text stringlengths 6 1.88M | source stringclasses 13
values |
|---|---|
entrust entrust inc. 130 million privately owned software company 350 employees originally spin-off nortel secure networks division provides identity management security software services areas public key infrastructure pki multifactor authentication secure socket layer ssl certificates fraud detection digital certific... | Computer security |
matt lee artist matt lee born july 21 1981 british artist comedian director software freedom activist hacker writer free software developer previously gitlab formerly technical lead creative commons 2014-2016 speaker webmaster gnu project also founded gnu social gnu fm projects 2008 2012 lee main contact behind free so... | Operating systems |
nokia n95 nokia n95 smartphone produced nokia part nseries line portable devices announced september 2006 released market march 2007 n95 ran s60 3rd edition symbian os v9.2 two-way sliding mechanism used access either media playback buttons numeric keypad first released silver later black limited edition quantities gol... | Operating systems |
input/output supervisor input/output supervisor ios ios 11 portion control program ibm mainframe os/360 successors operating systems issues privileged i/o instructions supervises resulting i/o interruptions program requests i/o device operations normal abnormal conclusion operations ios two purposes facilitate handling... | Operating systems |
toshiba t1000 toshiba t1000 laptop computer manufactured toshiba corporation 1987 similar specification ibm pc convertible 4.77 mhz 80c88 processor 512 kb ram monochrome cga-compatible lcd unlike convertible includes standard serial port parallel port connectors external monitor real-time clock unusually ibm compatible... | Computer architecture |
nordugrid nordugrid collaboration aiming development maintenance support free grid middleware known advanced resource connector arc name nordugrid first became known 2001 short project called nordic testbed wide area computing data handling funded nordic council ministers via nordunet2 programme project main goal set p... | Distributed computing architecture |
aaron swartz aaron hillel swartz november 8 1986january 11 2013 american computer programmer entrepreneur writer political organizer internet hacktivist involved development web feed format rss markdown publishing format organization creative commons website framework web.py co-founder social news site reddit given tit... | Computer security |
cybertrust cybertrust security services company formed virginia november 2004 merger trusecure betrusted cybertrust acquired large stake ubizen european security services firm based belgium become one largest information security firms world acquired verizon business 2007 2015 cybertrust root certificates acquired digi... | Computer security |
babel middleware babel open source middleware system serving scientific computing community language interoperability tool babel enables arbitrary mixing software libraries written c/c++ fortran python java distributed computing platform babel provides language-neutral remote method invocation rmi scheme similar java r... | Programming language topics |
industroyer industroyer also referred crashoverride malware framework considered used cyberattack ukraine ’ power grid december 17 2016 attack cut fifth kiev capital power one hour considered large-scale test time fourth malware publicly revealed target industrial control systems stuxnet havex blackenergy malware disco... | Computer security |
dsw command codice_1 unix command enabled deletion files non-typeable characters replaced functionality implemented codice_2 namely codice_3 | Computer file systems |
mcafee change control mcafee change control commercial file integrity monitoring solution windows- linux-based systems developed mcafee | Computer security |
capsl capsl printer command language/page description language used early canon printers including lbp-8iii series supported least lbp-8iv printers language discontinued later canon printers implementing pcl also called lips lips4 windows spool file could contain raw capsl data | Programming language topics |
zork zork great underground empire part later known zork interactive fiction video game written marc blank dave lebling bruce daniels tim anderson published infocom 1980 first game zork trilogy released wide range computer systems followed zork ii zork iii infocom first game sold 378,000 copies 1986 game takes place zo... | Computer architecture |
defragmentation maintenance file systems defragmentation process reduces degree fragmentation physically organizing contents mass storage device used store files smallest number contiguous regions fragments also attempts create larger regions free space using compaction impede return fragmentation defragmentation utili... | Computer file systems |
mod ssl mod_ssl optional module apache http server provides strong cryptography apache v1.3 v2 webserver via secure sockets layer ssl v2/v3 transport layer security tls v1 cryptographic protocols help open source ssl/tls toolkit openssl original version created apache v1.3 initially created april 1998 ralf s. engelscha... | Web technology |
molinux molinux operating system based ubuntu sponsored autonomous community castilla-la mancha fundación ínsula barataria name molinux derives spanish word molino meaning mill windmill version molinux named character classic spanish novel quixote miguel de cervantes molinux initiative begun 2005 government castilla-la... | Operating systems |
da vinci machine da vinci machine also called multi language virtual machine sun microsystems project aiming prototype extension java virtual machine jvm add support dynamic languages already possible run dynamic languages top jvm goal ease new dynamic language implementations increase performance project reference imp... | Programming language topics |
voip vulnerabilities voip vulnerable similar types attacks web connection emails prone voip attractiveness low fixed cost numerous features come risks well known developers constantly addressed risks usually mentioned business common target voip also allows use fraud shady practices people aware practices restricted pr... | Computer security |
window class computer programming window class structure fundamental microsoft windows win16 win32 win64 operating systems application programming interface api structure provides template windows may created specifying window icons menu background color features also holds pointer procedure controls window behaves res... | Operating systems |
vse operating system z/vse virtual storage extended operating system ibm mainframe computers latest one dos/360 lineage originated 1965 announced feb. 1 2005 ibm successor vsa/esa 2.7 then-new z/vsewas named reflect new system z branding ibm mainframe product line dos/vse introduced 1979 successor dos/vs turn dos/vse s... | Operating systems |
reference computer science computer science reference value enables program indirectly access particular datum variable value record computer memory storage device reference said refer datum accessing datum called dereferencing reference reference distinct datum typically references data stored memory given system refe... | Programming language topics |
synthetic file system computer science synthetic file system pseudo file system hierarchical interface non-file objects appear regular files tree disk-based long-term-storage file system non-file objects may accessed system calls utility programs regular files directories common term regular files non-file objects node... | Computer file systems |
axfs axfs advanced xip filesystem compressed read-only file system linux initially developed intel maintained numonyx designed use execute place xip alongside compression aiming reduce boot program load times retaining small memory footprint embedded devices achieved mixing compressed uncompressed pages executable file... | Computer file systems |
purble place purble place suite three computer games children teenagers developed oberon games microsoft introduced windows vista also included windows 7 publicly introduced windows vista build 5219 along chess titans mahjong titans collection single home screen offers three packs games purble pairs comfy cakes purble ... | Operating systems |
crypto api linux crypto api cryptography framework linux kernel various parts kernel deal cryptography ipsec dm-crypt introduced kernel version 2.5.45 since expanded include essentially popular block ciphers hash functions many platforms provide hardware acceleration aes encryption expose programs extension instruction... | Operating systems |
peter wegner peter a. wegner august 20 1932 – july 27 2017 computer scientist made significant contributions theory object-oriented programming 1980s relevance church–turing thesis empirical aspects computer science 1990s present 2016 wegner wrote brief autobiography conduit annual brown university computer science dep... | Programming language topics |
userland technologies userland technologies free open-source ad-free compatibility layer mobile app allows linux distributions computer programs computer games numerical computing programs run mobile devices without requiring root account userland also provides program library popular free open-source linux-based progr... | Operating systems |
brendan hannigan brendan hannigan former head international business machines ibm security systems division helped develop industry first intelligent cloud computing security portfolio also entrepreneur investor focuses security cloud software service saas startups hannigan born ireland finished bsc computer science un... | Computer security |
naviserver naviserver high performance web server written c tcl easily extended either language create web sites services 35 modules available project active development hosted sourceforge licensed terms mozilla public license mpl recent new features include naviserver based aolserver version 4.10 aol open-source web s... | Web technology |
vbscript vbscript microsoft visual basic scripting edition active scripting language developed microsoft modeled visual basic allows microsoft windows system administrators generate powerful tools managing computers error handling subroutines advanced programming constructs give user complete control many aspects compu... | Programming language topics |
trusted timestamping trusted timestamping process securely keeping track creation modification time document security means one—not even owner document—should able change recorded provided timestamper integrity never compromised administrative aspect involves setting publicly available trusted timestamp management infr... | Computer security |
anti-spam appliances anti-spam appliances software hardware devices integrated on-board software implement spam filtering and/or anti-spam instant messaging also called spim deployed gateway front mail server normally driven operating system optimized spam filtering generally used larger networks companies corporations... | Computer security |
polar modulation polar modulation analogous quadrature modulation way polar coordinates analogous cartesian coordinates quadrature modulation makes use cartesian coordinates x considering quadrature modulation x axis called in-phase axis axis called q quadrature axis polar modulation makes use polar coordinates r ampli... | Internet protocols |
coresystems coresystems ag software developing company headquartered switzerland provider field service management solutions technicians coresystems founded 2006 windisch aargau november 2013 company raised 15.5 million first round funding consortium private investors including german tech investor peter zencke former ... | Distributed computing architecture |
lasso programming language lasso application server server management interface used develop internet applications general-purpose high-level programming language originally web datasource connection tool filemaker later included apple computer filemaker 4.0 claris homepage cdml since evolved complex language used deve... | Programming language topics |
nextbsd nextbsd operating system initially based trunk version freebsd august 2015 fork freebsd implements new features developed branches yet implemented freebsd 2019 website seems defunct later commits github date july 2016 basic features launchd notifyd asld libdispatch work installed cloning nextbsd repository gith... | Operating systems |
wec le mans wec le mans racing simulation arcade game released 1986 konami first racing video game depict 24 hours le mans lap le mans split three sections time day changes day dusk dusk night night dawn game attempted realistically simulate car driving car jumping turning back forth spinning 180 degrees emphasis accel... | Computer architecture |
backup express catalogic dpx formerly bex backup express enterprise-level data protection solution backs restores data applications variety operating systems data protection disaster recovery business continuity planning capabilities catalogic dpx protects physical virtual servers including vmware supports many databas... | Computer security |
oracle cloud platform oracle cloud platform ocp platform service paas offered oracle corporation part oracle cloud platform used build deploy integrate extend applications cloud platform supports variety programming languages databases tools frameworks including oracle-specific open source third-party software systems ... | Distributed computing architecture |
server name indication server name indication sni extension transport layer security tls computer networking protocol client indicates hostname attempting connect start handshaking process allows server present multiple certificates ip address tcp port number hence allows multiple secure https websites service tls serv... | Internet protocols |
printer job language printer job language pjl method developed hewlett-packard switching printer languages job level status readback printer host computer pjl adds job level controls printer language switching job separation environment status readback device attendance file system commands pjl conceived extension prin... | Programming language topics |
sanitization classified information sanitization process removing sensitive information document message sometimes encrypting document may distributed broader audience intent secrecy protection dealing classified information sanitization attempts reduce document classification level possibly yielding unclassified docum... | Computer security |
firetide firetide american international provider wireless mesh network technology based silicon valley firetide designs sells hardware software wireless networks firetide products used 2000 installations 40 countries firetide provider hardware software wireless infrastructure mesh networks firetide founded 2001 name l... | Distributed computing architecture |
tera computer company tera computer company manufacturer high-performance computing software hardware founded 1987 washington d.c. moved 1988 seattle washington james rottsolk burton smith company first supercomputer product named mta featured interleaved multi-threading i.e barrel processor also data cache relying ins... | Computer architecture |
altq altq alternate queueing network scheduler berkeley software distribution altq provides queueing disciplines quality service qos related components required realize resource sharing commonly implemented bsd-based routers altq included base distribution freebsd netbsd dragonfly bsd integrated pf packet filter openbs... | Operating systems |
systat protocol systat active users simple internet protocol ostensibly useful debugging measurement connection port 11 either tcp udp elicits list users currently logged system though remains official internet protocol use considered security vulnerability | Internet protocols |
imuse imuse interactive music streaming engine interactive music system used number lucasarts video games idea behind imuse synchronize music visual action video game audio continuously matches on-screen events transitions one musical theme another done seamlessly imuse developed early 1990s composers michael land pete... | Distributed computing architecture |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.