text
stringlengths
31
999
source
stringclasses
5 values
PHY-Level Collision Avoidance (PLCA) is a component of the Ethernet reconciliation sublayer (between the PHY and the MAC) defined within IEEE 802. 3 clause 148. The purpose of PLCA is to avoid the shared medium collisions and associated retransmission overhead
https://huggingface.co/datasets/fmars/wiki_stem
Algorithms said to employ a Ping-Pong scheme exist in different fields of software engineering. They are characterized by an alternation between two entities. In the examples described below, these entities are communication partners, network paths or file blocks
https://huggingface.co/datasets/fmars/wiki_stem
A blog rally is the simultaneous presentation of identical or similar material on numerous blogs, for the purpose of engaging large numbers of readers and/or persuading them to adopt a certain position or take a certain action. The simultaneous nature of a blog rally can join the efforts of otherwise independent bloggers for an agreed-upon purpose. Blog Action Day can be likened to a blog rally
https://huggingface.co/datasets/fmars/wiki_stem
A blook is a printed book that contains or is based on content from a blog. The first printed blook was User Interface Design for Programmers, by Joel Spolsky, published by Apress on June 26, 2001, based on his blog Joel on Software. An early blook was written by Tony Pierce in 2002 when he compiled selected posts from his one-year-old blog and turned the collection into a book called "Blook"
https://huggingface.co/datasets/fmars/wiki_stem
Blovel (a portmanteau of blog and novel) is a novel created from serialized blog posts. This differs from a blook, which is a published book that has been made from, or inspired by, blog content. With a blovel, the story is created in and for the blog
https://huggingface.co/datasets/fmars/wiki_stem
Cyberpolitics is a term widely employed across the world, largely by academics interested in analyzing its breadth and scope, of the use of the Internet for political activity. It embraces all forms of social software. Cyberpolitics includes: journalism, fundraising, blogging, volunteer recruitment, and organization building
https://huggingface.co/datasets/fmars/wiki_stem
Extremely online (often capitalized), also known as terminally online or chronically online, is a phrase referring to someone closely engaged with Internet culture. People said to be extremely online often believe that online posts are very important. Events and phenomena can themselves be extremely online; while often used as a descriptive term, the phenomenon of extreme online usage has been described as "both a reformation of the delivery of ideas – shared through words and videos and memes and GIFs and copypasta – and the ideas themselves"
https://huggingface.co/datasets/fmars/wiki_stem
A haul video is a video recording posted to the Internet in which a person discusses items that they recently purchased, sometimes going into detail about their experiences during the purchase and the cost of the items they bought. The posting of haul videos (or hauls) was a growing trend between 2008 and 2016. Often the items bought are clothing, household goods, makeup, or jewellery
https://huggingface.co/datasets/fmars/wiki_stem
While the term "blog" was not coined until the late 1990s, the history of blogging starts with several digital precursors to it. Before "blogging" became popular, digital communities took many forms, including Usenet, commercial online services such as GEnie, BiX and the early CompuServe, e-mail lists and Bulletin Board Systems (BBS). In the 1990s, Internet forum software, such as WebEx, created running conversations with "threads"
https://huggingface.co/datasets/fmars/wiki_stem
identi. ca was a free and open-source social networking and blogging service based on the pump. io software, using the Activity Streams protocol
https://huggingface.co/datasets/fmars/wiki_stem
NewHive was both a social network and a creation engine for Web 2. 0 content. It was a web platform that encouraged users to develop their own creative content that had been coined by NewHive as, expressions
https://huggingface.co/datasets/fmars/wiki_stem
Niche blogging is the act of creating a blog with the intent of using it to market to a particular niche market. Niche blogs (also commonly referred to as "niche websites") may appeal to "geographic areas, a speciality industry, ethnic or age groups, or any other particular group of people. " While there is also debate that every blog is, in some form, a niche blog, the term as it applies to marketing refers to a particular kind of blog
https://huggingface.co/datasets/fmars/wiki_stem
Penzu is a private online diary-hosting website. Users can create written entries similar to a standard personal journal and can also upload photos from their devices. Penzu uses a freemium business model with special paid features including unique fonts, AES encryption, rich text formatting, and others
https://huggingface.co/datasets/fmars/wiki_stem
A personal style (or fashion) blogger is an individual who manages an online platform that covers several aspects of fashion. These blogs, often produced independently, post pictures of the blogger to show their outfits and lifestyle to a number of followers. They influence consumer taste and preferences, often functioning as an intermediary between businesses and consumer
https://huggingface.co/datasets/fmars/wiki_stem
A reverse blog is a type of blog that is characterized by the lack of a single, specific blogger. In a traditional blog a blogger will write his or her comments about a given topic and other users may view and sometimes comment on the bloggers work. A reverse blog is written entirely by the users, who are given a topic
https://huggingface.co/datasets/fmars/wiki_stem
Science Online was an annual conference held in Durham, North Carolina, Raleigh, North Carolina and Research Triangle Park, North Carolina, that focused on the role of the internet in science and science communication. It was attended primarily by bloggers and science journalists from North America. The conference was held annually, beginning in 2007
https://huggingface.co/datasets/fmars/wiki_stem
A sideblog is a feature on a website, particularly a blog, that allows one to communicate smaller snippets of information than an actual blog post. The reasoning is that a blog post will require thought, argument and some semantic structuring of the post, while a sideblog typically displays "brief asides". A sideblog is meant to illustrate your immediate thoughts, movements or status update, and is usually less than 200 characters
https://huggingface.co/datasets/fmars/wiki_stem
A business–education partnership is an agreement of collaboration between schools and businesses, unions, governments or community organizations. These partnerships are established by agreement between two or more parties to establish goals, and to construct a plan of action for achievement of those goals. Business-education partnerships may involve entire school boards and hundreds of students
https://huggingface.co/datasets/fmars/wiki_stem
CollabFeature is a group of independent filmmakers from all over the world who have come together to create feature films made up of multiple individual stories. Each filmmaker writes and directs their own small segment of a film in their own country. The group's first feature, The Owner, began shooting in spring of 2010 and was completed in 2012
https://huggingface.co/datasets/fmars/wiki_stem
Collaborative Control Theory (CCT) is a collection of principles and models for supporting the effective design of collaborative e-Work systems. Beyond human collaboration, advances in information and communications technologies, artificial intelligence, multi-agent systems, and cyber physical systems have enabled cyber-supported collaboration in highly distributed organizations of people, robots, and autonomous systems. The fundamental premise of CCT is: without effective augmented collaboration by cyber support, working in parallel to and in anticipation of human interactions, the potential of emerging activities such as e-Commerce, virtual manufacturing, telerobotics, remote surgery, building automation, smart grids, cyber-physical infrastructure, precision agriculture, and intelligent transportation systems cannot be fully and safely materialized
https://huggingface.co/datasets/fmars/wiki_stem
Collaborative partnerships are agreements and actions made by consenting organizations to share resources to accomplish a mutual goal. Collaborative partnerships rely on participation by at least two parties who agree to share resources, such as finances, knowledge, and people. Organizations in a collaborative partnership share common goals
https://huggingface.co/datasets/fmars/wiki_stem
Collaborative pedagogy stems from the process theory of rhetoric and composition. Collaborative pedagogy believes that students will better engage with writing, critical thinking, and revision if they engage with others. Collaborative pedagogy pushes back against the Current-Traditional model of writing, as well as other earlier theories explaining rhetoric and composition; earlier theories of writing, especially current-traditional, emphasizes writing as a final product (completed individually)
https://huggingface.co/datasets/fmars/wiki_stem
Collabrification came from the foundation of making mobile education more collaborative. From the start, it was designed to make something that was inherently non-collaborative and make it collaborative. The infrastructure has been used in the IMLC, University of Michigan, University of Texas, and the department of Mathematics and Information Technology at The Hong Kong Institute of Education
https://huggingface.co/datasets/fmars/wiki_stem
Comunes is a nonprofit organization aiming to encourage the commons and facilitating grassroots work through free software web tools. Previously known as Ourproject. org, this collective established itself as a legal entity in 2009, forming Comunes
https://huggingface.co/datasets/fmars/wiki_stem
Dashterov is a collaborative project by Armenian musicians Iveta Mukuchyan and Aram Sargsyan. Dashterov was awarded "Collaboration of the Year" at the Armenian Europe Music Awards. On 10 June 2017, the two artists presented their project at the Dalma Garden Mall
https://huggingface.co/datasets/fmars/wiki_stem
Distributed Proofreaders (commonly abbreviated as DP or PGDP) is a web-based project that supports the development of e-texts for Project Gutenberg by allowing many people to work together in proofreading drafts of e-texts for errors. As of March 2021, the site had digitized 41,000 titles. History Distributed Proofreaders was founded by Charles Franks in 2000 as an independent site to assist Project Gutenberg
https://huggingface.co/datasets/fmars/wiki_stem
euromuse. net is an exhibition web portal, that, being a project of certain European museums, informs about the exhibitions of that museums, that mostly are based on cultural history and the history of arts of Europe. Content The portal collects information about exhibitions, institution and collections of European museums on its website
https://huggingface.co/datasets/fmars/wiki_stem
Find a Grave is a website that allows the public to search and add to an online database of human and pet cemetery records. It is owned by Ancestry. com
https://huggingface.co/datasets/fmars/wiki_stem
Gitea () is a forge software package for hosting software development version control using Git as well as other collaborative features like bug tracking, code review, continuous integration, kanban boards, tickets, and wikis. It supports self-hosting but also provides a free public first-party instance. It is a fork of Gogs and is written in Go
https://huggingface.co/datasets/fmars/wiki_stem
GitHub, Inc. () is a platform and cloud-based service for software development and version control using Git, allowing developers to store and manage their code. It provides the distributed version control of Git plus access control, bug tracking, software feature requests, task management, continuous integration, and wikis for every project
https://huggingface.co/datasets/fmars/wiki_stem
The Global Urban Evolution Project is an international collaborative project which was started by Marc T. J. Johnson at the Centre for Urban Environments of the University of Toronto Mississauga (UTM)
https://huggingface.co/datasets/fmars/wiki_stem
The Great Tapestry of Scotland is one of the world's largest community arts projects, hand stitched by 1,000 people from across Scotland. It is made up of 160 linen panels and 300 miles of wool – enough to stretch the entire length of Scotland. It is now on permanent display in its own purpose-built gallery and visitor centre in the town of Galashiels in the heartland of the Scottish Borders
https://huggingface.co/datasets/fmars/wiki_stem
The Journey is an art installation on the subject of human trafficking. Through a series of seven linked transport containers it depicts the experiences of women sold into the sex trade. The installation's individual containers were designed by artists including Anish Kapoor, Sandy Powell and Michael Howells
https://huggingface.co/datasets/fmars/wiki_stem
LibriVox is a group of worldwide volunteers who read and record public domain texts, creating free public domain audiobooks for download from their website and other digital library hosting sites on the internet. It was founded in 2005 by Hugh McGuire to provide "Acoustical liberation of books in the public domain" and the LibriVox objective is "To make all books in the public domain available, for free, in audio format on the internet". On 6 August 2016, the completed projects numbered 10,000, and on 14 February 2021 there were 15,000 completed projects
https://huggingface.co/datasets/fmars/wiki_stem
The Millennium Mathematics Project (MMP) was set up within the University of Cambridge in England as a joint project between the Faculties of Mathematics and Education in 1999. The MMP aims to support maths education for pupils of all abilities from ages 5 to 19 and promote the development of mathematical skills and understanding, particularly through enrichment and extension activities beyond the school curriculum, and to enhance the mathematical understanding of the general public. The project was directed by John Barrow from 1999 until September 2020
https://huggingface.co/datasets/fmars/wiki_stem
The Mutopia Project is a volunteer-run effort to create a library of free content sheet music, in a way similar to Project Gutenberg's library of public domain books. It started in 2000. The music is reproduced from old scores that are in the public domain
https://huggingface.co/datasets/fmars/wiki_stem
OneGeology is an international collaborative project in the field of geology supported by 118 countries, UNESCO, and major global geoscience bodies. It is an International Year of Planet Earth flagship initiative that aims to enable online access to dynamic digital geological map of the world for everyone. The project uses the GeoSciML markup language and initially targets a scale of approximately 1:1 million
https://huggingface.co/datasets/fmars/wiki_stem
The Owner is a multi-director, international feature film that follows a backpack around the world, on its way back to its owner. It is the first film produced by CollabFeature, a group of independent filmmakers from all over the world. Each filmmaker wrote and directed his or her own short segment of the film in his or her own country
https://huggingface.co/datasets/fmars/wiki_stem
Peer production (also known as mass collaboration) is a way of producing goods and services that relies on self-organizing communities of individuals. In such communities, the labor of many people is coordinated towards a shared outcome. Overview Peer production is a process taking advantage of new collaborative possibilities afforded by the internet and has become a widespread mode of labor
https://huggingface.co/datasets/fmars/wiki_stem
QuickCode (formerly ScraperWiki) was a web-based platform for collaboratively building programs to extract and analyze public (online) data, in a wiki-like fashion. "Scraper" refers to screen scrapers, programs that extract data from websites. "Wiki" means that any user with programming experience can create or edit such programs for extracting new data, or for analyzing existing datasets
https://huggingface.co/datasets/fmars/wiki_stem
r/place is a recurring collaborative project and social experiment hosted on the content aggregator site Reddit. Originally launched on April Fools' Day 2017, it has since been repeated again on April Fools' Day 2022 and on July 20, 2023. The 2017 experiment involved an online canvas located at a subreddit called r/place
https://huggingface.co/datasets/fmars/wiki_stem
A reanimated collaboration (often shortened to reanimated collab or reanimate) is a type of collaborative fan-made animation project wherein each animator recreates one shot of an existing film in their own style. The individual works are then stitched into the original order and published on the internet as a completed collaboration, creating a collaborative tribute to the original film. This differs from a shot-for-shot recreation, as the goal of a reanimate is to display each of the independent animators' unique stylings rather than to produce a unified or identical result
https://huggingface.co/datasets/fmars/wiki_stem
The Ribbon International is a United Nations non-governmental organization that created a large decorated cloth promoting nuclear disarmament and care and protection of the earth. In an event held on August 4, 1985, panels were connected in an 18 miles (29 km) long strip stretching from the Pentagon into Washington D. C
https://huggingface.co/datasets/fmars/wiki_stem
RIPFEST collaborative film project is an annual filmmaking project run by a collaborative group of film and television producers and past participants. The organization assigns several teams of filmmakers and gives them two weeks to write, shoot, and edit a complete, original short film. Started in 2002, there have been 12 RIPFEST events in New York City and Los Angeles, producing more than 80 original short films
https://huggingface.co/datasets/fmars/wiki_stem
The SCAR Project is a series of large-scale portraits of young breast cancer survivors shot by fashion photographer David Jay. Origins Jay was inspired to begin shooting The Scar Project in 2005, when a friend was diagnosed with breast cancer at age 29. Since then, Jay has photographed over 100 young women ages 18–35 across the nation
https://huggingface.co/datasets/fmars/wiki_stem
Social audio is a subclass of social media that designates social media platforms that use audio as their primary channel of communication. This can include text messages, podcasts, tools for recording and editing audio in addition to virtual audio rooms. Still in an evolutionary state, different companies that develop social audio products are still trying to figure out what works for their users, and what doesn't
https://huggingface.co/datasets/fmars/wiki_stem
Social media are interactive technologies that facilitate the creation and sharing of information, ideas, interests, and other forms of expression through virtual communities and networks. While challenges to the definition of social media arise due to the variety of stand-alone and built-in social media services currently available, there are some common features: Social media are interactive Web 2. 0 Internet-based applications
https://huggingface.co/datasets/fmars/wiki_stem
SplatSpace is a multidisciplinary collaborative workspace located in Durham, North Carolina. SplatSpace, also known as SplatSpace: Durham's HackerSpace, and previously as Durham's MakerSpace is a 501(c)(3) non-profit organization composed primarily of people from the local maker community. Classifiable as a Hackerspace or Makerspace, the majority of activities members are involved in typically revolve around technology, however, traditional skills such as wood-working, metal working, textiles, arts and crafts are represented as well
https://huggingface.co/datasets/fmars/wiki_stem
In computer security, pass the hash is a hacking technique that allows an attacker to authenticate to a remote server or service by using the underlying NTLM or LanMan hash of a user's password, instead of requiring the associated plaintext password as is normally the case. It replaces the need for stealing the plaintext password to gain access with stealing the hash. The attack exploits an implementation weakness in the authentication protocol, where password hashes remain static from session to session until the password is next changed
https://huggingface.co/datasets/fmars/wiki_stem
Power analysis is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device. These attacks rely on basic physical properties of the device: semiconductor devices are governed by the laws of physics, which dictate that changes in voltages within the device require very small movements of electric charges (currents). By measuring those currents, it is possible to learn a small amount of information about the data being manipulated
https://huggingface.co/datasets/fmars/wiki_stem
TEMPEST is a U. S. National Security Agency specification and a NATO certification referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations
https://huggingface.co/datasets/fmars/wiki_stem
In cryptography, a timing attack is a side-channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms. Every logical operation in a computer takes time to execute, and the time can differ based on the input; with precise measurements of the time for each operation, an attacker can work backwards to the input. Finding secrets through timing information may be significantly easier than using cryptanalysis of known plaintext, ciphertext pairs
https://huggingface.co/datasets/fmars/wiki_stem
Transient execution CPU vulnerabilities are vulnerabilities in a computer system in which a speculative execution optimization implemented in a microprocessor is exploited to leak secret data to an unauthorized party. The classic example is Spectre that gave its name to the cache-attack category of side-channel attacks, but since January 2018 many different cache-attack vulnerabilities have been identified. Overview Modern computers are highly parallel devices, composed of components with very different performance characteristics
https://huggingface.co/datasets/fmars/wiki_stem
An algorithmic complexity attack (ACA) is a form of attack in which the system is attacked by an exhaustion resource to take advantage of worst-case performance. Algorithmic complexity Algorithmic complexity is the rate in which an algorithm performs. Although there are multiple ways to solve a computational problem, the best and most effective way in doing so matters
https://huggingface.co/datasets/fmars/wiki_stem
In computer security, a billion laughs attack is a type of denial-of-service (DoS) attack which is aimed at parsers of XML documents. It is also referred to as an XML bomb or as an exponential entity expansion attack. Details The example attack consists of defining 10 entities, each defined as consisting of 10 of the previous entity, with the document consisting of a single instance of the largest entity, which expands to one billion copies of the first entity
https://huggingface.co/datasets/fmars/wiki_stem
A regular expression denial of service (ReDoS) is an algorithmic complexity attack that produces a denial-of-service by providing a regular expression and/or an input that takes a long time to evaluate. The attack exploits the fact that many regular expression implementations have super-linear worst-case complexity; on certain regex-input pairs, the time taken can grow polynomially or exponentially in relation to the input size. An attacker can thus cause a program to spend substantial time by providing a specially crafted regular expression and/or input
https://huggingface.co/datasets/fmars/wiki_stem
In computing, a zip bomb, also known as a decompression bomb or zip of death, is a malicious archive file designed to crash or render useless the program or system reading it. It is often employed to disable antivirus software, in order to create an opening for more traditional malware. A zip bomb allows a program to function normally, but, instead of hijacking the program's operation, creates an archive that requires an excessive amount of time, disk space, or memory to unpack
https://huggingface.co/datasets/fmars/wiki_stem
Linux malware includes viruses, Trojans, worms and other types of malware that affect the Linux family of operating systems. Linux, Unix and other Unix-like computer operating systems are generally regarded as very well-protected against, but not immune to, computer viruses. Linux vulnerability Like Unix systems, Linux implements a multi-user environment where users are granted specific privileges and there is some form of access control implemented
https://huggingface.co/datasets/fmars/wiki_stem
Daemon and Freedom™ comprise a two-part novel by the author Daniel Suarez about a distributed, persistent computer application, the Daemon, that begins to change the real world after the original programmer's death. Daemon (2006) ISBN 978-0-9786271-0-2 paperback; (2009) hardcover re-release ISBN 978-0-525-95111-7 Freedom™ (2010) ISBN 978-0-525-95157-5 Plot Upon publication of the obituary for Matthew A. Sobol, a brilliant computer programmer and CTO of Cyberstorm Entertainment, a daemon is activated
https://huggingface.co/datasets/fmars/wiki_stem
"DC One Million" is a comic book crossover storyline that ran through a self-titled, weekly miniseries and through special issues of almost all of the "DCU" titles published by DC Comics in November 1998. It featured a vision of the DC Universe in the 853rd century (85,201–85,300 AD), chosen because that is the century in which DC Comics would have published issue #1,000,000 of their comics if they had maintained a regular publishing schedule. The miniseries was written by Grant Morrison and drawn by Val Semeiks
https://huggingface.co/datasets/fmars/wiki_stem
"Infinite Crisis" is a 2005–2006 comic book storyline published by DC Comics, consisting of an eponymous, seven-issue comic book limited series written by Geoff Johns and illustrated by Phil Jimenez, George Pérez, Ivan Reis, and Jerry Ordway, and a number of tie-in books. The main miniseries debuted in October 2005, and each issue was released with two variant covers: one by Pérez and one by Jim Lee and Sandra Hope. The series storyline was a sequel to DC's 1985 limited series Crisis on Infinite Earths, which "rebooted" much of the DC continuity in an effort to fix 50 years of allegedly contradictory character history
https://huggingface.co/datasets/fmars/wiki_stem
Intrusion Countermeasures Electronics (ICE) is a term used in cyberpunk literature to refer to security programs which protect computerized data from being accessed by hackers. Origin of term The term was popularized by William Gibson in his short story "Burning Chrome", which also introduced the term cyberspace, and in his subsequent novel Neuromancer. According to the Jargon File, as well as Gibson's own acknowledgements, the term ICE was originally coined by Tom Maddox
https://huggingface.co/datasets/fmars/wiki_stem
The Reality Bug is the fourth book in the Pendragon series by D. J. MacHale
https://huggingface.co/datasets/fmars/wiki_stem
Terminator 3: Rise of the Machines is a 2003 science fiction action film directed by Jonathan Mostow. Starring Arnold Schwarzenegger, Nick Stahl, Claire Danes, and Kristanna Loken, it is the third installment in the Terminator franchise and a sequel to Terminator 2: Judgment Day (1991). In its plot, the malevolent artificial intelligence Skynet sends a T-X (Loken)—a highly advanced Terminator—back in time to ensure the rise of machines by killing top members of the future human resistance as John Connor's (Stahl) location is unknown
https://huggingface.co/datasets/fmars/wiki_stem
The Wagadu Chronicles is an afro-fantasy massively multiplayer online role-playing game created by Twin Drums studios. The concept began as a pen-and-paper role-playing setting designed for Dungeons & Dragons 5th edition. Setting The fantasy world of Wagadu is based on African mythology
https://huggingface.co/datasets/fmars/wiki_stem
ToeJam & Earl: Back in the Groove is the fourth entry in the ToeJam & Earl series of video games. The game was developed by HumaNature Studios, founded by series creator Greg Johnson, and published by the studio on March 1, 2019. It is the first new entry in the series since 2002's Mission to Earth, as well as the first entry that Sega had no involvement with
https://huggingface.co/datasets/fmars/wiki_stem
Volgarr the Viking (stylized as Völgarr the Viking) is a platform game developed by Crazy Viking Studios. Inspired by side-scrolling platform games from the 1980s like Rastan and Ghosts 'n Goblins, the game is a modern interpretation of the genre, while retaining both the graphical style and the difficulty level of the earlier titles. After a successful Kickstarter campaign to crowd-fund the production of the game, Volgarr the Viking was published on Steam by Adult Swim Games in September 2013 and is supported on Windows, OS X and Linux-based personal computers
https://huggingface.co/datasets/fmars/wiki_stem
The Wild Eight is a survival game developed by Fntastic and published by HypeTrain Digital. Players control people stranded in the harsh wilderness of Alaska and must cooperate to survive. Gameplay VG247 identified inspiration from Diablo and Don't Starve
https://huggingface.co/datasets/fmars/wiki_stem
The Wonderful 101 is an action-adventure game developed by PlatinumGames and published by Nintendo for the Wii U. The game was directed by Hideki Kamiya and produced by Atsushi Inaba; the pair also worked together on the Viewtiful Joe series and Ōkami. It was released in August 2013 in all major regions except North America, where it released the following month
https://huggingface.co/datasets/fmars/wiki_stem
Geosocial networking is a type of social networking in which geographic services and capabilities such as geocoding and geotagging are used to enable additional social dynamics. User-submitted location data or geolocation techniques can allow social networks to connect and coordinate users with local people or events that match their interests. Geolocation on web-based social network services can be IP-based or use hotspot trilateration
https://huggingface.co/datasets/fmars/wiki_stem
A location-based game (also location-enabled game, geolocation-based game, or simply geo game) is a type of game in which the gameplay evolves and progresses via a player's location. Location-based games must provide some mechanism to allow the player to report their location, usually with GPS. Many location-based games are video games that run on a mobile phone with GPS capability, known as location-based video games
https://huggingface.co/datasets/fmars/wiki_stem
Brightkite was a location-based social networking website. Users were able to "check in" at places by using text messaging or one of the mobile applications and they were able to see who is nearby and who has been there before. The service was created in 2007 by Brady Becker, Martin May, and Alan Seideman who previously founded the SMS notification service Loopnote
https://huggingface.co/datasets/fmars/wiki_stem
Bumble is an online dating and networking application. Profiles of potential matches are displayed to users, who can "swipe left" to reject a candidate or "swipe right" to indicate interest. In heterosexual matches, only female users can make the first contact with matched male users, while in homosexual matches either person can send a message first
https://huggingface.co/datasets/fmars/wiki_stem
CitySourced is a civic engagement SaaS (Software as a Service) platform that connects citizens to local government agencies and the services they provide. The platform provides HTML5 and iOS/Android citizen-facing client applications that connect with a CRM and Service Request Management application tailored specifically for use within the public sector. History In 2006, Jason Kiesel created FreedomSpeaks, a non-partisan political social network that enabled citizens to start grassroots activist campaigns targeting their publicly elected officials
https://huggingface.co/datasets/fmars/wiki_stem
DOWN is a location-based social networking and online dating application for users looking for casual relationships and hookups. Users can swipe up for more serious dating, swipe down for casual hookups, or left to pass, and continue to the next profile. DOWN bills itself as a open-minded, sex-positive alternative to other dating apps
https://huggingface.co/datasets/fmars/wiki_stem
Feeld (previously called 3nder) is a location-based online dating application for iOS and Android that facilitates communication between people interested in ethical non-monogamy, polyamory, casual sex, kink, swinging, and other alternative relationship models and sexual preferences. According to a review from The New York Times, over a third of users are on the app with a partner, and 45 percent identify as something other than heterosexual. 3nder was launched in the UK in July 2014 and in the US in 2015
https://huggingface.co/datasets/fmars/wiki_stem
Geocaching (, JEE-oh-KASH-ing) is an outdoor recreational activity, in which participants use a Global Positioning System (GPS) receiver or mobile device and other navigational techniques to hide and seek containers, called "geocaches" or "caches", at specific locations marked by coordinates all over the world. As of 2023, there are over 3 million active caches worldwide. Geocaching can be considered a location-based game
https://huggingface.co/datasets/fmars/wiki_stem
Clodomiro Picado Twight (April 17, 1887 - May 16, 1944), also known as "Clorito Picado", was a Costa Rican scientist who was internationally recognized for his pioneering research on snake venom and the development of various antivenins. His work on molds was a precursor to the formal discovery of penicillin and resulted in compounds which he used to treat patients at least one year before the re-discovery of penicillin by Alexander Fleming. He wrote over 115 works, mainly books and monographs
https://huggingface.co/datasets/fmars/wiki_stem
Zdravko Lorković (3 January 1900 in Zagreb – 11 November 1998 in Zagreb) was a Croatian biologist, entomologist and geneticist. Lorković was a professor at the University of Zagreb where he graduated in biology. He acquired a doctorate in biology in Ljubljana under Jovan Hadži
https://huggingface.co/datasets/fmars/wiki_stem
In information technology, benchmarking of computer security requires measurements for comparing both different IT systems and single IT systems in dedicated situations. The technical approach is a pre-defined catalog of security events (security incident and vulnerability) together with corresponding formula for the calculation of security indicators that are accepted and comprehensive. Information security indicators have been standardized by the ETSI Industrial Specification Group (ISG) ISI
https://huggingface.co/datasets/fmars/wiki_stem
Information sensitivity is the control of access to information or knowledge that might result in loss of an advantage or level of security if disclosed to others. Loss, misuse, modification, or unauthorized access to sensitive information can adversely affect the privacy or welfare of an individual, trade secrets of a business or even the security and international relations of a nation depending on the level of sensitivity and nature of the information. Non-sensitive information Public information This refers to information that is already a matter of public record or knowledge
https://huggingface.co/datasets/fmars/wiki_stem
Information Systems Security Association (ISSA) is a not-for-profit, international professional organization of information security professionals and practitioners. It was founded in 1984 after work on its establishment started in 1982. ISSA promotes the sharing of information security management practices through educational forums, publications and networking opportunities among security professionals
https://huggingface.co/datasets/fmars/wiki_stem
The Information Trust Institute (ITI) was founded in 2004 as an interdisciplinary unit designed to approach information security research from a systems perspective. It examines information security by looking at what makes machines, applications, and users trustworthy. Its mission is to create computer systems, software, and networks that society can depend on to be trustworthy, meaning secure, dependable (reliable and available), correct, safe, private, and survivable
https://huggingface.co/datasets/fmars/wiki_stem
Information technology risk, IT risk, IT-related risk, or cyber risk is any risk relating to information technology. While information has long been appreciated as a valuable and important asset, the rise of the knowledge economy and the Digital Revolution has led to organizations becoming increasingly dependent on information, information processing and especially IT. Various events or incidents that compromise IT in some way can therefore cause adverse impacts on the organization's business processes or mission, ranging from inconsequential to catastrophic in scale
https://huggingface.co/datasets/fmars/wiki_stem
IT risk management is the application of risk management methods to information technology in order to manage IT risk, i. e. : The business risk associated with the use, ownership, operation, involvement, influence and adoption of IT within an enterprise or organizationIT risk management can be considered a component of a wider enterprise risk management system
https://huggingface.co/datasets/fmars/wiki_stem
Key management refers to management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys. It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols
https://huggingface.co/datasets/fmars/wiki_stem
MISP Threat Sharing (MISP) is an open source threat intelligence platform. The project develops utilities and documentation for more effective threat intelligence, by sharing indicators of compromise. There are several organizations who run MISP instances, who are listed on the website
https://huggingface.co/datasets/fmars/wiki_stem
Mayfield's Paradox states that to keep everyone out of an information system requires an infinite amount of money, and to get everyone onto an information system also requires infinite money, while costs between these extremes are relatively low. The paradox is depicted as a U-curve, where the cost of a system is on the vertical axis, and the percentage of humanity that can access the system is on the horizontal axis. Acceptance of this paradox by the information security community was immediate, because it was consistent with the professional experiences of this group
https://huggingface.co/datasets/fmars/wiki_stem
In 1991, John McCumber created a model framework for establishing and evaluating information security (information assurance) programs, now known as The McCumber Cube. This security model is depicted as a three-dimensional Rubik's Cube-like grid. The concept of this model is that, in developing information assurance systems, organizations must consider the interconnectedness of all the different factors that impact them
https://huggingface.co/datasets/fmars/wiki_stem
Medical data, including patients' identity information, health status, disease diagnosis and treatment, and biogenetic information, not only involve patients' privacy but also have a special sensitivity and important value, which may bring physical and mental distress and property loss to patients and even negatively affect social stability and national security once leaked. However, the development and application of medical AI must rely on a large amount of medical data for algorithm training, and the larger and more diverse the amount of data, the more accurate the results of its analysis and prediction will be. However, the application of big data technologies such as data collection, analysis and processing, cloud storage, and information sharing has increased the risk of data leakage
https://huggingface.co/datasets/fmars/wiki_stem
Misuse detection actively works against potential insider threats to vulnerable computer data. Misuse Misuse detection is an approach to detecting computer attacks. In a misuse detection approach, abnormal system behaviour is defined first, and then all other behaviour is defined as normal
https://huggingface.co/datasets/fmars/wiki_stem
Multi-party authorization (MPA) is a process to protect a telecommunications network, data center or industrial control system from undesirable acts by a malicious insider or inexperienced technician acting alone. MPA requires that a second authorized user approve an action before it is allowed to take place. This pro-actively protects data or systems from an undesirable act
https://huggingface.co/datasets/fmars/wiki_stem
MyDLP is a data loss prevention solution originally available released as free and open source software. Supported data inspection channels include web, mail, instant messaging, file transfer to removable storage devices and printers. The MyDLP development project originally made its source code available under the terms of the GNU General Public License
https://huggingface.co/datasets/fmars/wiki_stem
The NIST RBAC model is a standardized definition of role-based access control. Although originally developed by the National Institute of Standards and Technology, the standard was adopted and is copyrighted and distributed as INCITS 359-2004 by the International Committee for Information Technology Standards (INCITS). The latest version is INCITS 359-2012
https://huggingface.co/datasets/fmars/wiki_stem
The Offline Private Key Protocol (OPKP) is a cryptographic protocol to prevent unauthorized access to back up or archive data. The protocol results in a public key that can be used to encrypt data and an offline private key that can later be used to decrypt that data. The protocol is based on three rules regarding the key
https://huggingface.co/datasets/fmars/wiki_stem
Password fatigue is the feeling experienced by many people who are required to remember an excessive number of passwords as part of their daily routine, such as to log in to a computer at work, undo a bicycle lock or conduct banking from an automated teller machine. The concept is also known as password chaos or more broadly as identity chaos. Causes The increasing prominence of information technology and the Internet in employment, finance, recreation and other aspects of people's lives, and the ensuing introduction of secure transaction technology, has led to people accumulating a proliferation of accounts and passwords
https://huggingface.co/datasets/fmars/wiki_stem
Relocatable user backup (RUB) is the ability to restore or relocate backups to another system or site. It is one of the primary ways to mitigate the threat of service-provider lock-in in a software as a service model. It also provides a backup in the event that the service-provider suffers a catastrophic failure
https://huggingface.co/datasets/fmars/wiki_stem
Redaction or sanitization is the process of removing sensitive information from a document so that it may be distributed to a broader audience. It is intended to allow the selective disclosure of information. Typically, the result is a document that is suitable for publication or for dissemination to others rather than the intended audience of the original document
https://huggingface.co/datasets/fmars/wiki_stem
In network security a screened subnet refers to the use of one or more logical screening routers as a firewall to define three separate subnets: an external router (sometimes called an access router), that separates the external network from a perimeter network, and an internal router (sometimes called a choke router) that separates the perimeter network from the internal network. The perimeter network, also called a border network or demilitarized zone (DMZ), is intended for hosting servers (sometimes called bastion hosts) that are accessible from or have access to both the internal and external networks. The purpose of a screened subnet or DMZ is to establish a network with heightened security that is situated between an external and presumed hostile network, such as the Internet or an extranet, and an internal network
https://huggingface.co/datasets/fmars/wiki_stem
Security controls are safeguards or countermeasures to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets. In the field of information security, such controls protect the confidentiality, integrity and availability of information. Systems of controls can be referred to as frameworks or standards
https://huggingface.co/datasets/fmars/wiki_stem