunk identifier 2-byte binary number chunk_id chunk length type may contain additional information compression encryption chunk type indicates whether data consists text string characters binary number integer floating point chunk composite chunks structured chunks enable programmer pack hierarchical constructions invoice sdxf structure follow every named term invoice invoice_no date address_sender etc given unique number range 1 65535 2 byte unsigned binary integer without sign top/outermost chunk constructed id invoice means associated numerical chunk_id structured chunk level 1 invoice chunk filled chunks level 2 beyond invoice_no date address_sender address_recipient invoice_sum single_items conditions level 2 chunks structured turn two addresses single_items precise description see page 2 rfc alternatively sdxf allows programmer work sdxf structures compact function set following pseudocode creates invoices pseudocode extract invoice structure could look like sdxf designed readability modified text editors related editable structure sdef | [
7916,
7896,
8174
] | Validation |
7,933 | 9 | List_of_PHP_editors:list php editors article contains list text editors features specific php scripting language | [
1155,
2451,
4296,
4759,
6701,
4315,
1737,
3368,
1643,
3463,
578,
6367,
6029,
933,
1128,
7214,
7303,
5433,
5965,
4998,
7943,
5092
] | Validation |
7,934 | 7 | Vine_Toolkit:vine toolkit vine toolkit open source software framework used create grid-aware web applications according vine toolkit web site vine modular extensible java library offers developers easy-to-use high-level application programmer interface api grid-enabling applications vine deployed use desktop java web start java servlet java portlet environments ease according vine toolkit project page vine case used basic form without additional plugins could perceived mvc framework one key concepts vine plug-in based structure vine toolkit consists core project defines base api programming model upon sub projects built sub project addresses particular problem area like grid vine build upon core vine define general concepts extensible elements others like globus toolkit 4 vine concerned adding support particular third party libraries services project conforms particular file structure defines source code built well third party libraries configuration files packaged deployed since vine java flex based framework works major platforms including windows unix mac os top vine offers several deployment scenarios | [
4159,
6986,
3915,
5571,
5666
] | Validation |
7,935 | 1 | Journal_of_Database_Management:journal database management journal database management quarterly peer-reviewed academic journal covering database management established 1990 published igi global editor-in-chief keng siau missouri university science technology journal abstracted indexed according journal citation reports journal 2015 impact factor 0.120 | [
6015,
2054
] | Test |
7,936 | 9 | Late_binding:late binding late binding dynamic binding dynamic linkage computer programming mechanism method called upon object function called arguments looked name runtime early binding static binding object-oriented language compilation phase fixes types variables expressions usually stored compiled program offset virtual method table v-table efficient late binding compiler read enough information verify method exists bind slot v-table instead method looked name runtime primary advantage using late binding component object model com programming require compiler reference libraries contain object compile time makes compilation process resistant version conflicts class v-table may accidentally modified concern jit-compiled platforms .net java v-table created runtime virtual machine libraries loaded running application term late binding dates back least 1960s found communications acm term widely used describe calling conventions languages like lisp though usually negative connotations performance 1980s smalltalk popularized object-oriented programming oop late binding alan kay said oop means messaging local retention protection hiding state-process extreme late-binding things done smalltalk lisp possibly systems possible 'm aware early mid-1990s microsoft heavily promoted com standard binary interface different oop programming languages com programming equally promoted early late binding many languages supporting syntax level 2000 alex martelli coined term duck typing refer similar concept different emphasis late binding generally focuses implementation details duck typing focuses ability ignore types concentrate methods object currently dynamically-typed languages list methods object altered runtime requires late binding lisp late bound global function calls efficiently looked runtime via symbol function cell function bindings mutable example using interactive clozure common lisp session c++ late binding also called dynamic binding refers normally happens codice_1 keyword used method declaration c++ creates so-called virtual table look-up table functions always consulted called usually late binding term used favor dynamic dispatch com programming late-bound method call performed using idispatch interface com-based languages visual basic 6 syntactical support calling interface done defining variable type object others c++ require explicitly call getidsofnames look method invoke call .net late binding refers overriding codice_1 method like c++ implementing interface compiler builds virtual tables every virtual interface method call used run-time determine implementation execute also like com java common language runtime provides reflection apis make late binding calls use calls varies language c 4 language also added dynamic pseudo-type would used place object type indicate late binding desired specific late binding mechanism needed determined runtime using dynamic language runtime starting point visual basic uses whenever variable type object compiler directive option strict force default setting new vb project prior version 9 .net com objects could late bound vb 10 extended dlr-based objects three definitions late binding java early documents java discussed classes linked together compile time types statically checked compile time different implementations classes could swapped prior runtime simply overwriting class file long new class definition class method names code would still work sense similar traditional definition late binding currently popular use term late binding java programming synonym dynamic dispatch specifically refers java single dispatch mechanism used virtual methods finally java use late binding using reflection apis type introspection much way done com .net programming generally speaking program java call late binding likewise use duck typing techniques frowned upon java programming abstract interfaces used instead oracle current owner java known use term late binding duck typing sense discussing java languages documentation using early binding ada database-stored procedure timestamp checked verify stored procedure changed since code compiled allows faster executions prevents application running wrong version stored procedure using late binding timestamp check performed stored procedure executed via anonymous pl/sql block slower removes need recompile client applications stored procedure changes distinction appears unique pl/sql ada languages call pl/sql procedures well database engines use late binding late binding poorer performance early bound method call implementations correct method address must looked name call requiring relatively expensive dictionary search possibly overload resolution logic yet generally negligible modern computers compilers late binding may prevent use static type checking making late bound call compiler assume method exists means simple spelling error cause run-time error thrown exact exception varies language usually named something like method found method missing modern compilers avoid ensuring every possible call must implementation compilation late binding may prevent forms static analysis needed integrated development environment ide example ide go definition feature may function late-bound call ide way know class call may refer modern ide easily solves especially object-oriented languages since late-bound method always specifies interface base class go definition leads find references used find implementations overrides similar problem possible lack typing information may prevent creation dependency graphs however programming methods abstract interfaces result problems modern ide create dependency graphs easily handles find references | [
6886,
6614,
6980,
6982,
6002,
8097,
7096,
7481,
4541,
4543,
5608,
4905,
5965,
1989,
5091,
360
] | Test |
7,937 | 1 | Negative_database:negative database database security negative database database saves attributes associated certain entry negative database kind database contains huge amount data consisting simulating data anyone tries get access databases actual negative data sets retrieved even steal entire database example instead storing personal details store personal details members n't negative databases avoid inappropriate queries inferences also support allowable operations scenario desirable database support allowable queries protecting privacy individual records say inspection insider collection negative data referred negative sousveillance | [
1905,
6604,
7330,
7341,
6345,
5561,
906,
5217,
6098,
4054,
6636,
2663,
2124,
6737,
6739,
3119,
3801,
7999,
5943,
2054,
6932,
6386,
684,
6390,
7303,
6144,
4457,
6320,
1902,
6594
] | Test |
7,938 | 4 | XARA:xara xara acronym unauthorized cross-app resource access describes category zero-day vulnerabilities computer software systems academic research paper entitled unauthorized cross-app resource access mac os x ios published 26 may 2015 team researchers indiana university tsinghua university peking university chinese academy sciences georgia institute technology paper widely released public 16 june 2015 paper identifies number separate categories zero day threats applications stored passwords potentially exploited malware ios devices os x paper also discloses existence similar vulnerabilities android devices xara attack vector violates principles computer security sandbox | [
6312,
2791,
7963,
3495
] | Test |
7,939 | 4 | Backup_and_disaster_recovery_appliance:backup disaster recovery appliance backup disaster recovery appliance also bdr appliance bdr specialized backup appliance includes backup software backup storage hypervisor support local disaster recovery appliance | [
6289,
2390
] | Validation |
7,940 | 3 | Model_Driven_Interoperability:model driven interoperability model driven interoperability mdi methodological framework provides conceptual technical support make interoperable enterprises using ontologies semantic annotations following model driven development mdd principles initial idea works mdi application model-driven methods techniques solving interoperability problems business level data level three main ideas model driven interoperability mdi approach mdi initiated 2004 beginning two important research projects projects supported european commission two projects worked definition methodological framework application mdi concrete cases mdi framework within interop defined reference model proposed mdi approach shows different kinds models possible perform different levels abstraction successive model transformations needed carry different levels abstraction needed order make possible model transformations reducing gap existing enterprise models code level definition several levels based model driven architecture mda defines three levels abstraction cim pim psm moreover introduced partition cim level two sub-levels order reduce gap cim pim levels interoperability model also defined different levels abstraction proposed one example reference model mdi see next figure picture shows proposed levels different kind models performed grai top cim level uml levels final objective making interoperable two esa franchisor erp franchisee crm model driven interoperability method mdi method model-driven method used two enterprises need interoperate code level also enterprise modelling level ontological support final aim improving performances mdi method proposed solve interoperability problems like name indicates based mda approach also following principles applied definition method next picture show main features mdi method green areas give estimated effort related phase workflow mdi framework athena provides guidance mdd applied address interoperability framework structured three main integration areas reference model conceptual integration developed mdd point view focusing enterprise applications software system according mda computation independent model cim corresponds view defined computation independent viewpoint describes business context business requirements software system platform independent model pim corresponds view defined platform independent viewpoint describes software specifications independent execution platforms platform specific model psm corresponds view defined platform specific viewpoint describes realisation software systems technical integration reference model promotes use service-oriented solutions software system generally system provide set services required businesses users enterprise reference model applicative integration developed order emphasise dependencies different models views achieve interoperability model transformation one key approaches used support mdi method approach used horizontal vertical dimension reference model mdi model transformations performed based generic transformation architecture following services verification consistency models support automatic mapping discovery among heterogeneous models definition semantic preserving transformation support mdi tackle vertical horizontal issues vertical issues semantic support aiming horizontal issues semantic support aiming | [
2087,
3513,
3237
] | Test |
7,941 | 1 | ENI_number:eni number eni number european number identification european vessel identification number registration ships capable navigating inland european waters unique eight-digit identifier attached hull entire lifetime independent vessel current name flag eni introduced inland transport committee united nations economic commission europe meeting 11–13 october 2006 geneva based rhine vessel certification system previously used ships navigating rhine comparable imo ship identification number eni number consists eight arabic numerals first three digits identify competent authority number assigned see list prefixes last five digits serial number ships vessel number accordance rhine inspection rules receive eni beginning 0 followed seven digit rhine number vessel issued imo number may receive eni number appropriate certifications inland water travel eni begin 9 followed seven digit imo number eni number transmitted inland-automatic identification system transponders european vessels required carry eni number april 2007 vessel must eni operates inland waterways meets following criteria length greater volume tug push boat operates qualifying vessel passenger ship floating installation/equipment vessel issued eni number must displayed sides stern vessel | [
477,
3116
] | Validation |
7,942 | 9 | Installer_(programming_language):installer programming language installer scripting language developed commodore international amigaos first released version 2.1 1992 grammar based lisp programming language compatible re-implementation named installerlg actively developed october 2018 example developer guide n't want write scripts line line may use installergen tool | [
97,
3688,
1534,
6431,
6009,
307,
5833,
5661,
4244,
7746,
7384,
1214,
594,
3222,
3042,
4354,
4543,
4006,
7775
] | Test |
7,943 | 8 | CodeCharge_Studio:codecharge studio codecharge studio rapid application development rad integrated development environment ide creating database-driven web applications code generator templating engine separates presentation layer coding layer aim allowing designers programmers work cohesively web application model-view-controller design pattern codecharge first product released yes software inc. two years development codecharge utilizes point-and-click wizards creating record search forms grids editable grids without need programming databases supports include mysql ms sql server ms access postgresql oracle well database supports web connectivity codecharge export code major programing languages asp.net asp java coldfusion php perl codecharge employs interactive user interface ui designed creation web applications generating code codecharge automatically structures code using naming conventions comments describe code purpose moreover codecharge keeps application separate code generates projects may converted language time without additional programming codecharge-generated project routed web site everything routed example index.asp rather every page accessible reference name url listed technologies used application ready running application uses microsoft .net 2 framework also install .net 3.5 framework detected host computer 2003 regarding original version codecharge studio arbi arzoumani php architect wrote kevin yank sitepoint tech times impressed many ways experienced developers could draw added power software instead limited case rad tools web development review codecharge studio 2.0 troy dreier wrote intranet journal codecharge studio allows web application developers shave literally months development times codecharge studio 3.0 received rating 3.5 5 peter b. macintyre php|architect | [
6029,
5983,
4759,
5571,
3543,
7933
] | Validation |
7,944 | 3 | Mr._Do!:mr. object mr score many points possible digging tunnels ground collecting cherries title character mr. circus clown—except original japanese version game snowman constantly chased red monsters called creeps player loses life mr. caught one game last life lost cherries distributed throughout level groups eight 500 bonus points awarded mr. collects eight cherries row without stopping level complete either cherries removed creeps destroyed extra spelled diamond found mr. defeat creeps hitting bouncing power ball dropping large apples power ball bouncing toward creep mr. defenseless ball bounces area creeps hit behind fallen apple mr. use retrieved power ball hits creep reforms mr. hands delay increases use mr. creeps push apple edge vertical tunnel crush one creeps apple falls height breaks disappears mr. also crushed falling apple causing loss life occasionally creeps transform briefly powerful multicolored monsters tunnel ground one digs cherry leaves fewer cherries fewer points mr. collect digs apple often crushes creeps and/or mr. time score passes certain threshold play 5000 points letter word extra appears playfield alphamonster player defeat defeated monster way creep defeating alphamonster awards letter player collecting five letters word completes level goes cut scene playing theme astro boy awards player extra life alphamonsters attempt eat apples encounter makes difficult impossible crush creeps spawn center screen appeared generator turn food item picking scores bonus points freezes creeps calls alphamonster three large blue monsters latter eat apples well creeps stay frozen still deadly player either defeats three blue monsters defeats alphamonster case remaining blue monsters turned apples loses life completes stage rarely dropping apple reveal diamond collected within 15 seconds completes level awards bonus credit player well 8000 points allowing play free game feature relatively uncommon among arcade video games though standard feature many pinball machines mr ported atari 2600 atari 8-bit computers colecovision apple ii msx tomy tutor commodore 64 handheld lcd version released tomy 1983 colecovision adaptation alphamonster sidekicks unable eat apples making easier crush blue monsters eat shrubbery cherries also alphamonster letter already acquired dinosaur monsters freeze seconds release famicom tsūshin awarded super famicom version game 25 40 four reviewers electronic gaming monthly gave 4.875 10 dan hsu felt mr fun gameplay criticized lack enhancements decade old game recommended players get released significantly less normal retail price snes cartridge later feature 16-bit games reported contrary hopes game priced 50 mr followed three sequels mr. castle 1983 also known mr. vs. unicorns mr. wild ride run run 1984 expanded 99-level version mr developed arcades electrocoin 1989 mr adapted nintendo game boy super famicom/snes providing new gameplay features rebranded adaptation game released game boy color 1999 titled quest fantasy challenge holy magic century europe developed imagineer published sunsoft north america virgin interactive europe branded quest series game instead mr arcade version debuted wii virtual console japan april 27 2010.virtual console releases april 2010 | [
1387,
1237,
6343,
5686
] | Test |
7,945 | 7 | Visual_Risk:visual risk visual risk treasury management software provider consulting company headquartered sydney australia visual risk part gtreasury software services gtreasury name company provides treasury risk management software specializes market risk management visual risk one australia original fintech companies company treasury software provider visual risk founded richard hughes paul nailand headquartered sydney richard hughes paul nailand currently serve managing directors visual risk december 2015 visual risk best risk management solution treasury management international 2015 awards awards considered benchmark industry april 2018 gtreasury acquired visual risk integrated visual risk risk management software offering bolster existing treasury cash management tool visual risk modular treasury risk management system consists five modules risk analytics asset-liability management treasury management hedge accounting cash liquidity modular system used separately fully integrated system addition visual risk provides reporting dashboard software deployed either locally via cloud 2014 visual risk partnered kpmg australia visual risk analyze kpmg hedging transactions client exposures | [
2961
] | Test |
7,946 | 4 | Intrusion_tolerance:intrusion tolerance intrusion tolerance fault-tolerant design approach defending information systems malicious attack abandoning conventional aim preventing intrusions intrusion tolerance instead calls triggering mechanisms prevent intrusions leading system security failure | [] | Train |
7,947 | 3 | Contra_(video_game):contra video game according japanese promotional materials contra set distant future year 2633 a.d. evil red falcon organization set base fictional galuga archipelago near new zealand plot wipe humanity two commandos bill rizer lance bean earth marine corp contra unit elite group soldiers specializing guerrilla warfare sent island destroy enemy forces uncover true nature alien entity controlling promotional materials us arcade version downplays futuristic setting game manual later nes home computer versions changing game setting future present day location galuga amazon jungle contra employs variety playing perspectives include standard side view pseudo-3d view player proceeds shooting moving towards background addition left right fixed screen format player gun aimed upwards default two people play simultaneously one player bill blond-haired commando white tank top blue bandanna player lance shirtless dark-haired commando red bandanna controls consists eight-way joystick two action buttons shooting left jumping right one protagonists jumps curls somersault instead conventional jump like games joystick controls player movement walking jumping also aiming side view stages player shoot leftward rightward upward standing well horizontally diagonally running player also shoot eight directions including downwards jumping pressing joystick downwards standing cause character lie stomach allowing avoid enemy fire shoot low targets jump button pressed crouching higher platform player drop lower level player default weapon rifle unlimited ammunition upgraded one four guns obtained destroying pill box sensors flying item capsules containing defeating red-clad guards enemy bases consist machine gun fires rapidly fire button held laser gun shoots powerful beam fireball gun shoots rounds corkscrew pattern spread gun shoots five individual bullets individual directions also two auxiliary power-ups appear certain areas player armed default gun rapid bullets upgrade increases firing speed player shots barrier makes invulnerable limited period exception machine gun laser gun item comes form falcon-shaped symbol marked letter representing function f r b arcade version contra consists seven stages number stages level structures varies later versions first stage side-scrolling level player dropped jungle must fend enemy initial line defense reaching entrance first base must destroy large sensor enter base game switches 3d view second stage player character must fight way series passageways inside base time runs display top screen shows map base time remaining player must destroy generator side passageway order deactivate electric current preventing access third stage set core base fixed screen player must destroy enemy defense system order expose final target giant eyeball shoots fireballs stages 4 6 proceed similarly first three stages stage 4 vertical-scrolling level player must jump way top waterfall reaching entrance second base player must destroy large diamond-shaped sensor guarded defense system order clear stage stage 5 another 3d stage set inside another base stage 6 another boss battle time pair heads split two images heads damaged split images aligned together seventh final stage returns side-scrolling format first stage player fights way enemy final line defense includes hovercraft armored trucks giant helmeted soldiers proceeding areas snowfield energy plant hangar reaching alien lair regular enemy soldiers replaced otherworldly creatures player must fight giant alien head spawns larvae mouth reaching final target heart-like creature must destroyed order complete mission player loses life character bill lance gets touched enemy enemy bullet fails complete base stage time limit falls bottom screen visible platform happens revert default weapon next life losing lives player continue inserting coins necessary pressing start three times second player join-in anytime one player loses lives must wait player loses lives well continue together arcade game released three versions japanese american versions virtually identical aside japanese version using kanji characters spell game title however european version titled gryzor allows two players play game alternating rather simultaneously license konami ocean software produced ports contra title gryzor zx spectrum commodore 64 amstrad cpc released europe 1988 commodore 64 version released north america contra title ocean ports patterned original arcade version game ibm pc version developed banana development inc released north america version released europe gryzor name cover illustration ocean gryzor ports bob wakelin inspired different poses actor arnold schwarzenegger film predator illustration later used packaging nes version well msx2 version contra released nintendo entertainment system north america february 1988 version produced in-house konami features several differences arcade release order better suit nes hardware example sprites effects like explosions shown 30fps instead 60fps work around sprite limitations system another game use technique recca famicom version contains cutscenes additional music track environment effects removed nes version game played one two players due graphical limitations nes bill lance lost individualized character designs instead depicted shirtless commandos distinguished colors pants blue pants first player red pants second one player loses lives given option use player stock keep fighting power-up icons machine gun laser gun also changed represented letter-based falcon symbols l used weapons rapid bullets barrier power-ups also common version since unlike arcade game flying item capsules appear regardless weapon player character currently posseses nes version introduces seventh item clears screen on-screen enemies obtained nes version recomposes 7 stages arcade version 8 stages stages 2 3 combined one stage resulting renumbering waterfall level stage 4 stage 3 stages 5 6 combined new stage 4 final four stages nes version snowfield energy zone hangar alien lair based different areas featured arcade version final stage level designs drastically different arcade version two base stages example stage 2 4 longer maze-like structures time limit involved boss waterfall stage also changed diamond-shaped sensor alien statue contra one early nes games feature konami code inputting code title screen starts player thirty lives instead usual three cheat effect well player runs lives uses continue retry stage contra released famicom japan february 9 1988 gameplay remains identical nes version released around month famicom version custom-made multi-memory controller konami produced called vrc2 contrast unrom board used nes counterpart allowed inclusion cut-scenes graphical effects possible nes version game begins prologue sequence explaining game backstory followed map galuga archipelago shown start every stage indicate player progress cut-scenes also shown stages depicting bill lance giving status report current situation headquarters later stages shooting gun towards screen ending sequence also slightly different player holds select start buttons credits sequence secret message displayed konami logo differences include addition sound test mode added background animations certain stages windblown palm leaves stage 1 snowstorm stage 5 different stage clear jingle player clears final stage level select cheat code probotector modified version nes contra released pal region december 28 1990 version redesigns human protagonists enemy characters give robotic appearance done circumvent bpjm censorship laws germany prohibits sales violent video games minors subsequent contra games home consoles followed suit released pal region probotector title featuring similar modifications beginning konami abandoned probotector title localized games minimal changes msx2 version contra released konami exclusively japan may 26 1989 msx2 version greatly differs arcade nes versions due hardware limitations msx2 game scroll instead uses flip-screens like msx2 games metal gear vampire killer game uses scc sound chip rather one-hit kills energy gauge allows bill rizer take one shot hit losing life two main power-ups msx2 version falcon-shaped power-up increases player walking shooting speed well gun-shaped power-up allows player change current weapon picking weapon power-up player choose default normal gun four weapons spread gun featured version replaced rear gun similar tailgun gradius ii fires two directions time msx2 version contra composed 19 stages stages 1 6 drawn directly arcade version whereas stages 7 9 based different areas featured final stage arcade version matter similar final four stages nes version stages 10 19 new version take place primarily underground facility underneath galuga archipelago unlike arcade nes versions msx2 version single-player lance bean appear form continuation feature player loses lives game immediately however game master ii utility cartridge used save progress via s-ram backup feature much game popularity came two-player simultaneous gameplay uncommon feature video games time contra release successful arcades game became remained widely popular remembered ported nintendo entertainment system 1988 allgame editor skyler miller praised contra touting game became standard future platform shooters would judged japanese gaming magazine famitsu gave famicom nes version game score 27 40 computer gaming world called contra nes truly outstanding action epic set scrolling beautifully drawn playfield ms-dos version game reviewed 1989 dragon hartley patricia kirk lesser role computers column contra voted gaming website ign toughest game beat nintendo power ranked seventh best nes game calling one best multiplayer nes games gamesradar ranked 10th best nes game ever made considering possibly superior arcade version game informer also included list best games ever number 13 staff noted revolutionary fun 2017 contra ranked 82nd scientifically proven best video games time statistical meta-analysis compiled warp zoned 44 top games lists published 1995 2016 contra followed super contra year later contra sequel arcades developed in-house konami following success nes adaptations original sequel retitled super c american release subsequent sequels would produced specifically home console market super nes genesis becoming one konami landmark series series 11 installments music arcade version contra one soundtracks included video game album konami game music vol.4 jax released alfa records may 10 1988 cd catalog 28xa-201 cassette alc-22922 vinyl alr-22922 april 2017 beijing starlit movie tv culture announced producing live-action film version contra china wei nan listed screenwriter project scheduled release june 6 2018 meet release date | [
3858,
2520,
4759,
6380,
1237,
6151,
3113,
8015
] | Test |
7,948 | 2 | Input/Output_Supervisor_Block:input/output supervisor block input/output supervisor block iosb data structure employed exclusively start input/output interface mvs/370 successor ibm mainframe operating systems iosb describes i/o request passes parameters receives responses input/output supervisor ios iosb always paired service request block srb srb schedules processor activity required available processor connection i/o request although i/o operation may initiated another processor distinction allowed example effective use so-called attached processors processors connected i/o devices common early days mvs/370 installations requirements data processing power e.g. processor accesses also called cpu-bound applications perhaps i/o processing power e.g. disk tape accesses also called i/o-bound applications | [
8159,
7783,
5027,
5571
] | Test |
7,949 | 6 | Nasan:nasan nasan clustered file system shared disk file system created company dataplow nasan software enables high-speed access shared files located shared storage area network san -attached storage devices utilizing high-performance scalable data transfers inherent storage area networks manageability network attached storage nas nasan derives name combination network attached storage nas storage area network san nasan clustered file sharing extension traditional lan file sharing yet utilizes storage area networks data transfers deploying nasan cluster entails configuring lan file sharing installing nasan file system software connecting computers storage devices san supports linux solaris operating systems supports san-based block-level storage protocols including fibre channel iscsi | [
1624,
578,
5571
] | Test |
7,950 | 2 | Nano-RK:nano-rk nano-rk wireless sensor networking real-time operating system rtos real-time operating system rtos carnegie mellon university designed run micro-controllers use sensor networks nano-rk supports fixed-priority fully preemptive scheduler fine-grained timing primitives support real-time task sets nano implies rtos small consuming 2 kb ram using 18 kb flash rk short resource kernel resource kernel provides reservations often system resources consumed example task might allowed execute 10 ms every 150 ms cpu reservation node might allowed transmit 10 network packets per minute network reservation reservations form virtual energy budget ensure node meets designed battery lifetime well protecting failed node generating excessive network traffic nano-rk open source written c runs atmel-based firefly sensor networking platform micaz motes well msp430 processor following article discusses tradeoffs associated using rtos sensor networks nanork takes advantage priority-based preemptive scheduling help honor real-time factor deterministic thus ensuring task timeliness synchronization due characteristic limited battery power wireless node nano-rk provides cpu network sensor efficiency use virtual energy reservations labeling system resource kernel energy reservations enforce energy communication budgets minimize negative impact node ’ operational lifetime unintentional errors malicious behavior nodes within network supports packet forwarding routing network scheduling protocols help light-weight wireless networking stack compared current sensor operating systems nano-rk provides rich functionality timeliness scheduling small-footprint embedded resource kernel rk static configuration nano-rk uses static design-time approach energy usage control dynamic task creation disallowed nano-rk requiring application developers set task reservation quotas/priorities static testbed design design allows developers create energy budget task order maintain application requirements well energy efficiency throughout system ’ lifetime using static configuration approach runtime configurations well power requirements predefined verified designer system deployed executed real world approach also helps guarantee stability small-footprint characteristics compared traditional rtoss watchdog timer support watchdog software timer triggers system reset action system hangs crucial faults extended period time watchdog mechanism bring system back nonresponsive state normal operation waiting timer goes subsequently rebooting device nano-rk watchdog timer tied directly processor ’ reset signal reboot error default enabled system boots reset time scheduler executes system fails respond within predefined time period system reboot run initialization instruction sequence hopefully regain control deep sleep mode another feature nano-rk deep sleep mode energy efficiency reasons eligible tasks run system powered given option enter deep sleep mode system deep sleep mode deep sleep timer wake system predefined latency period waking deep sleep mode next context swap time set guarantee cpu wakes time sensor node wish perform deep sleep also presented choice go low energy consumption state still managing peripherals nano-rk implemented double-linked list ready queue nodes within fixed-size array termed ready queue orders ready tasks decreasing order whichever task ’ priorities higher number tasks running within nano-rk implementation statically-configured testbed deployment ready queue size also fixed number tasks ready run fixed-length array named nrk readyq found within nrk defs.h file along two pointers reference two important cells within array free node pointer free node head node pointer head node point next cell array allocated current highest priority task ready run respectively core nano-rk static preemptive real-time scheduler priority-based energy efficient priority-based preemptive scheduling scheduler always selects highest priority task ready queue save energy tasks poll resource rather tasks blocked certain events unlocked events occur task ready queue system powered save energy system working one one task current task signified nrk cur task tcb running predefined period important job scheduler decide task run next long next task run scheduler triggered run | [
7605,
7876,
5110,
6994,
5571,
1435,
4336,
224,
1484,
6918,
4890,
238,
7396,
4631,
3664,
861,
771,
7312,
2266
] | Test |
7,951 | 9 | GNU_Data_Language:gnu data language gnu data language gdl free alternative idl interactive data language together library routines gdl developed serve tool data analysis visualization disciplines astronomy geosciences medical imaging gdl licensed gpl open-source numerical data analysis tools similar gdl include gnu octave ncar command language ncl perl data language pdl r scilab scipy yorick gdl language dynamically-typed vectorized object-oriented programming capabilities gdl library routines handle numerical calculations e.g fft data visualisation signal/image processing interaction host os data input/output gdl supports several data formats netcdf hdf v4 v5 grib png tiff dicom graphical output handled x11 postscript svg z-buffer terminals last one allowing output graphics plots saved raster graphics formats gdl features integrated debugging facilities breakpoints gdl python bridge python code called gdl gdl compiled python module gdl uses eigen c++ library numerical library similar intel mkl excellent computing performance multi-cores processors better benchmark idl large matrix operations packaged versions gdl available several linux bsd flavours well mac os x source code compiles microsoft windows since gdl 0.9.3 unix systems including solaris gdl official gnu package | [
3981,
4070,
5965,
4759,
6778,
6016,
7778,
578,
5288
] | Test |
7,952 | 8 | Roxen_(web_server):roxen web server roxen free software web server produced roxen internet software company based linköping sweden named nearby lake roxen released gnu general public license roxen originally appeared spinner mid-1990s written ulpc pike heyday roxen used large companies realnetworks granada media xmission mci roxen many aspects ahead time featuring web-based graphical user interface gui administration interface loadable modules could written several languages including pike later java dynamic content generation comprehensive caching system replication systems multi-headed servers embedded sql server data-heavy server operations well broad support databases roxen built meet needs content creators rxml roxen macro language server-side scripting language integrated roxen language capabilities scripting languages like perl html-like syntax makes familiar content creators many roxen sites developed using mvc pattern notable tags include roxen modules typically provide functionality extending rxml rxml tags contain inline documentation used fill online manual included roxen documentation site every default server installation rxml also provides variable system variables exist within domain scope e.g form fields passed query accessible form.fieldname user defined variables stored var scope unfortunately attempt explain two methods variable instantiation documentation confuses people cases variables referred name also possible instantiate insert value variable anywhere in- out-side tags/markup using xml entity-style markup e.g page.path optionally one specify encoding/escaping instance e.g form.username mysql insert user-submitted value form safely sql database page.path js make variable javascript safe | [
3168,
5369,
1349,
5206,
5820,
5214,
2646,
6270,
1834,
2291,
8182,
6536,
26,
7988,
7544,
4701,
1392,
7786,
417,
3135,
2506,
1686,
3408,
4995,
1602,
6061,
7411,
2807
] | Test |
7,953 | 5 | Certificate_Management_Protocol:certificate management protocol certificate management protocol cmp internet protocol used obtaining x.509 digital certificates public key infrastructure pki described one two protocols far use certificate request message format crmf described protocol certificate management cms cmc described obsolete version cmp described respective crmf version cmp messages encoded asn.1 using der method usually transported http certificate authority ca issuing legal certificates acts server pki using cmp one clients obtaining digital certificates means protocol called end entity ee none number registration authorities ra used mediate ees ca end entity utilize cmp obtain certificates ca done initial registration/certification key pair update certificate update message sequence means revocation request also get one certificates revoked using cross-certification request ca get certificate signed another ca case end entity lost private key stored ca might recovered requesting key pair recovery several means transportation foreseen conveying cmp messages content-type used application/pkixcmp older versions draft used application/pkixcmp-poll application/x-pkixcmp application/x-pkixcmp-poll | [
363,
7637,
7567,
4693,
5573,
6908,
2057,
3819,
3383,
38
] | Test |
7,954 | 2 | Hyperbola_GNU/Linux-libre:hyperbola gnu/linux-libre hyperbola gnu/linux-libre operating system i686 x86-64 architectures based arch snapshots debian development includes gnu operating system components linux-libre kernel instead generic linux kernel hyperbola gnu/linux-libre listed free software foundation completely free operating system true free system distribution guidelines hyperbola born 17th annual fórum internacional software livre porto alegre brazil 5 august 2017 support systemd dropped favor openrc default init system support init freedom campaign begun devuan 6 december 2018 hyperbola first brazilian distribution recognized completely free project gnu making part fsf list free distributions hyperbola established social contract hyperbola social contract commits project free software community free culture privacy stability follow arch-based system packaging yet principles stability development maintenance debian covenant included gnu free system distribution guidelines hyperbola established packaging guidelines hyperbola packaging guidelines contain collection common issues severity placed development backporting package releases debian patches hyperbola aliases stable releases using galaxy names codenames chosen list nearest known galaxies milky way ascending order distance stable version hyperbola gets released approximately every three years point releases available every months hyperbola release receive two years extra security updates end life eol however point releases made hyperbola release receive five years security support total two ways install hyperbola gnu/linux-libre either scratch using live images migrating existing arch-based system | [
2179,
2187,
2909,
5724,
6086,
7894,
2559,
2935,
6453,
2585,
2228,
1487,
58,
3996,
7587,
4008,
1893,
1523,
1909,
6884,
7969,
6175,
7251,
4400,
7253,
3696,
474,
1179,
7635,
6902,
2297,
1941,
3023,
6549,
1960,
6209,
2680,
4435,
5163,
8019,
... | Test |
7,955 | 7 | Jira_Studio:jira studio jira studio integrated hosted software development suite developed atlassian software systems jira studio included subversion revision control jira issue tracking bug tracking confluence content management jira agile previously known greenhopper agile planning management bamboo continuous integration crucible code review fisheye source code repository browsing jira studio retired february 2013 atlassian cloud offers saas hosted model integrations plugin capability licensed per product jira studio supported atlassian ide connectors eclipse visual studio intellij idea information jira studio could displayed external systems using opensocial gadgets project information could externally accessed using activity streams programmatic access jira studio provided apis based rest java | [
5571,
3915,
3463
] | Train |
7,956 | 2 | Open_Handset_Alliance:open handset alliance open handset alliance oha consortium 84 firms develop open standards mobile devices member firms include htc sony dell intel motorola qualcomm texas instruments google samsung electronics lg electronics t-mobile sprint corporation nvidia wind river systems oha established 5 november 2007 led google 34 members including mobile handset makers application developers mobile carriers chip makers android flagship software alliance first developed google 2007 based open-source license competed mobile platforms apple microsoft nokia symbian hp formerly palm samsung electronics intel tizen bada blackberry part efforts promote unified android platform oha members contractually forbidden producing devices based competing forks android time announcement formation open handset alliance november 5 2007 oha also unveiled android open-source mobile phone platform based linux kernel early look sdk released developers 12 november 2007 first commercially available phone running android htc dream also known t-mobile g1 approved federal communications commission fcc 18 august 2008 became available 22 october year members open handset alliance | [
6788,
3933,
2,
2182,
2187,
3613,
5372,
6427,
7528,
7532,
2559,
1095,
2564,
5740,
5391,
5744,
6443,
740,
7189,
7555,
1108,
4340,
42,
4341,
5762,
3310,
5062,
2591,
5068,
5771,
2240,
5775,
424,
3666,
5794,
6158,
5453,
5803,
6874,
6515,
724... | Test |
7,957 | 1 | Navicat:navicat navicat series graphical database management development software produced premiumsoft cybertech ltd. mysql mariadb mongodb oracle sqlite postgresql microsoft sql server explorer-like graphical user interface supports multiple database connections local remote databases design made meet needs variety audiences database administrators programmers various businesses/companies serve clients share information partners initial version navicat developed 2001 main target initial version simplify management mysql installations 2008 navicat mysql winner hong kong ict 2008 award year best business grand award best business product gold award navicat cross-platform tool works microsoft windows mac os x linux platforms upon purchase users able select language software eleven available languages english french german spanish japanese polish russian portuguese korean simplified chinese traditional chinese supports linux platform via bundled wine officially released march 2002 windows version navicat mysql became first product offered public premiumsoft subsequently company released two additional versions navicat mysql mac os x linux operating system june october 2003 respectively november 2013 added support mariadb premiumsoft continued expand navicat series releasing navicat postgresql windows october 2005 mac os x june 2006 linux version navicat postgresql would released 3 years later august 2009 august 2008 navicat decided continue product line branch oracle community creating navicat oracle windows mac august following year followed version linux platform oracle version navicat supports latest oracle objects features including directory tablespace synonym materialized view trigger sequence type etc navicat sqlite released windows mac os x simultaneously april 2009 linux version soon followed two months later june year april 2010 navicat premium began including navicat sqlite starting version 9 expand usability navicat premium navicat sql server released november 2010 windows platform mac os x also release sql server version included premium version navicat january 2011 support sql azure added navicat mariadb released november 2013 windows mac os x linux also release mariadb version included navicat premium navicat mysql 2018 navicat started support nosql databases mongodb currently newest addition list server navicat supports new line product called navicat mongodb released july 2018 windows mac os x linux provides native environment mongodb management supports extra features like mapreduce gridfs buckets also release mongodb version included navicat premium 2009 premiumsoft released navicat premium series navicat software combines previous navicat versions single version connect different database types including mysql oracle postgresql simultaneously allowing users data migration cross databases navicat premium version also supports cross-platform administration serving windows mac os x linux april 2010 version 9 navicat premium released added connectivity sqlite database navicat premium allowing navicat premium connect mysql oracle postgresql sqlite single application november 2010 support microsoft sql server added january 2011 sql azure included november 2013 added support mariadb july 2018 added support mongodb navicat essentials officially released november 2011 simple navicat version commercial use essentials editions navicat lack several features found standard/enterprise editions including form view record filtering visual query building data modeling options import export backup data etc navicat data modeler windows version officially released march 2012 mac os x linux version released may 2012 june 2012 standalone product developers create data models mysql sql server oracle postgresql sqlite databases navicat data modeler allows users visually design database structures perform reverse/forward engineer process import table structures odbc data sources generate sql files print models files etc june 2015 added support mariadb databases several features model conversion physical/logical/conceptual model types navicat cloud august 2014 premiumsoft released new product navicat ios database administration tool developed ios features included object viewer designer query builder editor navicat cloud server monitor etc mysql supported first release navicat postgresql ios version released january 2015 september 2017 navicat mariadb ios version released navicat cloud cloud service users synchronize connection settings queries models virtual groups multiple platforms devices user share project others collaborating connection settings queries models navicat monitor officially released april 2018 safe simple agentless remote server monitoring tool supports monitor mysql mariadb cloud databases users access navicat monitor anywhere via web browser main features navicat monitor including real-time instance performance monitoring alert notification query analyzer replications monitoring navicat features include differences features available across operating systems navicat also compatible forks mysql drizzle ourdelta percona navicat supports cloud databases like amazon rds amazon aurora amazon redshift sql azure oracle cloud google cloud alibaba cloud navicat community provides flexible environment navicat users post questions share experiences solutions includes forum discussions blog articles tutorial videos wiki faq | [
5717,
2988,
4759,
7715,
1359,
3863,
5126,
3706,
5571,
6279,
578,
4708,
4163,
3652,
6755,
6386,
5956,
7213,
4363,
5780,
6056,
3915,
1695,
2259,
5706,
7598
] | Test |
7,958 | 7 | GigaSpaces:gigaspaces gigaspaces technologies inc. privately held israeli software company established 2000 headquarters located new york city additional offices europe asia gigaspaces founded 2000 nati shalom company cto also co-founder member israeli grid consortium israeli non-profit organization focused grid computing virtualization cloud computing technology gigaspaces initially focused products provide distributed computing extreme transaction processing february 2012 additional open source platform service called cloudify cloud computing technology made generally available established gigaspaces focused application platforms java .net environments based software architecture pattern space-based architecture borrowing concepts jini javaspaces specifications providing linear scalability stateful high-performance applications using tuple space paradigm gigaspaces extreme application platform xap distributed in-memory data-grid suited high performance low-latency transaction processing well real-time analytics use cases xap performance achieved maximizing utilization ram ssd main data store commonly used speed existing database performance scalability include built-in synchronization rdbs mysql well new databases mongodb cassandra etc xap designed serve system record data maintains therefore supports features databases complex queries transaction support etc among main features support wide range data models starting simple key value api advance aggregation object graph sql support flash provides high speed data store device xap uses combination ram flash handle speed cost requirements flash support known xap memoryxtend provides 50x capacity pure ram number machines memcache used side cache read mostly scenarios provides limited query support high availability transaction support etc xap used speed read write operations serves system record xap provides functionality expected database including transactional support new nosql solutions used alternative database traditional rdbms nosql databases use combination eventual consistency scale-out model handle scalability performance xap hand designed address existing database scalability performance fronting database in-memory data-store in-memory data-store provides high speed data access portion data needs includes built-in synchronization nosql rdbms type databases load data upon recovery keep database sync data gets updated architecture perspective lot similarities xap nosql databases use scale-out model handle scalability unlike nosql xap uses highly consistent transactional data access therefore serve high-speed transactional front-end nosql backend databases days xap used complex event processing real-time business intelligence big data xap replicate data relational database non-relational nosql database enabling data replication across remote sites wan disaster recovery also cloud-ready cloudify open source cloud computing platform service started february 2012 gigaspaces technologies inc. cloudify takes advantage underlying infrastructure iaas recipe-based model enable deployment application onto cloud without change application code architecture recipe provides execution plans installing starting orchestrating monitoring application stack gigaspaces also active participant open source projects compass project cloudify adjusts server usage according demand using load balancing middleware cloudify applies devops principle describing aspect production environment code configuration cloudify designed large degree lessons earlier generation paas solution earlier generation solution took cautious decision bind specifically amazon chose java primary language choice lot maturity cloud market time availability tools frameworks since rapid advancement almost every front changed entire landscape starting cloudify 2.2 cloudify supports chef technology deploy configure application services chef provides multi-platform framework configuring operating systems services complements cloudify recipes handling scope intra-machine configurations using chef lifecycle services simplified chef takes care keeping service configurations up-to-date current specifications defined roles cookbooks cloudify partnered ibm infosphere biginsights cloudify enables biginsights run consistently additional big data services nosql databases simplifying systems deployments consistent management well improving cost efficiency cloud enablement portability support cloudify consistent management refers specifically consistent deployment configuration management across stack applies deployment phase also post-deployment including failover scaling upgrades accomplished cloudify built-in recipe mechanism gigaspaces technologies recognized industry technology contributions several times including third place deloitte fast 50 award 2008 finalists venturebeat cloudbeat showdown 2011 crn 20 coolest cloud platforms development vendors 2012 red herring top 100 europe 2012 well 2012 sd times 100 software development superfecta cloud leader | [
5666,
2961,
4159,
6462,
4031,
4554,
2530,
5447,
6817,
3951
] | Test |
7,959 | 2 | The_GNOME_Project:gnome project gnome project community behind gnome desktop environment software platform upon based consists software developers artists writers translators contributors active users gnome part gnu project august 2000 gnome foundation set deal administrative tasks press interest act contact point companies interested developing gnome software directly involved technical decisions foundation coordinate releases decide projects part gnome membership open anyone made non-trivial contribution project members foundation elect board directors every november candidates positions must members gnome project holds several community programs events usually tailored local users developers main gathering gnome contributors gnome users developers european conference guadec annual conference used discuss development progress gnome idea guadec events attributed gnome developers users paris meeting 1998 annual asian conference called gnome.asia also exists gnome also participated desktop summit joint conference organized gnome kde communities held europe 2009 2011 among project community programs outreachy established goals increasing women participation improving resources available newcomers getting involved gnome gnome project actively collaborates free software projects previous collaboration efforts ordinarily organized project-to-project basis make collaboration broader freedesktop.org project founded project focuses | [
2091,
7159,
6883,
2728,
1267,
4685,
6011,
578,
2581,
499,
2131,
3152,
2260
] | Test |
7,960 | 3 | Mitsubishi_740:mitsubishi 740 mitsubishi 740 also known melps 740 series 8-bit cmos microcontrollers microprocessors enhanced mos technology 6502 compatible core based expanded wdc 65c02 ics manufactured mitsubishi electric 1980s 1990s 740 family primarily intended single-chip implementations included optional ram rom eprom on-die additions included variety optional timers input/output lines many features estimated around 600 variations could ordered 2002 mitsubishi hitachi merged chip divisions form renesas technology 2010 nec electronics produce renesas electronics 740 family properly known renesas 740 1984 first 740-series part m50740 appeared 1984 mitsubishi single-chip microcontroller databook manufactured mitsubishi electric research needed determine exact date m50740 announced 1998 reported edn magazine melps 740 family 600 different variations 2002 mitsubishi electric hitachi agreed merge chip operations new 7 billion semiconductor company called renesas technology companies said would move respective semiconductor operations renesas including microcomputer logic analog discrete devices memory flash memory sram etc exception drams renesas technology established april 1 2003 joint venture hitachi 55 mitsubishi electric 45 2009 renesas technology nec electronics reached basic agreement merge april 1 2010 two merged renesas electronics though legacy mitsubishi parts longer manufactured 740 instruction set still alive newer renesas microcontroller series 38000/740 series 7200 series mitsubishi 740 family processor core executes superset 6502 instruction set including many extensions added 65c02 core set new instructions common across 740 family members plus instructions exist specific parts major change 740 family compared 65c02 addition new processor status flag formerly unused bit 6 set 1 x register acted zero page address second operand instructions using zero page addressing allowed program select location zero page act sort second accumulator setting x register point removing address instruction format instance 6502 codice_1 adds contents zero-page memory location addr value accumulator using reduced single byte codice_2 improves code density avoids memory cycle needed read address value flag set cleared using new codice_3 codice_4 instructions members 740 family addresses 0008 0039 zero page set aside special function registers sfr used control various add-ons like built-in i/o ports timers members family also include stack page selection bit spsb within sfr spsb clear set 0 stack relocated zero page instead normal location page one members 740 family zero page implemented on-die instead external ram using spsb allows programs working system entirely single chip appropriate roms many members 740 family include on-dye rom eprom well allowing complete single-chip implementations small programs like device drivers since stack grows downward top page 00ff case requires upper portion page left otherwise unused provide space stack following list new instructions existing instructions new modes 740 family parts w65c02 others apply 740 family w65c02 opposed original 65c02 added several new instructions originally designed rockwell semiconductor included instructions set clear referred reset clear single bits memory well instructions branch bits set clear retained 740 family however w65c02 also included test-and-set/reset instructions tested bit set clear setting z flag appropriately either setting clearing bit useful waiting certain flags appear resetting handling flag instructions included 740 additionally original 65c02 codice_5 single-instruction store zero retained functionality partially replaced ldm w65c02 also added several new instructions low-power operation may may available members 740 series following instructions available m50740a m50740asp m50741 m50752 m50757 m50758 parts following instructions available m50752 m50757 m50758 parts following instructions available m37450 parts following instructions available m50740a m50740asp m50741 m50752 m50757 m50758 parts parts n't internal eeprom rom thus require external eeprom rom hold firmware parts pins top package allow eprom plugged parts expensive primarily used development purposes parts internal eprom memory available either otp one-time programmable eprom eraseable window eprom commercial temperature extended temperature m50734 rom/ram-less device includes peripherals uart serial i/o a/d watchdog timer vcu 32 parallel i/o ports choice 8 16-bit timers manage real time tasks instruction set superset 6502 microprocessor incorporated particular ic following m50734sp/fp m50734sp/fp-10 unique cmos lsi microprocessor uart clocked serial i/o a-d converter vcu watchdog timer 32-bit parallel i/o arranged around m5040 cpu core since m50734 multiple internal timers real-time control ideal controlling office automation equipment printers typewriters plotters copy machines fax handy word processors use cmos process enables low power consumption making m50734sp also suitable applications battery-powered operation required difference m50734sp m50734fp m50734sp-10 m50734fp-10 lies package difference m50734sp/fp m50734sp/fp-10 lies maximum clock frequency 1990s clone m50959 manufactured russia designation kf1869ve1 | [
4846,
7519,
804,
5208,
468,
5114,
7531,
3365,
5296,
6720,
2567,
7730,
1556,
7905,
7654,
1022,
6919,
2237,
4532,
6753,
7668,
4643,
1237,
3918,
5087,
7222
] | Test |
7,961 | 4 | William_Lutwiniak:william lutwiniak william lutwiniak november 24 1919 – january 24 1992 american crossword constructor also known work cryptologist national security agency composed total 8,413 puzzles first five thousand composed 1965 1985 hobby lutwiniak born jersey city new jersey lutwiniak began solving crosswords 12 sold first puzzle new york herald-tribune 15 later considered puzzle bit prophetic contained word cryptographical 16 subscription journal american cryptogram association also joined national puzzlers league nom live devil five years followed regular participant aca activities brought attention william friedman friedman invited pursue advanced training cryptography join signal intelligence service lutwiniak february 1 1941 lutwiniak worked arlington hall solomon kullback aftermath attack pearl harbor point became concerned would drafted went munitions building asked colonel harold hayes advice hayes told go particular recruiting station enlist lutwiniak immediately assigned work harold hayes munitions building returned hayes promoted sergeant could skip basic training following october promoted staff sergeant technical sergeant war lutwiniak stopped creating solving crosswords things serious mid-1960s however found margaret farrar crossword copy new york times discovered able solve easily expected subsequently began selling crosswords one early puzzles used cryptic crossword-style cluing center gravity avi fourth july controversial creating lutwiniak words 'big uproar newspaper subsequently print explanation clues meant 1961 headed nsa a5 unit specialized soviet codes later became publisher cryptolog one nsa internal magazines also contributed articles puzzles 1985 joined washington post crossword co-editor sunday magazine became involved crossword culture 1987 attended stanley newman-run crossword tournament baltimore created 15-by-15 puzzle stage 15 minutes based suggestions audience upon retiring national security agency 1981 lutwiniak awarded national intelligence medal achievement 1991 crossw rd magazine named crossword puzzle person year | [
3718
] | Test |
7,962 | 3 | GunCon:guncon often styled guncon portmanteau gun controller known g-con europe family gun peripherals designed namco playstation consoles original controllers used traditional light gun technology newer controllers use led tracking technology first guncon npc-103 g-con 45 europe sony id sleh-00007 bundled playstation conversion time crisis make gun affordable consumers force feedback feature time crisis arcade gun omitted additional fire button included lieu releasing pedal controller game ducking mechanic second version guncon known guncon 2 npc-106 g-con 2 europe bundled playstation 2 conversion time crisis ii time crisis 3 time crisis 4 came playstation 3 bundled guncon 3 nc-109 g-con 3 europe japan three guncon models also available sale separate accessory outside game bundle prior guncon konami justifier first light gun peripheral playstation games support exception north american localization elemental gearbolt maximum force games support justifier compatible guncon vice versa guncon controller known g-con 45 europe uses cathode ray timing method determine barrel aimed screen trigger pulled features button barrel either side gun buttons b performing function auxiliary in-game control take cover reload time crisis controller released black japan gray eventually orange europe north america controller compatible playstation 2 guncon titles compatible playstation 3 due lack controller ports many games support allow b buttons swapped making comfortable right left-handed players guncon 2 g-con 2 europe features smaller body well rounded shape compared original guncon side buttons b moved rearward position directly trigger two new smaller buttons select start added left side shaft prominent additions second guncon model d-pad back gun barrel c button added bottom gun handle new buttons served open new gameplay opportunities character movement dino stalker ability use two guns time crisis ii gun uses usb connection opposed playstation controller port guncon 1 also hooks video signal console either composite video signal component video controller released black japan blue europe orange north america compatible original playstation titles playstation 3 titles guncon 2 compatible games work older models playstation 3 featuring form hardware-based playstation 2 backwards compatibility guncon 3 utilizes two infrared leds markers placed left right sides screen image sensor muzzle tracks markers reference points determining gun pointing screen opposed guncon guncon 2 compatible crt-based displays guncon 3 supports wide variety display types including lcd plasma guncon 3 features sub-grip mounted underneath barrel extending left side use left hand sub-grip analog stick two shoulder buttons like modern gamepad back end gun barrel another analog stick two buttons b1 b2 underneath another two buttons c1 c2 placed along left side barrel analog sticks allow player play first-person shooting games manual aiming/firing light gun regards appearance japanese guncon 3 controllers feature black coloring though due us toy gun laws us/pal release guncon 3 controllers molded bright orange plastic controller criticized uncomfortable left-handed gamers guncon 2 ps2 games compatible original guncon unless game utilizes extra buttons guncon 2 iguncon ios released july 21 2011 allows players use iphone ipod touch similar fashion guncon time crisis 2nd strike ios exclusive entry time crisis series iguncon along time crisis 2nd strike pulled app store march 2015 | [
450,
6330,
2177,
6788,
7514,
4761,
6621,
481,
746,
2873,
424,
253,
4011,
5446,
4748
] | Validation |
7,963 | 4 | Software-defined_protection:software-defined protection software-defined protection sdp computer network security architecture methodology combines network security devices defensive protections leverage internal external intelligence sources sdp infrastructure designed modular scalable secure sdp architecture partitions security infrastructure three interconnected layers enforcement layer inspects traffic enforces protection within well-defined network segments control layer generates security policies deploys protections enforcement points management layer orchestrates infrastructure integrates security business processes sdp architecture supports traditional network security access control policy requirements well threat prevention required enterprises implementing technologies mobile computing software-defined networking sdn enforcement layer sdp enables organizations design segmented networks implement physical virtual security enforcement points based upon segmentation execute protection logic prescribed network segments sdp incorporates principal segmentation enforcement layer segmentation divides network compartments different security characteristics based upon segment requirements security controls established threat containment recovery enforcement points platforms executing protections must implemented boundaries segments enforce defined protection logic enforcement points may implemented network security gateways host-based software mobile device applications virtual machines cloud control layer core sdp architecture role generate protections deploy execution appropriate enforcement points within enforcement layer develop appropriate protections control layer relies upon repositories data include knowledge organization information systems access control knowledge data assets classifications data protection knowledge threats threat prevention security solutions commonly implemented within control layer include firewall anti-virus application control threat emulation anti-bot anti-spam email security data loss prevention dlp intrusion prevention systems ips systematic mapping protective controls associated risk segment assets within enforcement layer organizations deliver multi-layer protection attacks management layer serves interface network administrators two layers sdp infrastructure layer supports enterprise segmentation enables definition access data control policies activation threat prevention separately management layer also provides ability delegate management specific administrators work simultaneously management layer provides visibility happening network supports proactive incident response provides intelligence required tailor security controls organization | [
2961,
7151,
2791,
7938,
651,
4274,
3680
] | Test |
7,964 | 4 | Targeted_threat:targeted threat targeted threats class malware destined one specific organization industry type crimeware threats particular concern designed capture sensitive information targeted attacks may include threats delivered via smtp e-mail port attacks zero day attack vulnerability exploits phishing messages government organisations targeted sector financial industries second targeted sector likely cybercriminals desire profit confidential sensitive information financial industry infrastructure houses similarly online brokerage accounts also targeted attacks impact targeted attacks far-reaching addition regulatory sanctions imposed hipaa sarbanes-oxley gramm-leach-bliley act laws lead loss revenue focus corporate momentum expose sensitive customer data damage corporate reputations incur potential lawsuits contrast widespread spam attack widely noticed targeted attacks sent limited number organizations crimeware threats tend reported thus elude malware scanners | [
5848,
429,
3932,
6254
] | Train |
7,965 | 7 | RPR_FOM:rpr fom real-time platform reference federation object model rpr fom enables linking computer simulations discrete physical entities complex virtual worlds high-level architecture hla federation object model developed distributed simulation applications defense security rpr fom listed nato modelling simulation standards profile amsp-01 rpr fom provides backwards compatibility simulations using distributed interactive simulation dis standard standardized simulation interoperability standards organization siso siso-std-001-2015 standard consists two parts high-level architecture introduced us department defense 1996 rpr fom effort initiated facilitate migration dis hla rpr fom version 1.0 released 1998 supports capabilities dis version ieee 1278.1-1995 dis 5 standard provides fom supporting hla version 1.3 rpr fom version 2.0 released 2015 siso-std-001 rpr fom 2.0 supports capabilities dis version ieee 1278.1a-1998 dis 6 development rpr fom 2.0 started 2000 came halt 2007 resulting widely used draft version 17 work restarted 2012 finalized published standard 2015 standard provides foms supporting following hla versions 1.3 ieee 1516-2000 ieee 1516-2010 “ hla evolved ” modular monolithic formats rpr fom version 3.0 development started 2016 siso dis rpr fom product support group 2018 development handed dedicated product development group goal rpr fom version 3.0 support capabilities dis version ieee 1278.1-2012 dis 7 rpr fom defines information exchanged runtime number fom modules additional supporting modules include foundation module basic data types enumerations module enumerations like types platforms equipment base module commonly used data types generic object classes switches module runtime switches rti rpr fom related number standards | [] | Test |
7,966 | 9 | Theano_(software):theano software theano python library optimizing compiler manipulating evaluating mathematical expressions especially matrix-valued ones theano computations expressed using numpy-esque syntax compiled run efficiently either cpu gpu architectures theano open source project primarily developed montreal institute learning algorithms mila université de montréal 28 september 2017 pascal lamblin posted message yoshua bengio head mila major development would cease 1.0 release due competing offerings strong industrial players theano 1.0.0 released 15 november 2017 following code original theano example defines computational graph 2 scalars b type double operation addition creates python function f actual computation import theano theano import tensor tensor.dscalar b tensor.dscalar c b f theano.function b c assert 4.0 == f 1.5 2.5 | [
1361,
3120,
5939,
5363,
4067,
3410,
6489,
5965,
1989,
578,
6934,
39
] | Test |
7,967 | 5 | Google_Wave_Federation_Protocol:google wave federation protocol wave federation protocol formerly google wave federation protocol open protocol extension extensible messaging presence protocol xmpp used apache wave designed near real-time communication computer supported cooperative work wave servers still currently development wave federation protocol open protocol intended parallel openness email protocol waves may succeed email dominant form internet communication since protocol open anyone become wave provider share waves others like email communication possible regardless provider instance organizations operate wave providers members individual run private wave server single user family members internet service provider run wave service another internet service users supplement email im ftp etc model google wave one many wave providers java source code google wave federation prototype server released mercurial repository july 2009 apache license 2.0 features extensible messaging presence protocol inherited wave federation protocol discovery ip addresses port numbers using domain name system dns srv records tls authentication encryption connections xmpp transport encrypts operations transport level provides cryptographic security servers connected directly additional layer cryptography provides end-to-end authentication wave providers using cryptographic signatures certificates allowing wavelet providers verify properties operation therefore downstream wave provider verify wave provider spoofing wavelet operations able falsely claim wavelet operation originated user another wave provider originated different context addresses situation two users different trustworthy wave providers participants wavelet hosted malicious provider protocol requires participant sign user operations certificate signatures operations forwarded host evaluated participants stop malicious hosts altering spoofing contents messages user services signatures verifications done wave providers client software end users waves wavelets child waves identified globally unique wave id domain name id string domain name identifies wave provider wave originated waves wavelets hosted wave provider creator wavelets wave hosted different wave providers however user data federated i.e. shared wave providers private reply wavelets also possible participants knowledge access private wavelet sent users wave provider federated regardless parent wave hosted wave provider operates wave service one networked servers central pieces wave service wave store stores wavelet operations wave server resolves wavelet operations operational transformation writes reads wavelet operations wave store typically wave service serves waves users wave provider connect wave service frontend purpose federation wave service shares waves participants providers communicating wave provider servers copies wavelets distributed wave providers participants given wavelet copies wavelet particular provider either local remote use term refer two types wavelet copies cases referring wavelet copy wavelet wave view contain local remote wavelet copies simultaneously originating wave server responsible hosting processing wavelet operations submitted local participants remote participants wave providers wave server performs concurrency control ordering submitted wavelet operations relative using operational transformation also validates operations applying local wavelet remote wavelets hosted providers cached updated wavelet operations local provider gets remote host local participant submits wavelet operation remote wavelet wave server forwards operation wave server hosting provider transformed applied operation echoed back applied cached copy wave services use federation gateways federation proxy components communicate share waves wave providers federation gateways communicate local wavelet operations push new local wavelet operations remote wave providers participants fulfill requests old wavelet operations process wavelet operations submission requests federation proxy communicates remote wavelet operations component wave provider communicates federation gateway remote providers receives new wavelet operations pushed providers requests old wavelet operations submits wavelet operations providers | [
7148,
3507,
2450,
3762,
4116,
5455,
3350,
3850,
5372,
7431,
2555,
993,
2284,
6176,
7346,
7170,
2201,
2107,
6624,
1369,
2475,
6629,
831,
1014,
403,
5141,
4337,
136,
2317,
2673,
2043,
1958,
1210,
3309,
2048,
4887,
8107,
7924,
2591,
2683,
... | Test |
7,968 | 4 | Control_system_security:control system security control system security prevention intentional unintentional interference proper operation industrial automation control systems control systems manage essential services including electricity petroleum production water transportation manufacturing communications rely computers networks operating systems applications programmable controllers could contain security vulnerabilities 2010 discovery stuxnet worm demonstrated vulnerability systems cyber incidents united states governments passed cyber-security regulations requiring enhanced protection control systems operating critical infrastructure control system security known several names scada security pcn security industrial network security control system cyber security insecurity vulnerabilities inherent industrial automation control systems iacs lead severe consequences categories safety loss life personal injury environmental impact lost production equipment damage information theft company image guidance assess evaluate mitigate potential risks provided application many governmental regulatory industry documents global standards addressed industrial automation control systems become far vulnerable security incidents due following trends occurred last 10 15 years cyber threats attack strategies automation systems changing rapidly fortunately regulation control system security rare regulation slow moving process united states example nuclear power chemical industries u.s. government computer emergency readiness team us-cert originally instituted control systems security program cssp national cybersecurity communications integration center nccic industrial control systems made available large set free national institute standards technology nist standards documents regarding control system security isa/iec-62443 series standards technical reports related information define procedures implementing electronically secure industrial automation control systems iacs guidance applies end-users i.e asset owner system integrators security practitioners control systems manufacturers responsible manufacturing designing implementing managing industrial automation control systems documents originally referred ansi/isa-99 isa99 standards created international society automation isa 99 committee accredited publicly released american national standards institute ansi documents 2010 renumbered ansi/isa-62443 series change intended align isa ansi document numbering corresponding international electrotechnical commission iec standards isa work products numbered using convention “ isa-62443-x-y ” previous isa99 nomenclature maintained continuity purposes isa99 remains name industrial automation control system security committee isa since 2002 committee developing multi-part series standards technical reports subject iacs security work products submitted isa approval publishing ansi also submitted iec consideration standards specifications iec 62443 series following iec standards development process iec-62443 cybersecurity standards result iec standards creation process ansi/isa-62443 proposals submitted country committees review done comments regarding changes submitted comments reviewed various iec 62443 committees comments discussed changes made agreed upon many members iec committees persons isa s99 committees date fundamental concepts original ansi/isa 62443 documents utilized standards used practitioners several industries design evaluate automation systems cybersecurity resilience several standards used personnel engineering process product system cybersecurity certification programs also called conformity assessment programs certifications awarded accredited certification bodies cb operate following iso/iec 17065 iso/iec 17025 certification bodies accredited perform auditing assessment testing work accreditation body ab often one national ab country abs operate per requirements iso/iec 17011 standard contains requirements competence consistency impartiality accreditation bodies accrediting conformity assessment bodies abs typically members international accreditation forum iaf work management systems products services personnel accreditation international laboratory accreditation cooperation ilac laboratory accreditation multilateral recognition arrangement mla abs ensure global recognition accredited cbs isci created first conformity assessment scheme commonly known certification scheme isa s99 iacs cybersecurity standards program certifies commercial off-the-shelf cots iacs products systems addressing securing iacs supply chain exida united states first organization accredited isci scheme american national standards institute ansi followed control systems security center – certification laboratory cssc-cl accredited japan accreditation board jab tüv rheinland accredited deutsche akkreditierungsstelle dakks ab organizations members iaf two cots product certifications available isasecure® brand isasecure-csa component security assurance certifying automation products 62443-4-1 62443-4-2 iacs cybersecurity standards isasecure-ssa system security assurance certifying iacs systems iec 62443-3-3 standard third certification sdla secure development lifecycle assurance available isci certifies iacs development organizations 62443-4-1 cybersecurity standard providing assurances supplier organization institutionalized cybersecurity product development practices isasecure 62443 conformity assessment scheme iso 17065 program whose labs certification bodies cb independently accredited ansi/anab jab global iso 17011 accreditation bodies ab certification labs must also meet iso 17025 lab accreditation requirements ensure consistent application certification requirements recognized tools mutual recognition arrangements mra iaf ilac others accreditation isasecure labs isa 17011 accreditation bodies ensures certificates issued isasecure labs globally recognized isasecure scheme includes process recognizing test tools ensure tools meet functional requirements necessary sufficient execute required product tests test results consistent among recognized tools isci development processes include maintenance policies ensure isasecure certifications remain alignment iec 62443 standards evolve iec 62443 standards designed horizontally address technical cybersecurity requirements cross-section industries isasecure scheme ’ certification requirements working groups include subject matter experts chemical oil gas industries reflective cybersecurity needs isci published 2017 study confirmed applicability iec 62443 standards isasecure certification building management systems resulting study executive summary ppt available free download www.isasecure.org website isci added leading bms suppliers membership established bms working group support ongoing expansion isasecure certifications bms iec 62443 certification schemes also established several global certification bodies defined scheme based upon referenced standards procedures programs offered globally several recognized cbs including exida tüv rheinland tüv sud tüv nord sgs-tüv saar | [
3932,
651,
8164,
4440
] | Test |
7,969 | 3 | TurnKey_Linux_Virtual_Appliance_Library:turnkey linux virtual appliance library turnkey linux virtual appliance library free open source project developed range debian-based pre-packaged server software appliances a.k.a virtual appliances turnkey appliances deployed virtual machine range hypervisors supported cloud computing infrastructures including aws others installed physical computers project currently maintains around 100 virtual appliances freely licensed ready-to-use solution optimized ease use daily automatic security updates full backup capabilities built appliance designed work little configuration required packaged several formats optimized several different virtualization platforms addition two separate builds installing onto physical media non-virtualized hard disk usb hybrid iso onto amazon ec2 cloud pre-integrated server applications include lamp wordpress joomla drupal redmine mysql mediawiki domain controller file server ruby rails phpbb many others founded engineers israeli startup project conceived mid-2008 community-oriented open source project would focus helping users piece together turnkey solutions open source components largest linux distributions according one turnkey linux co-founders project part inspired desire provide open source alternatives proprietary virtual appliance vendors would aligned user interests could engage community project launched september 2008 three prototype appliances drupal joomla lamp based ubuntu 8.04.1 build following months usability improved dozen additional appliances released including ruby rails mediawiki django october 2009 project released 40 appliances based ubuntu 8.04.3 including 25 new additions virtual appliance library release included support amazon elastic compute cloud new virtual machine image format ovf support turnkey linux listed winner 2009 bossies infoworld one top 40 open source products year september 2010 official unveiling tklbam turnkey linux backup migration took place blog post describing goal ideal backup system according liraz siri many features described author along videos demonstrate functionality backup system november 2010 additions tklbam announced including integration webmin discussed future feature original unveiling tklbam turnkey linux nominated sourceforge february 2012 project month august 2012 version 12.0 released library increased include 100 appliances release also marked move away ubuntu underlying operating system debian 6.0 a.k.a squeeze move cited various reasons particularly security early june 2013 saw significant change tack version 12.1 update release built new tkldev open build infrastructure release also included first x86-64 builds later month turnkey linux custom application code moved github also included tracker appliances bug reports promised mid july turnkey linux released image building appliance tkldev well additional separate github account house appliance specific code used tkldev build appliances november 2013 saw release v13.0 based debian 7.2 a.k.a wheezy september 2015 saw long overdue release v14.0 based debian 8.2 a.k.a jessie followed april 2016 maintenance release v. 14.1 based debian 8.4 turnkey virtual appliances start life stripped debian bootstrap versions previous v12.0 based ubuntu added turnkey core includes common features project virtual appliances including turnkey core footprint approximately 110 mb available separate download application software installed top core typically increases size virtual appliance approximately 160 mb downloading installing appliance package hard drive intended developers administrators would gain easy method setting dedicated server new software appliances customised appliances developed forking appropriate appliance build code github built using tkldev additionally appliances also customized extended using tklpatch simple appliance modification mechanism turnkey linux run virtual machine virtualbox vmware although former described provided documentation | [
4295,
5200,
1629,
3444,
7251,
5912,
5965,
474,
7075,
1941,
314,
5232,
7587,
2758,
7463,
7838,
1663,
2864,
933,
4165,
3559,
6209,
6835,
5064,
7954,
2682,
7848,
6661,
6761,
2063,
2961,
343,
4824,
5523,
1893,
5259,
5530,
5704,
3751,
4910,
... | Test |
7,970 | 2 | UCSD_Pascal:ucsd pascal ucsd pascal pascal programming language system runs ucsd p-system portable highly machine-independent operating system ucsd pascal first released 1977 developed university california san diego ucsd 1977 university california san diego ucsd institute information systems developed ucsd pascal provide students common environment could run available microcomputers well campus dec pdp-11 minicomputers operating system became known ucsd p-system ucsd p-system one three operating systems along pc dos cp/m-86 ibm offered original ibm pc vendor softech microsystems emphasized p-system application portability virtual machines 20 cpus ibm pc release predicted users would able use applications purchased future computers running p-system advertisements called universal operating system pc magazine denounced ucsd p-system ibm pc stating review context mba written language simply produce good code p-system sell well ibm pc lack applications expensive choices previously ibm offered ucsd p-system option displaywriter 8086-based dedicated word processing machine confused ibm displaywrite word processing software displaywriter native operating system developed completely internally opened end-user programming notable extensions standard pascal include separately compilable units string type extensions influenced design ada language intrinsics provided accelerate string processing e.g scanning array particular search pattern language extensions provided allow ucsd p-system self-compiling self-hosted ucsd pascal based p-code machine architecture contribution early virtual machines extend p-code away roots compiler intermediate language full execution environment ucsd pascal p-machine optimized new small microcomputers addressing restricted 16-bit 64 kb memory james gosling cites ucsd pascal key influence along smalltalk virtual machine design java virtual machine ucsd p-system achieved machine independence defining virtual machine called p-machine pseudo-machine many users began call pascal-machine like os—although ucsd documentation always used pseudo-machine instruction set called p-code pseudo-code urs ammann student niklaus wirth originally presented p-code phd thesis ucsd implementation derived zurich pascal-p implementation ucsd implementation changed zurich implementation byte oriented ucsd p-code optimized execution pascal programming language hardware platform needed p-code interpreter program written port entire p-system tools run later versions also included additional languages compiled p-code base example apple computer offered fortran compiler written silicon valley software sunnyvale california producing p-code ran apple version p-system later telesoft also located san diego offered early ada development environment used p-code therefore able run number hardware platforms including motorola 68000 system/370 pascal microengine ucsd p-system shares concepts current java platform use virtual machine hide operating system hardware differences use programs written virtual machine provide cross-platform support likewise systems allow virtual machine used either complete operating system target computer run box another operating system ucsd pascal compiler distributed part portable operating system p-system ucsd p-system began around 1974 idea ucsd kenneth bowles believed number new computing platforms coming time would make difficult new programming languages gain acceptance based ucsd pascal pascal-p2 release portable compiler zurich particularly interested pascal language teach programming ucsd introduced two features important improvements original pascal variable length strings units independently compiled code idea included then-evolving ada programming language niklaus wirth credits p-system ucsd pascal particular popularizing pascal release turbo pascal ucsd version started slip first place among pascal users pascal dialect ucsd pascal came subset pascal implemented pascal-p2 designed full implementation language rather minimum subset would self-compile fit function bootstrap kit pascal compilers ucsd added strings basic several implementation dependent features although ucsd pascal later obtained many features full pascal language pascal-p2 subset persisted dialects notably borland pascal copied much ucsd dialect four versions ucsd p-code engine several revisions p-system ucsd pascal revision p-code engine i.e. p-machine meant change p-code language therefore compiled code portable different p-machine versions revision represented leading roman numeral operating system revisions enumerated dot number following p-code roman numeral example ii.3 represented third revision p-system running second revision p-machine original version never officially distributed outside university california san diego however pascal sources versions i.3 i.5 freely exchanged interested users specifically patch revision i.5a known one stable widely distributed available many early microcomputers numerous versions included apple ii dec pdp-11 zilog z80 mos 6502 based machines motorola 68000 ibm pc version ii pc restricted one 64k code segment one 64k stack/heap data segment version iv removed code segment limit cost lot br project members era include dr kenneth l bowles mark allen richard gleaves richard kaufmann pete lawrence joel mccormack mark overgaard keith shillington roger sumner john van zandt custom version written western digital run pascal microengine microcomputer included support parallel processes first time commercial version developed sold softech based version ii include changes version iii sell well due combination pricing structure performance problems due p-code interpreter competition native operating systems top often ran softech dropped product picked pecan systems relatively small company formed p-system users fans sales revived somewhat due mostly pecan reasonable pricing structure p-system ucsd pascal gradually lost market native operating systems compilers available ti-99/4a equipped p-code card commodore pet corvus systems computer used ucsd pascal user software innovative concept constellation os run pascal interpretively compiled include common software manual users could modify needed using open source default era | [
3930,
1522,
5639,
4670,
4589,
3955,
1361,
6181,
304,
4779,
5571,
6277,
5937,
6113,
1857,
5948,
7474,
152,
5424,
5079,
3915,
4277,
3751,
6778,
3069,
2803,
783
] | Test |
7,971 | 1 | SQL_Server_Notification_Services:sql server notification services sql server notification services platform developed microsoft development deployment notification applications based sql server technology microsoft .net framework notification services offers scalable server engine run notification applications multi-server capability-providing flexibility scalability deploying applications notification services designed ease pain developing deploying notification applications generate personalized timely information subscribers design code test components make robust notification services application-such notification scheduling failure detection retry logic time zone management notification grouping queue management adding notification services software applications daunting task years term notification applications superseded term complex event processing cep idea user defines set rules queries advance push data rules data fit criteria rules action fired example rule may state car speed sensor 100 km/h take photo record otherwise data discarded approach much faster traditional oltp design insert row database constantly polling data see something relevant happened especially suited situations high speed inputs fixed set fairly simple queries may need keep data e.g industries measure voltage current attributes hundreds electric motors conveyor belts 100 times second compare measurement average plant operators alerted sudden change occur sql server notification services one many components comprised microsoft sql server first released microsoft sql server 2000 service pack 2 2003 enhanced release shipped sql server 2005 discontinued removed sql server 2008 although sql server 2005 sp3 allows notification services components run sql server 2008 database engine replaced streaminsight first shipped component sql 2008 r2 streaminsight separate install visible part regular sql server setup programming framework based transact-sql xml provides declarative programming model lends quick prototyping deployment robust notification applications api creating subscription management applications provided plus standard components collecting event data files sql server databases formatting notifications using xslt sending notifications via simple mail transfer protocol smtp writing notifications file standard components meet needs application notification services extendable building custom components using .net family programming languages microsoft visual c .net microsoft visual basic .net finally notification services communicate wide variety microsoft third-party custom-built event providers delivery protocols enabling notification services communicate existing systems heterogeneous environments | [
3940,
7619,
7621,
7715,
2283,
4936,
8183,
8085,
2840,
7080,
8094,
4697,
5747,
6908,
5234,
3303,
930,
53,
941,
422,
425,
1684,
5694,
5252,
2341,
2702,
7687,
2530,
4017,
2085
] | Validation |
7,972 | 7 | Soluto:soluto soluto device protection service offered identically named company integrates mobile app web portal proactive communications remote device management one service part premium service soluto enabled users contact premier support technicians soluto offered access via web part soluto pc management platform soluto founded 2008 received 1.6m seed funding proxima ventures followed-up 6.2 million second round financing led bessemer venture partners joined giza venture capital march 2009 2013 soluto acquired asurion llc soluto ceased operation soluto pc management platform april 1 2016 soluto funded index ventures bessemer venture partners giza venture capital proxima ventures crunchfund innovation endeavors initial capital angel investors including chris dixon yuval neeman saar gillai nadav zohar soluto purchased asurion november 12 2013 reported 130 million soluto techcrunch disrupt 2010 soluto named one 2010 alwayson global top private companies lifehacker named soluto one popular free windows downloads 2010 original soluto features listed soluto dashboard 6 sections divided categories technical information user see remote actions user initiate soluto uses downloaded agent transmit data receive data soluto back-end servers data transmitted soluto includes apps running boot enabled browser toolbars add-ons hardware specs specialized form crash reports servers send back agent information solutions recent crashes remote actions initiated user need occur | [
1992
] | Train |
7,973 | 2 | Job_stream:job stream non-interactive computer system particularly ibm mainframes job stream jobstream simply job sequence job control language statements jcl data called instream data comprise single unit work operating system term job traditionally means one-off piece work contrasted batch executing steps many inputs non-interactive computation come called batch processing thus unit batch processing often called job oxymoronic term batch job see job details performing job consists executing one programs program execution called job step jobstep step usually related way others job steps job executed sequentially possibly depending results previous steps particularly batch processing term job stream particularly associated mainframes ibm z/os operating system job initiated codice_1 terminated next codice_1 codice_3 statement job step consists one codice_4 statement indicating program executed usually multiple codice_5 statements defining files devices used simple example job stream system print payroll checks might consist following steps performed batch inputs step depends successful completion previous step example incorrect data input first step job might terminate without executing subsequent steps allow payroll department correct data rerun edit errors job run completion manual intervention | [
1710,
4145,
312,
336
] | Test |
7,974 | 3 | LGA_1156:lga 1156 lga 1156 also known socket h h1 intel desktop cpu socket lga stands land grid array incompatible successor lga 1155 last processors supporting ceased production 2011 lga 1156 along lga 1366 designed replace lga 775 whereas lga 775 processors connect northbridge using front side bus lga 1156 processors integrate features traditionally located northbridge within processor lga 1156 socket allows following connections made processor rest system lga 1156 lga 1366 sockets processors discontinued sometime 2012 superseded lga 1155 lga 2011 respectively lga 1156 4 holes fastening heatsink motherboard placed square lateral length 75 mm configuration retained later lga 1155 lga 1150 lga 1151 sockets meaning cooling solutions generally interchangeable lga 1156 processors motherboards made date interoperable making possible switch celeron pentium core i3 core i5 integrated graphics core i5 core i7 without graphics however using chip integrated graphics p55 motherboard addition likely requiring bios update allow use on-board graphics processor likewise using chip without integrated graphics h55 h57 q57 motherboard allow use motherboard graphics ports desktop chipsets support lga 1156 intel h55 h57 p55 q57 server chipsets supporting socket intel 3400 3420 3450 | [
2541,
2814,
4123,
3849,
1729,
2828,
6173,
2830,
3002,
4314,
5379,
3193,
1841,
1645,
6014,
3203,
4968,
3385,
4972,
5853,
2685,
6935,
7484,
8021,
6307,
7302,
5963,
866,
3333,
3063,
7134,
262,
6683,
5886
] | Test |
7,975 | 5 | Mozilla_Thunderbird:mozilla thunderbird mozilla thunderbird free open-source cross-platform email client news client rss chat client developed mozilla foundation project strategy modeled mozilla firefox web browser installed default ubuntu desktop systems december 7 2004 version 1.0 released received 500,000 downloads first three days release 1,000,000 10 days july 6 2012 mozilla announced company dropping priority thunderbird development continuous effort extend thunderbird feature set mostly fruitless new development model shifted mozilla offering extended support releases deliver security maintenance updates allowing community take development new features december 1 2015 mozilla executive chair mitchell baker announced company-wide memo thunderbird development needs uncoupled firefox referred thunderbird developers spending large efforts responding changes mozilla technologies firefox paying tax support thunderbird development also said believe thunderbird potential industry-wide impact firefox time announced mozilla foundation provide least temporary legal financial home thunderbird project since memo 2015 mozilla brought thunderbird back in-house announcement may 9 2017 continues support development thunderbird development team also expanded adding several new members undergone overhaul security user-interface thunderbird email newsgroup news feed chat xmpp irc twitter client vanilla version originally personal information manager pim although mozilla lightning extension installed default adds pim functionality additional features needed often available via extensions thunderbird manage multiple email newsgroup news feed accounts supports multiple identities within accounts features quick search saved search folders virtual folders advanced message filtering message grouping labels help manage find messages linux-based systems system mail movemail accounts supported thunderbird provides basic support system-specific new email notifications extended advanced notification support using add-on thunderbird incorporates bayesian spam filter whitelist based included address book also understand classifications server-based filters spamassassin extensions allow addition features installation xpinstall modules known xpi zippy installation via add-ons website also features update functionality update extensions thunderbird supports variety themes changing overall look feel packages css image files downloaded via add-ons website mozilla add-ons thunderbird follows industry standards email web feeds e.g news aggregators atom rss thunderbird follows internet protocols evolve example ircv3.1 n't support ircv3.2 usenet news groups offer latest nntps see thunderbird provides mailbox format support using plugins feature yet enabled due related work progress mailbox formats supported thunderbird also uses mork since version 3 mozstorage based sqlite internal database mork due replaced mozstorage thunderbird 3.0 8.0 release still uses mork file format current version seamonkey version 2.14.1 also still uses mork indexes pop imap mail folders least since version 38 thunderbird integrated support automatic linking large files instead attaching directly mail message insert menu provides ability include html code thus one insert subscripts degree symbol ° etc. message composed software may limitations number sizes files objects represented example pop3 folders subject filesystem design limitations maximum file sizes filesystems large file support well possible limitations long filenames issues thunderbird runs variety platforms releases available primary distribution site support following operating systems unofficial ports available old ports may available os/2 ecomstation source code freely available compiled run variety architectures operating systems contributors world client translated 50 different languages although email addresses currently limited ascii local parts thunderbird yet support smtputf8 rfc 6531 email address internationalization thunderbird provides enterprise government-grade security features tls/ssl connections imap smtp servers also offers native support s/mime secure email digital signing message encryption using certificates security features take advantage smartcards installation additional extensions security features may added extensions instance enigmail offers pgp signing encryption decryption optional security protections also include disabling loading remote images within messages enabling specific media types sanitizer disabling javascript french military uses thunderbird contributes security features claimed match requirements nato closed messaging system originally launched minotaur shortly phoenix original name mozilla firefox project failed gain momentum success latter however demand increased mail client go work minotaur revived new name thunderbird migrated new toolkit developed firefox team significant work thunderbird restarted announcement version 1.5 onward main mozilla suite would designed around separate applications using new toolkit contrasts previous all-in-one approach allowing users mix match mozilla applications alternatives original mozilla suite continues developed seamonkey december 23 2004 project lightning announced tightly integrated calendar functionality scheduling tasks etc thunderbird lightning support full range calendar mechanisms protocols supported mozilla calendar infrastructure modern post-0.2 sunbird october 11 2006 qualcomm mozilla foundation announced future versions eudora based upon technology platform open source mozilla thunderbird email program project code-named penelope late 2006 debian rebranded thunderbird icedove due trademark copyright reasons second product rebranded july 26 2007 mozilla foundation announced thunderbird would developed independent organization mozilla corporation subsidiary foundation focusing mozilla firefox development september 17 2007 mozilla foundation announced funding new internet communications initiative dr. david ascher activestate purpose initiative develop internet communications software based thunderbird product code brand february 19 2008 mozilla messaging started operations subsidiary mozilla foundation responsible development email similar communications initial focus upcoming version thunderbird 3 alpha preview releases thunderbird 3 codenamed shredder april 4 2011 mozilla messaging merged mozilla labs group mozilla foundation july 6 2012 confidential memo jb piacentino thunderbird managing director mozilla leaked published techcrunch memo indicated mozilla would moving team project development new features would left community memo slated release july 9 2012 subsequent article executive chair mozilla mitchell baker stated mozilla decision make transition thunderbird new release governance model november 25 2014 kent james volunteer-led thunderbird council announced thunderbird blog active contributors thunderbird gathered mozilla office toronto discussed future application decided staff required working full-time thunderbird thunderbird team release stable reliable product make progress features frequently requested community december 1 2015 mitchell baker suggested company-wide memo thunderbird uncoupled firefox infrastructure referred thunderbird tax firefox said believe thunderbird potential industry-wide impact firefox mozilla remains interested role thunderbird seeking assistance help development may 9 2017 philipp kewisch announced mozilla foundation continue serve legal fiscal home thunderbird project thunderbird migrate mozilla corporation infrastructure separating operational aspects project interim/beta versions thunderbird 57 58 released late 2017 began make changes influenced firefox quantum including new photon user interface despite removal firefox quantum support xul-based legacy add-ons favor webextensions stable/esr release thunderbird 60 mid-2018 continued support although require updates support webextensions except themes 2018 according mozilla work underway planned support thunderbird 63 webextensions continue somewhat support legacy addons thunderbird development releases occur three stages called beta earlybird daily correspond firefox beta aurora nightly stages release dates gecko versions exactly firefox example firefox 7 thunderbird 7 released september 27 2011 based gecko 7.0 | [
7148,
2543,
6795,
6802,
6102,
2566,
393,
735,
1475,
6458,
753,
3655,
4352,
5070,
1496,
5773,
4357,
7581,
6489,
4734,
7587,
4014,
445,
1152,
1912,
4755,
6874,
3350,
5808,
4759,
3017,
1190,
6908,
3031,
6211,
5505,
5506,
3043,
6221,
7669,
... | Test |
7,976 | 6 | Rational_MultiVersion_File_System:rational multiversion file system computing multiversion file system mvfs virtual file system displays specific versions data stored clearcase particular supports dynamic views show arbitrary combination local remote files | [
3599,
2547,
7161,
4672,
6431,
3626,
5049,
6117,
759,
6854,
5437,
4375,
6500,
6505,
5457,
460,
1534,
4406,
821,
7258,
5130,
1561,
836,
5843,
2313,
6558,
2683,
5859,
5865,
4444,
5518,
6231,
869,
2704,
1605,
174,
2710,
1624,
5900,
4480,
12... | Test |
7,977 | 3 | International_Karate:international karate international karate fighting game developed published system 3 various home computers 1985 epyx licensed released game united states world karate championship 1986 international karate successor expanded gameplay released 1987 followed unauthorized release international karate gold 2001 core game two-dimensional one-on-one versus fighting game players take roles martial artists competing kumite tournament rather wearing opponent health goal instead score single solid hits hit combat stops combatants returned starting positions depending well players hit opponent score either half-point full point matches quite brief two full points required win point quickly scored seconds round begins single player mode successive opponents increase difficulty novice white belts master black belts play continues long player continues win matches fights bonus mini-games focusing rhythm timing appear including one player must break number stacked boards using fighter head newer games genre starting specifically street fighter fights take place variety backdrops eight total representing different locations world mount fuji tokyo japan sydney harbour sydney australia statue liberty new york usa forbidden city beijing china christ redeemer rio de janeiro brazil palace westminster london england parthenon athens greece great pyramid giza cairo egypt title utilises standard one-button joystick allowing players execute variety karate techniques unlike modern 2d fighting games players turn around opponent behind must instead execute one three turn-around manoeuvres change direction spectrum version used starting point amstrad cpc port another port exists msx platform version atari st home computer created andromeda software released 1986 version featured advanced graphics versions 16 bit hardware supported colors larger sprites port pc published year used 4-color cga graphics release world karate championship us late april 1986 epyx sued competing video game publisher data east infringement copyright trademark trade dress dispute similarities 1984 arcade game karate champ home computer adaptations published 1985 international karate used coloured fighters points system initial trial district court northern district california began 28 october 1986 decision 28 january 1987 court dismissed allegations trademark trade dress infringement found epyx guilty infringing upon data east usa copyright karate champ data east obtained permanent injunction epyx inc. impoundment restrained epyx sale distribution world karate championship epyx required recall customers distributors copies infringing work decision appealed united states court appeals ninth circuit november 1988 reversed decision stating game similar identical one game company monopolise one entire sport result melbourne house sue system 3 epyx game way exploding fist also similar games though game also borrowed heavily data east karate champ computer gaming world called game original karate champ clone best one available ... great scenery adds ambience 2000 game boy color version created without input archer maclean released international karate 2000 sported enhancements basis international karate advanced released 2001 game boy advance c64 version saw re-releases 2004 title c64 direct-to-tv 2008 wii virtual console | [
4277,
6380
] | Test |
7,978 | 1 | Superbase_(database):superbase database superbase end-user desktop database program started commodore 64 ported various operating systems course 20 years also generally included programming language automate database-oriented tasks later versions included wysiwyg form report designers well sophisticated programming capabilities originally created 1983 precision software commodore 64 128 later amiga atari st 1989 first database management system run windows computer precision software uk-based company original creator product superbase superbase still used large number people various platforms often used end-user database large number applications built throughout industry government academia often significant complexity applications continue use current day mostly small businesses initial versions text mode release amiga version superbase became first product use common vcr control panel browsing records also supported number different media formats including images sounds video superbase often referred multimedia database early years features uncommon amiga version also featured internal language capability generate front end masks queries reports years microsoft access version huge success resulted version created number platforms using approach eventually microsoft windows version released couple years later company sold founders software publishing corporation spc sold non-windows versions product releasing version 2 late alpha stages version 3 sold product company called computer concepts corporation relatively unknown company created subsidiary called superbase inc. finishing late stage alpha version 3 launching superbase 95 eventually appeared lost interest product point bought small group former customers brought back uk company suderbase developers plc continued extend support product superbase classic.the amiga version sold mr. hardware computers joe rothman developed renamed program sbase pro 4 mr hardware computers sbase pro 4 sold russ norrby put version 1.36n newest version new next-generation rewrite product initially called superbase next generation sbng included new object oriented programming language called simpol begun 1999-2000 primarily alpha product although billed beta release 2005 promises true release would around corner 2006 simpol sold realbasics ltd later renamed simpol ltd www.simpol.com april 2009 company launched simpol professional next generation product cross-platform language database tool set february 2009 announced superbase developers plc liquidation march 2010 papatuo holdings ltd. purchased superbase family products official receivers superbase developers plc 2015 papatuo holdings company purchased superbase intellectual property superbase developers plc liquidated also purchased simpol intellectual property upon liquidation simpol limited following versions 1.83 2.06 version 2.10 released july 2017 superbase used basic end-user tasks real strength lies ability relatively untrained programmers create complex applications typically built time need arises types applications run gamut accounting systems erp/mrp packages business information systems production control systems similar complex products basic membership list contact management systems contains high-speed versatile isam database engine powerful dialect basic well sophisticated forms report engines also includes powerful support acting front-end one sql databases biggest drawback fact written 16-bit windows api easily portable 32-bit version rewritten version intended cure make package even easier use powerful casual programmer perspective fact database based sql significant advantage since level complexity far less easier user grasp concepts manage traverse database numerous powerful features product ahoy 1984 stated superbase numerous advanced features seldom seen database manager c-64 including database programming language concluded anyone planning harnessing c-64 office business environment ca n't go wrong superbase | [
5252,
5852,
3915,
4759,
5571,
2054,
7248
] | Test |
7,979 | 2 | Nokia_DX_200:nokia dx 200 dx 200 digital switching platform currently developed nokia networks dx 200 versatile fault-tolerant modular highly scalable telephone exchange general purpose server platform designed high performance high availability applications hardware built loosely coupled redundant computer units backed distributed software architecture architecture dx 200 allows live migration well software update live operation unlike many switching platforms dx 200 performs live software update without code patching therefore running code polluted unnecessary jump instructions furthermore opposed integration guessing various software patches dx 200 architecture makes proper integration testing software components possible live software update requires two computer units one executing old code working new software loaded otherwise idle spare process called warming memory areas e.g dynamically allocated memory exception stack procedures moved old new computer unit implies handling data structures must compatible old new software versions copying data require programming effort long allocation data done using tnsdl language developing software dx 200 platform rather straightforward well educated software developer tnsdl language plays vital role producing asynchronously communicating fault-tolerant software modules easy learn software architecture dx 200 fine combination highly efficient traditional solutions well modern actor model based highly concurrent design dx 200 products famous availability exceeding 99.999 five nines well unrivaled performance dx 200 generic architecture suitable versatile computing applications applications include traditional mobile switching centers msc lte mobile packet switching gateways well voip application servers generic operating system ported dx 200 relatively easily linux chorusos dmx frequent operating systems used dx 200 dmx 'native os dx 200 dmx microkernel architecture advanced functions like tcp/ip stack live migration components implemented separate libraries dx 200 several hardware flavors nokia networks shifted focus hardware products software services highly valuable business logic kept products used running dx 200 hardware variants available cloud solutions working generic multi-purpose hardware various vendors development system started televa finnish state owned telecom equipment producer early 1970s leadership keijo olkkola first order received 1973 100 subscriber local exchange small remote island community houtskär delivered 1979 first installation 1982 dx 200 captured 50 share finnish fixed line exchange market exchange modular design development microprocessors technology enabled gradual increase system capacity 1987 installation base grown 400,000 subscriber lines early export markets included china nepal united arab emirates sri lanka sweden turkey soviet union 1984 development version exchange nordic mobile telephone network started 1991 world first gsm call made using nokia devices core network components based dx 200 platform 2005 dx 200 based voip server provided finnish operator saunalahti providing state art fixed-mobile convergence solution prime example well dx 200 suitable internet server development overall flexibility whole dx 200 platform 2009 world ’ first voice calls lte networks using commercial 3gpp-standardized user network equipment 2013 nsn showed truly operational telco cloud solution actually marks end traditional dx200 hardware product line | [
2961,
4295,
4387,
310,
5021,
578,
5447,
5884
] | Train |
7,980 | 2 | OProfile:oprofile computing oprofile system-wide statistical profiling tool linux john levon wrote 2001 linux kernel version 2.4 m.sc project consists kernel module user-space daemon several user-space tools oprofile profile entire system parts interrupt routines drivers user-space processes low overhead widely supported kernel mode oprofile uses system timer see gathering profiling events however mode unable measure kernel functions interrupts disabled newer cpu models support hardware performance counter mode uses hardware logic record events without active code needed linux 2.2/2.4 32-bit x86 ia64 supported linux 2.6 wider support x86 32 64 bit dec alpha mips arm sparc64 ppc64 avr32 call graphs supported x86 arm 2012 two ibm engineers recognized oprofile one two commonly used performance counter monitor profiling tools linux alongside perf tool example | [
6984,
5055,
6719,
2226,
3915,
578,
5571,
1011,
352,
1772,
971,
2508,
336
] | Test |
7,981 | 0 | Attempto_Controlled_English:attempto controlled english attempto controlled english ace controlled natural language i.e subset standard english restricted syntax restricted semantics described small set construction interpretation rules development university zurich since 1995 2013 ace version 6.7 announced ace serve knowledge representation specification query language intended professionals want use formal notations formal methods may familiar though ace appears perfectly natural – read understood speaker english – fact formal language ace related tools used fields software specifications theorem proving text summaries ontologies rules querying medical documentation planning simple examples ace construction rules require noun introduced determiner every least 5 ... ace interpretation rules decide 1 interpreted universally quantified 2 interpreted existentially quantified sentences like women human follow ace syntax consequently valid interpretation rules resolve anaphoric references 3 tie second sentence refer new tie first sentence man second sentence refer man first sentence thus ace text coherent entity anaphorically linked sentences attempto parsing engine ape translates ace texts unambiguously discourse representation structures drs use variant language first-order logic drs translated formal languages instance acerules various semantics owl swrl translating ace text fragment first-order logic allows users reason text instance verify validate query overview current version 6.6 ace section vocabulary ace comprises grammar ace defines constrains form meaning ace sentences texts ace grammar expressed set construction rules meaning sentences described small set interpretation rules troubleshooting guide describes use ace avoid pitfalls ace text sequence declarative sentences anaphorically interrelated furthermore ace supports questions commands simple sentence asserts something case — fact event state simple ace sentences following general structure every sentence subject verb complements direct indirect objects necessary transitive verbs insert something ditransitive verbs give something somebody whereas adjuncts adverbs prepositional phrases optional elements simple sentence elaborated upon describe situation detail specify nouns customer card could add adjectives possessive nouns -prepositional phrases variables appositions modifications nouns possible relative sentences described since make sentence composite also detail insertion event e.g adding adverb equivalently adding prepositional phrases combine elaborations arrive composite sentences recursively built simpler sentences coordination subordination quantification negation note ace composite sentences overlap linguists call compound sentences complex sentences coordination possible sentences phrases syntactic type note coordination noun phrases card code represents plural object coordination possible sentences verb phrases relative clauses coordination governed standard binding order logic i.e binds stronger commas used override standard binding order thus sentence means customer inserts visacard code alternatively mastercard code four constructs subordination relative sentences if-then sentences modality sentence subordination relative sentences starting allow add detail nouns help if-then sentences specify conditional hypothetical situations note anaphoric reference via pronoun -part noun phrase card -part modality allows us express possibility necessity sentence subordination comes various forms quantification allows us speak objects certain class universal quantification denote explicitly existence least one object class existential quantification textual occurrence universal existential quantifier opens scope extends end sentence coordinations end respective coordinated sentence express involved customers insert cards write sentence means customer inserts card may may one inserted another customer specify customers insert card — however unrealistic situation seems — write equivalently state every card inserted customer write somewhat indirectly negation allows us express something case negate something objects certain class one uses negate complete statement one uses sentence negation forms negation logical negations i.e state something provably case negation failure states state affairs proved i.e information whether state affairs case ace supports two forms queries yes/no -queries wh -queries yes/no -queries ask existence non-existence specified situation specified ask get positive answer note interrogative sentences always end question mark help wh -queries i.e queries query words interrogate text details specified situation specified ask element sentence exception verb queries also constructed sequence declarative sentences followed one interrogative sentence example ace also supports commands examples command always consists noun phrase addressee followed comma followed uncoordinated verb phrase furthermore command end exclamation mark constrain ambiguity full natural language ace employs three simple means natural language relative sentences combined coordinations introduce ambiguity ace sentence unequivocal meaning customer opens account reflected paraphrase express alternative — though realistic — meaning card opens account relative pronoun must repeated thus yielding coordination relative sentences sentence unambiguously equivalent meaning paraphrase ambiguities safely removed ace without rendering artificial deterministically interpret otherwise syntactically correct ace sentences use small set interpretation rules example write code attaches verb inserts card however probably meant say express code associated card employ interpretation rule relative sentence always modifies immediately preceding noun phrase rephrase input yielding paraphrase — specify customer inserts card code — usually ace texts consist one sentence express occurrences card code mean card code ace provides anaphoric references via definite article processing ace text anaphoric references replaced recent specific accessible noun phrase agrees gender number example recent specific suppose ace parser given sentence refers second card refers first card noun phrases within if-then sentences universally quantified sentences negations modality subordinated sentences referred anaphorically subsequent sentences i.e noun phrases accessible following text thus sentences refer card anaphoric references also possible via personal pronouns via variables anaphoric references via definite articles variables combined note proper names like simplemat always refer object | [
6015,
368,
3651,
684
] | Train |
7,982 | 3 | SPARCstation_10:sparcstation 10 sparcstation 10 codenamed campus-2 workstation computer made sun microsystems announced may 1992 sun first desktop multiprocessor housed pizza box form factor case later replaced sparcstation 20 40 mhz sparcstation 10 without external cache reference spec cpu95 benchmark sparcstation 10 ss10 contains two mbus slots running either 36 mhz 33 mhz earliest models 40 mhz set via motherboard jumper mbus slot contain single dual sparc cpu modules permitting expansion four cpus supersparc hypersparc cpu modules available single supersparc modules without external cache sold sun ran clock speed mbus uniprocessor models 20 30 40 dual processor model 402 single dual supersparc modules 1 mb external cache also sold independently clocked ran higher rate mbus commonly 40.3 mhz 50 mhz uniprocessor models 41 51 multiprocessor models 412 512 514 sun dual 50 mhz supersparc modules dual mbus modules supported sun system double-width physically occupying one sbus slot per module addition mbus slot supersparc modules without external cache could mixed supersparc modules external cache could mixed even different clock speeds sun-supported configuration ross hypersparc modules also available third party vendors ss10 reasonable cooling capacity given cramped pizzabox case designed higher-speed hypersparc modules heat issues common modules used particularly four cpu configurations ss10 hold maximum 512 mb ram eight slots ss10 enclosure hold two 50-pin scsi hard drives floppy disk drive scsi devices attached via external scsi port ata disk support one onboard ethernet interface accessed built-in 10base-t jack via special 26-pin port provides aui audio connections one network ports active time special cable adapter needed convert latter port standard da-15 connector also two basic rate interface bri isdn connectors system shipped plastic blocking plugs inserted connectors additional sbus network cards also added sparcstation 10 systems lack integrated graphics referred sparcstation 10sx include sx cg14 framebuffer used sparcstation 20 requiring 4mb 8mb vsimm operate sparcstation 10s seem vsimm slots cutout case solder pads sx 13w3 connector options include cg6 gx gx+ turbo gx tgx+ 8-bit sbus framebuffers capable 1280×1024 resolution 8-bit color zx leo zx 24-bit card hardware-accelerated 3d operations offering high speeds resolutions however poorly supported takes two sbus slots runs extremely hot faster cousin turbo zx requires fan card taking four sbus slots full support available solaris 2.4 2.6 though 2.6 drivers made work solaris 7 8 9 linux includes accelerated driver supports 2d acceleration features 3d netbsd openbsd support without acceleration nextstep openstep support whatsoever ss10 holds system information mac address serial number nvram battery chip dies system able boot | [
5101,
2950,
578,
5181,
971,
7781
] | Validation |
7,983 | 2 | Softvol:softvol softvol advanced linux sound architecture alsa plugin adds software based volume control alsa audio mixer alsamixer helpful sound card hardware volume control softvol plugin built alsa require separate installation another use case softvol hardware volume control unable amplify sound beyond certain threshold thus renders audio file quiet case software amplifiers created order boost volume level price sacrificing quality many modern software pieces able play audio files alsa sound system -independent softvol controls | [] | Test |
7,984 | 4 | Splunk:splunk splunk inc. american public multinational corporation based san francisco california produces software searching monitoring analyzing machine-generated big data via web-style interface splunk product captures indexes correlates real-time data searchable repository generate graphs reports alerts dashboards visualizations splunk mission make machine data accessible across organization identifying data patterns providing metrics diagnosing problems providing intelligence business operations splunk horizontal technology used application management security compliance well business web analytics early 2016 splunk 10,000 customers worldwide splunk based san francisco regional operations across europe middle east africa asia australia michael baum rob das erik swan co-founded splunk inc 2003 venture firms august capital seven rosen ignition partners jk b capital backed company 2007 splunk raised became profitable 2009 2012 splunk initial public offering trading nasdaq symbol splk september 2013 company acquired bugsense mobile-device data-analytics company bugsense provides mobile analytics platform used developers improve app performance improve quality supplied software developer kit give developers access data analytics mobile devices managed scalable cloud platform acquisition amount undisclosed july 2015 splunk acquired caspida cybersecurity startup october 2015 splunk sealed cybersecurity alliance u.s. government security contractor booz allen hamilton inc. offer combined cyberthreat detection intelligence-analysis technology 2016 splunk pledged donate 100 million software support nonprofits schools 10-year period according glassdoor fourth highest-paying company employees united states april 2017 october 2017 splunk acquired certain technology intellectual property assets smaller rival rocana april 9 2018 splunk acquired phantom cyber corporation approximately us 350 million june 11 2018 splunk announced acquisition victorops devops incident management startup us 120 million splunk core offering collects analyzes high volumes machine-generated data uses standard api connect directly applications devices developed response demand comprehensible actionable data reporting executives outside company department splunk enterprise security es security information event management siem solution provides insight machine data generated security technologies network endpoint access malware vulnerability identity information premium application licensed independently splunk core 2011 splunk released splunk storm cloud-based version core splunk product splunk storm offered turnkey managed hosted service machine data 2013 splunk announced splunk storm would become completely free service expanded cloud offering splunk cloud 2015 splunk shut splunk storm 2013 splunk announced product called hunk splunk analytics hadoop supports accessing searching reporting external data sets located hadoop splunk interface 2015 splunk announced light version core splunk product aimed smaller it-environments mid-sized enterprises splunk debuted splunk service intelligence itsi september 2015 itsi leverages splunk data provide visibility performance software analytics detect unusual behavior determine causes areas affects 2016 google announced cloud platform integrate splunk expand areas like ops security compliance company also announced additional machine learning capabilities several major product offerings installed top platform 2017 splunk introduced splunk insights ransomware analytics tool assessing investigating potential threats ingesting event logs multiple sources software targeted toward smaller organizations like universities company also launched splunk insights aws cloud monitoring service facilitate enterprises migration amazon web services cloud 2018 splunk introduced splunk industrial asset intelligence extracts information iiot industrial internet things data various resources presents users critical alerts splunkbase community hosted splunk users go find apps add-ons splunk improve functionality usefulness splunk well provide quick easy interface specific use-cases and/or vendor products integrations splunkbase include splunk app new relic forescout extended module splunk splunk app aws splunk architectures | [
2858,
7838,
4449,
1962,
5389,
4600,
1376,
5064,
7111,
760,
8069
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.