text
stringlengths
31
999
source
stringclasses
5 values
Security convergence refers to the convergence of two historically distinct security functions – physical security and information security – within enterprises; both are integral parts of a coherent risk management program. Security convergence is motivated by the recognition that corporate assets are increasingly information-based. In the past, physical assets demanded the bulk of protection efforts, whereas information assets are demanding increasing attention
https://huggingface.co/datasets/fmars/wiki_stem
Security information and event management (SIEM) is a field within the field of computer security, where software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by applications and network hardware. Vendors sell SIEM as software, as appliances, or as managed services; these products are also used to log security data and generate reports for compliance purposes
https://huggingface.co/datasets/fmars/wiki_stem
Security orchestration, automation and response (SOAR) is a group of cybersecurity technologies that allow organizations to respond to some incidents automatically. It collects inputs monitored by the security operations team such as alerts from the SIEM system, TIP, and other security technologies and helps define, prioritize, and drive standardized incident response activities. Organizations uses SOAR platforms to improve the efficiency of physical and digital security operations
https://huggingface.co/datasets/fmars/wiki_stem
A self-destruct is a mechanism that can cause an object to destroy itself or render itself inoperable after a predefined set of circumstances has occurred. Self-destruct mechanisms are typically found on devices and systems where malfunction could endanger large numbers of people. Uses Land mines Some types of modern land mines are designed to self-destruct, or chemically render themselves inert after a period of weeks or months to reduce the likelihood of friendly casualties during the conflict or civilian casualties after the conflict's end
https://huggingface.co/datasets/fmars/wiki_stem
Separation of duties (SoD), also known as segregation of duties, is the concept of having more than one person required to complete a task. It is an administrative control used by organisations to prevent fraud, sabotage, theft, misuse of information, and other security compromises. In the political realm, it is known as the separation of powers, as can be seen in democracies where the government is separated into three independent branches: a legislature, an executive, and a judiciary
https://huggingface.co/datasets/fmars/wiki_stem
In IT security, a sheep-dip is the process of using a dedicated device to test inbound files on removable media for viruses before they are allowed to be used with other computers. The name sheep-dip is derived from a method of preventing the spread of parasites in a flock of sheep by dipping the new animals that farmers are adding to the flock in a trough of pesticide. The term has been applied to IT security since at least the early 1990s, though footbath was also used at the time
https://huggingface.co/datasets/fmars/wiki_stem
The Signed and Encrypted Email Over the Internet (SEEOTI) initiative is an approach to providing small and medium enterprises with the ability to communicate securely with one another, government defence ministries and major aerospace and defence contractors, allowing them to play a full part in the defence supply chain. Overview SEEOTI implements the secure email specifications defined by the Transglobal Secure Collaboration Program (TSCP). These support interoperable signing and encryption of email messages in a federated environment
https://huggingface.co/datasets/fmars/wiki_stem
Single-loss expectancy (SLE) is the monetary value expected from the occurrence of a risk on an asset. It is related to risk management and risk assessment. Single-loss expectancy is mathematically expressed as: Where the exposure factor is represented in the impact of the risk over the asset, or percentage of asset lost
https://huggingface.co/datasets/fmars/wiki_stem
The Standard of Good Practice for Information Security (SOGP), published by the Information Security Forum (ISF), is a business-focused, practical and comprehensive guide to identifying and managing information security risks in organizations and their supply chains. The most recent edition is 2020, an update of the 2018 edition. A 2022 edition is coming
https://huggingface.co/datasets/fmars/wiki_stem
In computing, a stateful firewall is a network-based firewall that individually tracks sessions of network connections traversing it. Stateful packet inspection, also referred to as dynamic packet filtering, is a security feature often used in non-commercial and business networks. Description A stateful firewall keeps track of the state of network connections, such as TCP streams, UDP datagrams, and ICMP messages, and can apply labels such as LISTEN, ESTABLISHED, or CLOSING
https://huggingface.co/datasets/fmars/wiki_stem
SWIPSY was a firewall toolkit produced by the Defence Evaluation and Research Agency in the UK (later QinetiQ). The SWIPSY toolkit was an ITSEC E3 (equivalent to Common Criteria EAL4) evaluated product that allowed additional code to be added to its security ‘compartments’ without affecting the evaluation status of the toolkit itself. SWIPSY had security properties that assured network and process separation
https://huggingface.co/datasets/fmars/wiki_stem
Threat intelligence is the "cyclical practice" of planning, collecting, processing, analyzing and disseminating information that poses a threat to applications and systems. Threat intelligence collects information in real-time to showcase the threat landscape for identifying threats to a computer, application or network. This information is gathered from a number of resources and compiled into a single database enabling visibility into vulnerabilities and exploits actively being used on the internet (in the wild) by threat actors
https://huggingface.co/datasets/fmars/wiki_stem
Threat Intelligence Platform (TIP) is an emerging technology discipline that helps organizations aggregate, correlate, and analyze threat data from multiple sources in real time to support defensive actions. TIPs have evolved to address the growing amount of data generated by a variety of internal and external resources (such as system logs and threat intelligence feeds) and help security teams identify the threats that are relevant to their organization. By importing threat data from multiple sources and formats, correlating that data, and then exporting it into an organization’s existing security systems or ticketing systems, a TIP automates proactive threat management and mitigation
https://huggingface.co/datasets/fmars/wiki_stem
Transient-key cryptography is a form of public-key cryptography wherein keypairs are generated and assigned to brief intervals of time instead of to individuals or organizations, and the blocks of cryptographic data are chained through time. In a transient-key system, private keys are used briefly and then destroyed, which is why it is sometimes nicknamed “disposable crypto. ” Data encrypted with a private key associated with a specific time interval can be irrefutably linked to that interval, making transient-key cryptography particularly useful for digital trusted timestamping
https://huggingface.co/datasets/fmars/wiki_stem
In information security, transshipment is a technique for protecting software services and applications by ensuring they only receive data that they are known to be able to handle safely. The term is analogous to that in the logistics industry where cargo is offloaded from one means of transport and on to another at a port of entry. With transshipment, information is extracted from the data used to send it and then encoded as data that can be handled safely
https://huggingface.co/datasets/fmars/wiki_stem
A paper key is a machine-readable print of a cryptographic key. The printed key can be used to decrypt data, e. g
https://huggingface.co/datasets/fmars/wiki_stem
This page is a time-line of published security lapses committed by governmental entities in the UK, including data security breaches. This article does not attempt to capture security vulnerabilities. Timeline 1980s 1990s 2000s December 2004 - An undercover journalist reportedly entered restricted areas and walked unchecked and unnoticed around passenger aircraft due to take off from London Heathrow airport
https://huggingface.co/datasets/fmars/wiki_stem
In the field of information security, user activity monitoring (UAM) is the monitoring and recording of user actions. UAM captures user actions, including the use of applications, windows opened, system commands executed, checkboxes clicked, text entered/edited, URLs visited and nearly every other on-screen event to protect data by ensuring that employees and contractors are staying within their assigned tasks, and posing no risk to the organization. User activity monitoring software can deliver video-like playback of user activity and process the videos into user activity logs that keep step-by-step records of user actions that can be searched and analyzed to investigate any out-of-scope activities
https://huggingface.co/datasets/fmars/wiki_stem
Vera is an enterprise data security and information rights management platform that provides encryption and tracks and controls digital information shared across users, devices, applications, and platforms. Vera gives developers access to its IRM-as-a-service (IRMaaS) platform via a REST API and downloadable software development kit. History Vera launched its product in April 2015
https://huggingface.co/datasets/fmars/wiki_stem
A virtual private database or VPD masks data in a larger database so that only a subset of the data appears to exist, without actually segregating data into different tables, schemas or databases. A typical application is constraining sites, departments, individuals, etc. to operate only on their own records and at the same time allowing more privileged users and operations (e
https://huggingface.co/datasets/fmars/wiki_stem
In computing, a wireless intrusion prevention system (WIPS) is a network device that monitors the radio spectrum for the presence of unauthorized access points (intrusion detection), and can automatically take countermeasures (intrusion prevention). Purpose The primary purpose of a WIPS is to prevent unauthorized network access to local area networks and other information assets by wireless devices. These systems are typically implemented as an overlay to an existing Wireless LAN infrastructure, although they may be deployed standalone to enforce no-wireless policies within an organization
https://huggingface.co/datasets/fmars/wiki_stem
Avro is a row-oriented remote procedure call and data serialization framework developed within Apache's Hadoop project. It uses JSON for defining data types and protocols, and serializes data in a compact binary format. Its primary use is in Apache Hadoop, where it can provide both a serialization format for persistent data, and a wire format for communication between Hadoop nodes, and from client programs to the Hadoop services
https://huggingface.co/datasets/fmars/wiki_stem
In computer programming, Base64 is a group of binary-to-text encoding schemes that represent binary data (more specifically, a sequence of 8-bit bytes) in sequences of 24 bits that can be represented by four 6-bit Base64 digits. As with all binary-to-text encoding schemes, Base64 is designed to carry data stored in binary formats across channels that only reliably support text content. Base64 is particularly prevalent on the World Wide Web where one of its uses is the ability to embed image files or other binary assets inside textual assets such as HTML and CSS files
https://huggingface.co/datasets/fmars/wiki_stem
Concise Binary Object Representation (CBOR) is a binary data serialization format loosely based on JSON authored by C. Bormann. Like JSON it allows the transmission of data objects that contain name–value pairs, but in a more concise manner
https://huggingface.co/datasets/fmars/wiki_stem
Common Data Representation (CDR) is used to represent structured or primitive data types passed as arguments or results during remote invocations on Common Object Request Broker Architecture (CORBA) distributed objects. It enables clients and servers written in different programming languages to work together. For example, it translates little-endian to big-endian
https://huggingface.co/datasets/fmars/wiki_stem
Data Interchange Format (. dif) is a text file format used to import/export single spreadsheets between spreadsheet programs. Applications that still support the DIF format are Collabora Online, Excel, Gnumeric, and LibreOffice Calc
https://huggingface.co/datasets/fmars/wiki_stem
Efficient XML Interchange (EXI) is a binary XML format for exchange of data on a computer network. It was developed by the W3C's Efficient Extensible Interchange Working Group and is one of the most prominent efforts to encode XML documents in a binary data format, rather than plain text. Using EXI format reduces the verbosity of XML documents as well as the cost of parsing
https://huggingface.co/datasets/fmars/wiki_stem
External Data Representation (XDR) is a standard data serialization format, for uses such as computer network protocols. It allows data to be transferred between different kinds of computer systems. Converting from the local representation to XDR is called encoding
https://huggingface.co/datasets/fmars/wiki_stem
Fast Infoset (or FI) is an international standard that specifies a binary encoding format for the XML Information Set (XML Infoset) as an alternative to the XML document format. It aims to provide more efficient serialization than the text-based XML format. FI is effectively a lossless compression, analogous to gzip, for XML, except that while the original formatting is lost, no information is lost in the conversion from XML to FI, and back to XML
https://huggingface.co/datasets/fmars/wiki_stem
A general-purpose markup language is a markup language that is used for more than one purpose or situation. Other, more specialized domain-specific markup languages are often based upon these languages. For example, HTML 4
https://huggingface.co/datasets/fmars/wiki_stem
JData is a light-weight data annotation and exchange open-standard designed to represent general-purpose and scientific data structures using human-readable (text-based) JSON and (binary) UBJSON formats. JData specification specifically aims at simplifying exchange of hierarchical and complex data between programming languages, such as MATLAB, Python, JavaScript etc. It defines a comprehensive list of JSON-compatible "name":value constructs to store a wide range of data structures, including scalars, N-dimensional arrays, sparse/complex-valued arrays, maps, tables, hashes, linked lists, trees and graphs, and support optional data grouping and metadata for each data element
https://huggingface.co/datasets/fmars/wiki_stem
JSON streaming comprises communications protocols to delimit JSON objects built upon lower-level stream-oriented protocols (such as TCP), that ensures individual JSON objects are recognized, when the server and clients use the same one (e. g. implicitly coded in)
https://huggingface.co/datasets/fmars/wiki_stem
JSON→URL is a language-independent data interchange format for the JSON data model suitable for use within a URL/URI query string. It is defined by an open specification, though not through a standards body. Data types and syntax JSON→URL implements the JSON data model:, with support for the following data types Number: a signed decimal number that may contain a fractional part and may use exponential E notation, but cannot include non-numbers such as NaN
https://huggingface.co/datasets/fmars/wiki_stem
A lightweight markup language (LML), also termed a simple or humane markup language, is a markup language with simple, unobtrusive syntax. It is designed to be easy to write using any generic text editor and easy to read in its raw form. Lightweight markup languages are used in applications where it may be necessary to read the raw document as well as the final rendered output
https://huggingface.co/datasets/fmars/wiki_stem
Terraform is an infrastructure-as-code software tool created by HashiCorp. Users define and provide data center infrastructure using a declarative configuration language known as HashiCorp Configuration Language (HCL), or optionally JSON. Design Terraform manages external resources (such as public cloud infrastructure, private cloud infrastructure, network appliances, software as a service, and platform as a service) with "providers"
https://huggingface.co/datasets/fmars/wiki_stem
Asterisk is a software implementation of a private branch exchange (PBX). In conjunction with suitable telephony hardware interfaces and network applications, Asterisk is used to establish and control telephone calls between telecommunication endpoints, such as customary telephone sets, destinations on the public switched telephone network (PSTN), and devices or services on voice over Internet Protocol (VoIP) networks. Its name comes from the asterisk (*) symbol for a signal used in dual-tone multi-frequency (DTMF) dialing
https://huggingface.co/datasets/fmars/wiki_stem
Fldigi (short for Fast light digital) is a free and open-source program which allows an ordinary computer's sound card to be used as a simple two-way data modem. The software is mostly used by amateur radio operators who connect the microphone and headphone connections of an amateur radio SSB or FM transceiver to the computer's headphone and microphone connections, respectively. This interconnection creates a "sound card defined radio" whose available bandwidth is limited by the sound card's sample rate and the external radio's bandwidth
https://huggingface.co/datasets/fmars/wiki_stem
The Invisible Internet Project (I2P) is an anonymous network layer (implemented as a mix network) that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by encrypting the user's traffic (by using end-to-end encryption), and sending it through a volunteer-run network of roughly 55,000 computers distributed around the world. Given the high number of possible paths the traffic can transit, a third party watching a full connection is unlikely
https://huggingface.co/datasets/fmars/wiki_stem
Adium is a free and open-source instant messaging client for macOS that supports multiple IM networks, including XMPP (Jabber), IRC and more. In the past, it has also supported AIM, ICQ, Windows Live Messenger and Yahoo! Messenger. Adium is written using macOS's Cocoa API, and it is released under the GNU GPL-2
https://huggingface.co/datasets/fmars/wiki_stem
Marabunta is a fully distributed software application for anonymous P2P. The main goal is the fight against internet censorship and assuring the freedom of speech. It is a peer-to-peer platform for information exchange among nodes in an anonymous way based on several communication algorithms called "Order and Chaos" which can be found in massive social organizations such as ant colonies
https://huggingface.co/datasets/fmars/wiki_stem
Minicom is a text-based modem control and terminal emulator program for Unix-like operating systems, originally written by Miquel van Smoorenburg, and modeled somewhat after the popular MS-DOS program Telix but is open source. Minicom includes a dialing directory, ANSI and VT100 emulation, an (external) scripting language, and other features. Minicom is a menu-driven communications program
https://huggingface.co/datasets/fmars/wiki_stem
OpenQwaq is open source computer software for immersive collaboration, which enables organizations to implement online 3D virtual world workspaces for their specific needs. OpenQwaq is based on the Teleplace technology, a conferencing platform that has been in the market since 2007, with the name Qwaq Forums until 2009. History Both OpenQwaq and Teleplace are based on the Squeak open source implementation of Smalltalk and the Croquet Project
https://huggingface.co/datasets/fmars/wiki_stem
PuTTY () is a free and open-source terminal emulator, serial console and network file transfer application. It supports several network protocols, including SCP, SSH, Telnet, rlogin, and raw socket connection. It can also connect to a serial port
https://huggingface.co/datasets/fmars/wiki_stem
Remmina is a remote desktop client for POSIX-based computer operating systems. It supports the Remote Desktop Protocol (RDP), VNC, NX, XDMCP, SPICE, X2Go and SSH protocols and uses FreeRDP as foundation. Packaging Remmina is in the package repositories for Debian versions 6 (Squeeze) and later and for Ubuntu versions since 10
https://huggingface.co/datasets/fmars/wiki_stem
SPLAT! (short for an RF Signal Propagation, Loss, And Terrain analysis tool) is a GNU GPL-licensed terrestrial radio propagation model application initially written for Linux but has since been ported for Windows and OS X. SPLAT! can use the Longley-Rice path loss and coverage prediction using the Irregular Terrain Model to predict the behaviour and reliability of radio links, and to predict path loss. History Development started in 1997 by John A
https://huggingface.co/datasets/fmars/wiki_stem
WSJT-X is a computer program used for weak-signal radio communication between amateur radio operators. The program was initially written by Joe Taylor, K1JT, but is now open source and is developed by a small team. The digital signal processing techniques in WSJT-X make it substantially easier for amateur radio operators to employ esoteric propagation modes, such as high-speed meteor scatter and moonbounce
https://huggingface.co/datasets/fmars/wiki_stem
WSPR (pronounced "whisper") is an acronym for Weak Signal Propagation Reporter. It is a protocol, implemented in a computer program, used for weak-signal radio communication between amateur radio operators. The protocol was designed, and a program written initially, by Joe Taylor, K1JT
https://huggingface.co/datasets/fmars/wiki_stem
AdaControl is a free (GMGPL) tool that detects the use of various kinds of constructs in Ada programs. Its first goal is to control proper usage of style or programming rules, but it can also be used as a powerful tool to search for use (or non-use) of various forms of programming styles or design patterns. Searched elements range from very simple, like the occurrence of certain entities, declarations, or statements, to very sophisticated, like verifying that certain programming patterns are being obeyed
https://huggingface.co/datasets/fmars/wiki_stem
BusyBox is a software suite that provides several Unix utilities in a single executable file. It runs in a variety of POSIX environments such as Linux, Android, and FreeBSD, although many of the tools it provides are designed to work with interfaces provided by the Linux kernel. It was specifically created for embedded operating systems with very limited resources
https://huggingface.co/datasets/fmars/wiki_stem
Ctags is a programming tool that generates an index (or tag) file of names found in source and header files of various programming languages to aid code comprehension. Depending on the language, functions, variables, class members, macros and so on may be indexed. These tags allow definitions to be quickly and easily located by a text editor, a code search engine, or other utility
https://huggingface.co/datasets/fmars/wiki_stem
Daikon is a computer program that detects likely invariants of programs. An invariant is a condition that always holds true at certain points in the program. It is mainly used for debugging programs in late development, or checking modifications to existing code
https://huggingface.co/datasets/fmars/wiki_stem
Doxygen ( DOK-see-jən) is a documentation generator and static analysis tool for software source trees. When used as a documentation generator, Doxygen extracts information from specially-formatted comments within the code. When used for analysis, Doxygen uses its parse tree to generate diagrams and charts of the code structure
https://huggingface.co/datasets/fmars/wiki_stem
ESC/Java (and more recently ESC/Java2), the "Extended Static Checker for Java," is a programming tool that attempts to find common run-time errors in Java programs at compile time. The underlying approach used in ESC/Java is referred to as extended static checking, which is a collective name referring to a range of techniques for statically checking the correctness of various program constraints. For example, that an integer variable is greater-than-zero, or lies between the bounds of an array
https://huggingface.co/datasets/fmars/wiki_stem
GIWS is a wrapper generator intended to simplify calling Java from C or C++ by automatically generating the necessary JNI code. GIWS is released under the CeCILL license. Example The following Java class does some simple computation
https://huggingface.co/datasets/fmars/wiki_stem
GNU GLOBAL is a software tool for source code tagging to aid code comprehension. It works in a uniform fashion in various environments (GNU Emacs, Vim, GNU less, GNU Bash, web browsers, etc. ), allowing users to find all objects declared in the source files and to move among them easily
https://huggingface.co/datasets/fmars/wiki_stem
Gtranslator is a specialized computer-assisted translation software and po file editor for the internationalization and localization (i18n) of software that uses the gettext system. It handles all forms of gettext po files and includes features such as Find/Replace, Translation Memory, different Translator Profiles, Messages Table (for having an overview of the translations/messages in the po file), Easy Navigation and Editing of translation messages and comments of the translation where accurate. Gtranslator includes also a plugin system with plugins such as Alternate Language, Insert Tags, Open Tran, Integration with Subversion, and Source Code Viewer
https://huggingface.co/datasets/fmars/wiki_stem
LoadUI is a load testing software, targeted mainly at web services. LoadUI runs on Windows, Linux and Mac OS. LoadUI allows users to test the speed and scalability of APIs, preview API performance behaviors before releasing to production environments
https://huggingface.co/datasets/fmars/wiki_stem
NAnt is a free and open source software tool for automating software build processes. It is similar to Apache Ant, but targeted at the . NET environment rather than Java
https://huggingface.co/datasets/fmars/wiki_stem
Nix is a cross-platform package manager that uses a deployment model where software is installed into unique directories generated through cryptographic hashes. It is also the name of the tool's programming language. A package's hash takes into account the dependencies, which is claimed to eliminate dependency hell, as an alternative to the typical solution of installing multiple versions of dependencies at the same time
https://huggingface.co/datasets/fmars/wiki_stem
Several methods have been created to define an assessment process for free/open-source software. Some focus on some aspects like the maturity, the durability and the strategy of the organisation around the open-source project itself. Other methodologies add functional aspects to the assessment process
https://huggingface.co/datasets/fmars/wiki_stem
The Parallel Multithreaded Machine (PM2) is a software for parallel networking of computers. PM2 is an open-source distributed multithreaded programming environment designed to support efficiently distributed programs with a highly irregular behavior (e. g
https://huggingface.co/datasets/fmars/wiki_stem
SIP is an open source software tool used to connect computer programs or libraries written in C or C++ with the scripting language Python. It is an alternative to SWIG. SIP was originally developed in 1998 for PyQt — the Python bindings for the Qt GUI toolkit — but is suitable for generating bindings for any C or C++ library
https://huggingface.co/datasets/fmars/wiki_stem
In static program analysis, Soot is a bytecode manipulation and optimization framework consisting of intermediate languages for Java. It has been developed by the Sable Research Group at McGill University. Soot provides four intermediate representations for use through its API for other analysis programs to access and build upon: Baf: a near bytecode representation
https://huggingface.co/datasets/fmars/wiki_stem
Spyce is technology similar to PHP that can be used to embed Python code into webpages. Spyce is free software, distributed under a BSD-style licence, with some additional restrictions about documentation notices. Common Spyce embedding methods Since Python uses indentation to determine the beginning and end of a block, Spyce includes several ways to embed Python code
https://huggingface.co/datasets/fmars/wiki_stem
The Simplified Wrapper and Interface Generator (SWIG) is an open-source software tool used to connect computer programs or libraries written in C or C++ with scripting languages such as Lua, Perl, PHP, Python, R, Ruby, Tcl, and other languages like C#, Java, JavaScript, Go, D, OCaml, Octave, Scilab and Scheme. Output can also be in the form of XML. Function The aim is to allow the calling of native functions (that were written in C or C++) by other programming languages, passing complex data types to those functions, keeping memory from being inappropriately freed, inheriting object classes across languages, etc
https://huggingface.co/datasets/fmars/wiki_stem
ALTIBASE is a hybrid database, relational database management system manufactured by The Altibase Corporation. The software' hybrid architecture allows it to access both memory-resident and disk-resident tables using single interface. It supports both synchronous and asynchronous replication and offers real-time ACID compliance
https://huggingface.co/datasets/fmars/wiki_stem
Druid is a column-oriented, open-source, distributed data store written in Java. Druid is designed to quickly ingest massive quantities of event data, and provide low-latency queries on top of the data. The name Druid comes from the shapeshifting Druid class in many role-playing games, to reflect that the architecture of the system can shift to solve different types of data problems
https://huggingface.co/datasets/fmars/wiki_stem
Apache Pinot is a column-oriented, open-source, distributed data store written in Java. Pinot is designed to execute OLAP queries with low latency. It is suited in contexts where fast analytics, such as aggregations, are needed on immutable data, possibly, with real-time data ingestion
https://huggingface.co/datasets/fmars/wiki_stem
ArangoDB is a free and open-source native graph database system developed by ArangoDB Inc. ArangoDB is a multi-model database system since it supports three data models (graphs, JSON documents, key/value) with one database core and a unified query language AQL (ArangoDB Query Language). AQL is mainly a declarative language and allows the combination of different data access patterns in a single query
https://huggingface.co/datasets/fmars/wiki_stem
BaseX is a native and light-weight XML database management system and XQuery processor, developed as a community project on GitHub. It is specialized in storing, querying, and visualizing large XML documents and collections. BaseX is platform-independent and distributed under the BSD-3-Clause license
https://huggingface.co/datasets/fmars/wiki_stem
C-Store is a database management system (DBMS) based on a column-oriented DBMS developed by a team at Brown University, Brandeis University, Massachusetts Institute of Technology and the University of Massachusetts Boston including Michael Stonebraker, Stanley Zdonik, and Samuel Madden. The last release of the original code was in 2006; Vertica a commercial fork, lives on. C-Store differs from most traditional relational database management system (RDBMS) designs in many ways, primarily in that it stores data by column and not by row, optimizing the database for reading of data rather than writing
https://huggingface.co/datasets/fmars/wiki_stem
CiviCRM ( SIV-ee C-R-M) is a web-based suite of internationalized open-source software for constituency relationship management that falls under the broad rubric of customer relationship management. It is specifically designed for the needs of non-profit, non-governmental, and advocacy groups, and serves as an association-management system. CiviCRM is designed to manage information about an organization's donors, members, event registrants, subscribers, grant-application seekers and funders, and case contacts
https://huggingface.co/datasets/fmars/wiki_stem
Couchbase Server, originally known as Membase, is an open-source, distributed (shared-nothing architecture) multi-model NoSQL document-oriented database software package optimized for interactive applications. These applications may serve many concurrent users by creating, storing, retrieving, aggregating, manipulating and presenting data. In support of these kinds of application needs, Couchbase Server is designed to provide easy-to-scale key-value, or JSON document access, with low latency and high sustainability throughput
https://huggingface.co/datasets/fmars/wiki_stem
Apache CouchDB is an open-source document-oriented NoSQL database, implemented in Erlang. CouchDB uses multiple formats and protocols to store, transfer, and process its data. It uses JSON to store data, JavaScript as its query language using MapReduce, and HTTP for an API
https://huggingface.co/datasets/fmars/wiki_stem
CrateDB is a distributed SQL database management system that integrates a fully searchable document-oriented data store. It is open-source, written in Java, based on a shared-nothing architecture, and designed for high scalability. CrateDB includes components from Trino, Lucene, Elasticsearch and Netty
https://huggingface.co/datasets/fmars/wiki_stem
CSQL was a software project, intended to be an open source main memory high-performance relational database management system developed at sourceforge. net. It was supposed to provide high performance for SQL queries and DML statements
https://huggingface.co/datasets/fmars/wiki_stem
CUBRID ( "cube-rid") is an open-source SQL-based relational database management system (RDBMS) with object extensions developed by CUBRID Corp. for OLTP. The name CUBRID is a combination of the two words cube and bridge, cube standing for a space for data and bridge standing for data bridge
https://huggingface.co/datasets/fmars/wiki_stem
Database Management Library (DBL) is a relational database management system (RDBMS) contained in a C++ programming library. The DBL source code is available under the terms of the GNU General Public License. DBL was fully developed within two weeks, as a holiday programming project
https://huggingface.co/datasets/fmars/wiki_stem
Dataphor is an open-source truly-relational database management system (RDBMS) and its accompanying user interface technologies, which together are designed to provide highly declarative software application development. The Dataphor Server has its own storage engine or it can be a virtual, or federated, DBMS, meaning that it can utilize other database engines for storage. Dataphor has been praised for its adherence to relational principles, more closely so than any SQL product
https://huggingface.co/datasets/fmars/wiki_stem
db4o (database for objects) was an embeddable open-source object database for Java and . NET developers. It was developed, commercially licensed and supported by Actian
https://huggingface.co/datasets/fmars/wiki_stem
In computing, a DBM is a library and file format providing fast, single-keyed access to data. A key-value database from the original Unix, dbm is an early example of a NoSQL system. History The original dbm library and file format was a simple database engine, originally written by Ken Thompson and released by AT&T in 1979
https://huggingface.co/datasets/fmars/wiki_stem
Drizzle is a discontinued free software/open-source relational database management system (DBMS) that was forked from the now-defunct 6. 0 development branch of the MySQL DBMS. Like MySQL, Drizzle had a client/server architecture and uses SQL as its primary command language
https://huggingface.co/datasets/fmars/wiki_stem
eXist-db (or eXist for short) is an open source software project for NoSQL databases built on XML technology. It is classified as both a NoSQL document-oriented database system and a native XML database (and it provides support for XML, JSON, HTML and Binary documents). Unlike most relational database management systems (RDBMS) and NoSQL databases, eXist-db provides XQuery and XSLT as its query and application programming languages
https://huggingface.co/datasets/fmars/wiki_stem
Gadfly is a relational database management system written in Python. Gadfly is a collection of Python modules that provides relational database functionality entirely implemented in Python. It supports a subset of the standard RDBMS Structured Query Language (SQL)
https://huggingface.co/datasets/fmars/wiki_stem
GNOME-DB is a database application by the GNOME community. The project aims to provide a free unified data access architecture to the GNOME project for all Unix platforms. GNOME-DB is useful for any application that accesses persistent data (not only databases, but data), since it now contains a data management API
https://huggingface.co/datasets/fmars/wiki_stem
H-Store is an experimental database management system (DBMS). It was designed for online transaction processing applications. H-Store was developed by a team at Brown University, Carnegie Mellon University, the Massachusetts Institute of Technology, and Yale University in 2007 by researchers Michael Stonebraker, Sam Madden, Andy Pavlo and Daniel Abadi
https://huggingface.co/datasets/fmars/wiki_stem
H2 is a relational database management system written in Java. It can be embedded in Java applications or run in client-server mode. The software is available as open source software Mozilla Public License 2
https://huggingface.co/datasets/fmars/wiki_stem
HSQLDB (Hyper SQL Database) is a relational database management system written in Java. It has a JDBC driver and supports a large subset of SQL-92, SQL:2008, SQL:2011, and SQL:2016 standards. It offers a fast, small (around 1300 kilobytes in version 2
https://huggingface.co/datasets/fmars/wiki_stem
Ingres Database ( ing-GRESS) is a proprietary SQL relational database management system intended to support large commercial and government applications. Actian Corporation, which announced April 2018 that it is being acquired by HCL Technologies, controls the development of Ingres and makes certified binaries available for download, as well as providing worldwide support. There was an open source release of Ingres but it is no longer available for download from Actian
https://huggingface.co/datasets/fmars/wiki_stem
JanusGraph is an open source, distributed graph database under The Linux Foundation. JanusGraph is available under the Apache License 2. 0
https://huggingface.co/datasets/fmars/wiki_stem
Kexi is a visual database applications creator tool by KDE, designed to fill the gap between spreadsheets and database solutions requiring more sophisticated development. Kexi can be used for designing and implementing databases, data inserting and processing, and performing queries. It is developed within the Calligra project but is released separately
https://huggingface.co/datasets/fmars/wiki_stem
The Lombard Steam Log Hauler, patented 21 May 1901, was the first successful commercial application of a continuous track for vehicle propulsion. The concept was later used for military tanks during World War I and for agricultural tractors and construction equipment following the war. Description Alvin Orlando Lombard was a blacksmith building logging equipment in Waterville, Maine
https://huggingface.co/datasets/fmars/wiki_stem
A motorized tricycle, motor trike, or motortrycle is a three-wheeled vehicle based on the same technology as a bicycle or motorcycle, and powered by an electric motor, motorcycle, scooter or car engine. Classification Depending on the design of the vehicle, a motorized trike may be categorized as a motorcycle, motor scooter, or simply the three-wheeled counterpart to a motorized or electric bicycle. The main difference between a motorcycle trike and a scooter trike is that motorcycles are sat on in a "saddle"-style seating (as with a horse), with the legs apart, and motorcycles have manual transmissions
https://huggingface.co/datasets/fmars/wiki_stem
A moving floor is a hydraulically-driven moving-floor conveyance system for moving bulk material or palletized products, which can be used in a warehouse, loading dock or semi-trailer. It automates and facilitates loading and unloading of palletized goods by eliminating the need for a forklift to enter the trailer. In a truck-based application, the system can quickly unload loose material without having to tip the trailer or tilt the floor as with other dumping systems
https://huggingface.co/datasets/fmars/wiki_stem
Pneumatic trail or trail of the tire is a trail-like effect generated by compliant tires rolling on a hard surface and subject to side loads, as in a turn. More technically, it is the distance that the resultant force of side-slip occurs behind the geometric center of the contact patch. Causes Pneumatic trail is caused by the progressive build-up of lateral force along the length of the contact patch, such that lateral forces are greater towards the rear of the contact patch (though less so when the rear of the contact patch begins sliding) and this creates a torque on the tire called the self aligning torque
https://huggingface.co/datasets/fmars/wiki_stem
A pocket wagon is a freight wagon that has been specially designed for the transport of truck semi-trailers. This wagon belongs to the group of flat wagons in special design with bogies and is used in combined transport (CT). The name of these freight wagons comes from the fact that between the narrow longitudinal girders on the outside and also lengthways between the bogies, the so-called pockets are located, in which the wheels of the semi-trailers are particularly low
https://huggingface.co/datasets/fmars/wiki_stem
Propulsion is the generation of force by any combination of pushing or pulling to modify the translational motion of an object, which is typically a rigid body (or an articulated rigid body) but may also concern a fluid. The term is derived from two Latin words: pro, meaning before or forward; and pellere, meaning to drive. A propulsion system consists of a source of mechanical power, and a propulsor (means of converting this power into propulsive force)
https://huggingface.co/datasets/fmars/wiki_stem
The terminology quantum compass often relates to an instrument which measures relative position using the technique of atom interferometry. It includes an ensemble of accelerometers and gyroscope based on quantum technology to form an Inertial Navigation Unit. Description The work about quantum technology based inertial measurement units (IMUs), the instruments containing the gyroscopes and accelerometers follows from the early demonstrations of matter-wave based accelerometers and gyrometers
https://huggingface.co/datasets/fmars/wiki_stem
A radial tire (more properly, a radial-ply tire) is a particular design of vehicular tire. In this design, the cord plies are arranged at 90 degrees to the direction of travel, or radially (from the center of the tire). Radial tire construction climbed to 100% market share in North America following Consumer Reports finding the superiority of the radial design in 1968, and were standard by 1976
https://huggingface.co/datasets/fmars/wiki_stem
A range extender is a fuel-based auxiliary power unit (APU) that extends the range of a battery electric vehicle by driving an electric generator that charges the vehicle's battery. This arrangement is known as a series hybrid drivetrain. The most commonly used range extenders are internal combustion engines, but fuel-cells or other engine types can be used
https://huggingface.co/datasets/fmars/wiki_stem