text
stringlengths
31
999
source
stringclasses
5 values
A branch, sometimes called a ramus in botany, is a woody structural member connected to the central trunk of a tree (or sometimes a shrub). Large branches are known as boughs and small branches are known as twigs. The term twig usually refers to a terminus, while bough refers only to branches coming directly from the trunk
https://huggingface.co/datasets/fmars/wiki_stem
A branch attachment is where a branch is attached to the trunk of a tree. Three types of branch attachment are recognized due to differences in the anatomical position of buds that form them. Two key components contribute to the mechanical strength and toughness of the attachment: interlocking wood grain at the top of the attachment and an embedded knot that often lies within the attachment
https://huggingface.co/datasets/fmars/wiki_stem
A branch collar is the "shoulder" between the branch and trunk of woody plants; the inflammation formed at the base of the branch is caused by annually overlapping trunk tissue. The shape of the branch collar is due to two separate growth patterns, initially the branch grows basipetally, followed by seasonal trunk growth which envelops the branch. Branch collars serve as a strong foundation to the branch, and its orientation and internal characteristics allow the branch to withstand stress from numerous directions
https://huggingface.co/datasets/fmars/wiki_stem
A broad-leaved, broad-leaf, or broadleaf tree is any tree within the diverse botanical group of angiosperms that has flat leaves and produces seeds inside of fruits. It is one of two general types of trees, the other being a conifer, a tree with needle-like or scale-like leaves and seeds borne in woody cones. Broad-leaved trees are sometimes known as hardwoods
https://huggingface.co/datasets/fmars/wiki_stem
In botany, a bud is an undeveloped or embryonic shoot and normally occurs in the axil of a leaf or at the tip of a stem. Once formed, a bud may remain for some time in a dormant condition, or it may form a shoot immediately. Buds may be specialized to develop flowers or short shoots or may have the potential for general shoot development
https://huggingface.co/datasets/fmars/wiki_stem
In botany, a bulb is structurally a short stem with fleshy leaves or leaf bases that function as food storage organs during dormancy. (In gardening, plants with other kinds of storage organ are also called "ornamental bulbous plants" or just "bulbs". ) Description The bulb's leaf bases, also known as scales, generally do not support leaves, but contain food reserves to enable the plant to survive adverse conditions
https://huggingface.co/datasets/fmars/wiki_stem
A bulbil (also referred to as bulbel, bulblet, and/or pup) is a small, young plant that is reproduced vegetatively from axillary buds on the parent plant's stem or in place of a flower on an inflorescence. These young plants are clones of the parent plant that produced them—they have identical genetic material. The formation of bulbils is a form of asexual reproduction, as they can eventually go on to form new stand-alone plants
https://huggingface.co/datasets/fmars/wiki_stem
Ornamental bulbous plants, often called ornamental bulbs or just bulbs in gardening and horticulture, are herbaceous perennials grown for ornamental purposes, which have underground or near ground storage organs. Botanists distinguish between true bulbs, corms, rhizomes, tubers and tuberous roots, any of which may be termed "bulbs" in horticulture. Bulb species usually lose their upper parts during adverse conditions such as summer drought and heat or winter cold
https://huggingface.co/datasets/fmars/wiki_stem
A canopy seed bank or aerial seed bank is the aggregate of viable seed stored by a plant in its canopy. Canopy seed banks occur in plants that postpone seed release for some reason. It is often associated with serotiny, the tendency of some plants to store seed in a cone (e
https://huggingface.co/datasets/fmars/wiki_stem
In plant morphology, a cataphyll (sometimes also called a cataphyllum or cataphyll leaf) is a reduced, small leaf. Many plants have both "true leaves" (euphylls), which perform most of the photosynthesis, and cataphylls, which are modified to perform other functions. Cataphylls include bracts, bracteoles and bud scales, as well as any small leaves that resemble scales, known as scale leaves
https://huggingface.co/datasets/fmars/wiki_stem
Cauliflory is a botanical term referring to plants that flower and fruit from their main stems or woody trunks, rather than from new growth and shoots. There have been several strategies to distinguish among types of cauliflory historically, including the location or age of branch where inflorescences grow, whether inflorescences attach to stolons or branches, and whether axillary nodes or adventitious nodes develop into reproductive tissues. Cauliflory is a non-homologous phenomenon with several different sources of development and evolutionary value
https://huggingface.co/datasets/fmars/wiki_stem
Cephalium is a frequently brightly coloured structure of wool and bristle at the growing tip of certain cacti. It is most commonly found on cacti of the genus Melocactus and can take a number of colours, forms and shapes. The cephalium will only begin growing after a cactus has reached a certain size or age
https://huggingface.co/datasets/fmars/wiki_stem
Analytica is a visual software developed by Lumina Decision Systems for creating, analyzing and communicating quantitative decision models. It combines hierarchical influence diagrams for visual creation and view of models, intelligent arrays for working with multidimensional data, Monte Carlo simulation for analyzing risk and uncertainty, and optimization, including linear and nonlinear programming. Its design, especially its influence diagrams and treatment of uncertainty, is based on ideas from the field of decision analysis
https://huggingface.co/datasets/fmars/wiki_stem
The Berkeley Open Infrastructure for Network Computing (BOINC, pronounced – rhymes with "oink") is an open-source middleware system for volunteer computing (a type of distributed computing). Developed originally to support SETI@home, it became the platform for many other applications in areas as diverse as medicine, molecular biology, mathematics, linguistics, climatology, environmental science, and astrophysics, among others. The purpose of BOINC is to enable researchers to utilize processing resources of personal computers and other devices around the world
https://huggingface.co/datasets/fmars/wiki_stem
DataScene is a scientific graphing, animation, data analysis, and real-time data monitoring software package. It was developed with the Common Language Infrastructure technology and the GDI+ graphics library. With the two Common Language Runtime engines - the
https://huggingface.co/datasets/fmars/wiki_stem
Deep-Sky Planner is observation planning and logging software for amateur astronomers. It helps observers to determine where and when to view all types of celestial objects. It runs on Windows
https://huggingface.co/datasets/fmars/wiki_stem
EarthBrowser was a virtual globe software developed by Lunar software. It was available online as a Flash application or could be installed locally as an AIR application. It focused mainly on visualising geophysical information such as weather, earthquakes, clouds, weather conditions, etc
https://huggingface.co/datasets/fmars/wiki_stem
Emergent (formerly PDP++) is a neural simulation software that is primarily intended for creating models of the brain and cognitive processes. Development initially began in 1995 at Carnegie Mellon University, and as of 2014, continues at the University of Colorado at Boulder. The 3
https://huggingface.co/datasets/fmars/wiki_stem
FreeFlyer is a commercial off-the-shelf software application for satellite mission analysis, design and operations. FreeFlyer's architecture centers on its native scripting language, known as FreeForm Script. As a mission planning tool, it encompasses several capabilities, including precise orbit modeling, 2D and 3D visualization, sensor modeling, maneuver modeling, maneuver estimation, plotting, orbit determination, tracking data simulation, and space environment modeling
https://huggingface.co/datasets/fmars/wiki_stem
GMS (Groundwater Modeling System) is water modeling application for building and simulating groundwater models from Aquaveo. It features 2D and 3D geostatistics, stratigraphic modeling and a unique conceptual model approach. Currently supported models include MODFLOW, MODPATH, MT3DMS, RT3D, FEMWATER, SEEP2D, and UTEXAS
https://huggingface.co/datasets/fmars/wiki_stem
GoldSim is dynamic, probabilistic simulation software developed by GoldSim Technology Group. This general-purpose simulator is a hybrid of several simulation approaches, combining an extension of system dynamics with some aspects of discrete event simulation, and embedding the dynamic simulation engine within a Monte Carlo simulation framework. While it is a general-purpose simulator, GoldSim has been most extensively used for environmental and engineering risk analysis, with applications in the areas of water resource management , mining , radioactive waste management , geological carbon sequestration , aerospace mission risk analysis and energy
https://huggingface.co/datasets/fmars/wiki_stem
Gravity is a software program designed by Steve Safarik to simulate the motions of planetary bodies in space. Users can create solar systems of up to 16 bodies. Mass, Density, Initial position, and Initial velocity can be varied by user input
https://huggingface.co/datasets/fmars/wiki_stem
HippoDraw is a object-oriented statistical data analysis package written in C++, with user interaction via a Qt-based GUI and a Python-scriptable interface. It was developed by Paul Kunz at SLAC, primarily for the analysis and presentation of particle physics and astrophysics data, but can be equally well used in other fields where data handling is important. About HippoDraw can read and write files in an XML-based format, astrophysics FITS files, data objects produced by ROOT (optional), and through the Python bindings, anything that can be read/written by Python (HDF5, for instance, with PyTables)
https://huggingface.co/datasets/fmars/wiki_stem
KAlgebra is a mathematical graph calculator included in the KDE education package. While it is based on the MathML content markup language, knowledge of MathML is not required for use. The calculator includes numerical, logical, symbolic, and analytical functions, and can plot the results onto a 2D or 3D graph
https://huggingface.co/datasets/fmars/wiki_stem
Nightshade is a simulation and visualization software for teaching and exploring astronomy, Earth science, and related topics. Its focus is on use in digital planetarium systems or as an educational tool, with additional features to allow it to also be used on desktop or laptop computers. It operates on Linux, macOS and Windows
https://huggingface.co/datasets/fmars/wiki_stem
OpenChrom is an open source software for the analysis and visualization of mass spectrometric and chromatographic data. Its focus is to handle native data files from several mass spectrometry systems (e. g
https://huggingface.co/datasets/fmars/wiki_stem
Opticks is a remote sensing application that supports imagery, video (motion imagery), synthetic aperture radar (SAR), multi-spectral, hyper-spectral, and other types of remote sensing data. Opticks supports processing remote sensing video in the same manner as it supports imagery, which differentiates it from other remote sensing applications. Opticks was initially developed by Ball Aerospace & Technologies Corp
https://huggingface.co/datasets/fmars/wiki_stem
PP3 is free software that produces sky charts, focussing on high quality graphics and typography. It is distributed a license based on the MIT License, but with this restriction added: If you copy or distribute a modified version of this Software, the entire resulting derived work must be given a different name and distributed under the terms of a permission notice identical to this one. Sky charts are produced as LaTeX files, so an installation of LaTeX and Ghostscript is required to obtain results in PostScript or PDF formats
https://huggingface.co/datasets/fmars/wiki_stem
Prime95, also distributed as the command-line utility mprime for FreeBSD and Linux, is a freeware application written by George Woltman. It is the official client of the Great Internet Mersenne Prime Search (GIMPS), a volunteer computing project dedicated to searching for Mersenne primes. It is also used in overclocking to test for system stability
https://huggingface.co/datasets/fmars/wiki_stem
QDA Miner is mixed methods and qualitative data analysis software developed by Provalis Research. The program was designed to assist researchers in managing, coding and analyzing qualitative data. QDA Miner was first released in 2004 after being developed by Normand Peladeau
https://huggingface.co/datasets/fmars/wiki_stem
Rmetrics is a free, open-source and open development software project for teaching computational finance. Rmetrics is based primarily on the statistical R programming language, but does contain contributions in other programming languages, Fortran, C, and C++. The project was started in 2001 by Diethelm Wuertz, based at the Swiss Federal Institute of Technology in Zurich
https://huggingface.co/datasets/fmars/wiki_stem
SequenceL is a general purpose functional programming language and auto-parallelizing (Parallel computing) compiler and tool set, whose primary design objectives are performance on multi-core processor hardware, ease of programming, platform portability/optimization, and code clarity and readability. Its main advantage is that it can be used to write straightforward code that automatically takes full advantage of all the processing power available, without programmers needing to be concerned with identifying parallelisms, specifying vectorization, avoiding race conditions, and other challenges of manual directive-based programming approaches such as OpenMP. Programs written in SequenceL can be compiled to multithreaded code that runs in parallel, with no explicit indications from a programmer of how or what to parallelize
https://huggingface.co/datasets/fmars/wiki_stem
SETI@home beta, is a hibernating volunteer computing project using the Berkeley Open Infrastructure for Network Computing (BOINC) platform, as a test environment for future SETI@home projects: AstroPulse is a volunteer computing project searching for primordial black holes, pulsars, and ETI. AstroPulse clients have been tested by this project for nearly 6 years. It is already running on SETI@home, testing new GPU/CPU optimized apps and performing other tasks
https://huggingface.co/datasets/fmars/wiki_stem
SimThyr is a free continuous dynamic simulation program for the pituitary-thyroid feedback control system. The open-source program is based on a nonlinear model of thyroid homeostasis. In addition to simulations in the time domain the software supports various methods of sensitivity analysis
https://huggingface.co/datasets/fmars/wiki_stem
SOLEX is a free computer application that calculates and displays the positions and dynamics of bodies that are part of the Solar System. It was developed by Aldo Vitagliano, a professor of inorganic chemistry at the Federico II University of Naples. SOLEX can generate ephemeris of Solar System objects, including planets and asteroids
https://huggingface.co/datasets/fmars/wiki_stem
SPEED2000 is a software package designed for electromagnetic simulation for the analysis and design of high-speed electronic systems. It combines an electromagnetic field solver with circuit and transmission line simulations which allows it to compute dynamic electromagnetic interactions within integrated circuits. SPEED2000 provides electrical analysis of integrated circuit (IC) packages and printed circuit boards (PCBs)
https://huggingface.co/datasets/fmars/wiki_stem
Starbooks (short for Science and Technology Academic and Research-Based Openly Operated KioskS) is an interactive kiosk system developed by the Science and Technology Information Institute (STII) of the Department of Science and Technology (DOST) of the Philippine government. History Starbooks was conceptualized by Department of Science and Technology (DOST) Assistant Secretary and Science and Technology Information Institute (STII; an organization under the DOST) Officer in Charge Raymund Liboro. Liboro developed the interactive kiosk project as a response to few people patronizing libraries
https://huggingface.co/datasets/fmars/wiki_stem
== History == Statgraphics Centurion is a statistical statistics package that performs and explains in plain language, both basic and highly advanced statistical functions. The software was created in 1980 by Dr. Neil W
https://huggingface.co/datasets/fmars/wiki_stem
Stellarium is a free and open-source planetarium, licensed under the terms of the GNU General Public License version 2, available for Linux, Windows, and macOS. A port of Stellarium called Stellarium Mobile is available for Android, iOS, and Symbian as a paid version, being developed by Noctua Software. These have a limited functionality, lacking some features of the desktop version
https://huggingface.co/datasets/fmars/wiki_stem
Systrip is a visual environment for the analysis of time-series data in the context of biological networks. Systrip gathers bioinformatics and graph theoretical algorithms that can be assembled in different ways to help biologists in their visual mining process. It had been used to analyze various real biological data
https://huggingface.co/datasets/fmars/wiki_stem
TracePro is a commercial optical engineering software program for designing and analyzing optical and illumination systems. The program's graphical user interface (GUI) is 3D CAD-based creating a virtual prototyping environment to perform software simulation before manufacture. History Developed by Lambda Research Corporation of Littleton, Massachusetts, USA, under an SBIR grant from NASA, the program has been in continual development since 1994
https://huggingface.co/datasets/fmars/wiki_stem
Vensim is a simulation software developed by Ventana Systems. It primarily supports continuous simulation (system dynamics), with some discrete event and agent-based modelling capabilities. It is available commercially and as a free "Personal Learning Edition"
https://huggingface.co/datasets/fmars/wiki_stem
X-13ARIMA-SEATS, successor to X-12-ARIMA and X-11, is a set of statistical methods for seasonal adjustment and other descriptive analysis of time series data that are implemented in the U. S. Census Bureau's software package
https://huggingface.co/datasets/fmars/wiki_stem
Age of Empires: Castle Siege was a free-to-play medieval massively multiplayer online tower defense game in the form of a Windows app, designed for Windows 8. 1 and Windows Phone. Released in 2014, the app featured micro-transactions to aid in rapid development of a castle and to improve defensive and attacking capabilities
https://huggingface.co/datasets/fmars/wiki_stem
The Bally Sports app is the video streaming service of the former Fox Sports Networks, now Bally Sports regional sports networks. The app replaces Fox Sports Go (FSGO), the app of the former Fox Sports Networks. The service is available for customers of select cable and satellite TV providers, as well as the DirecTV Stream over-the-top service
https://huggingface.co/datasets/fmars/wiki_stem
Dungeon Hunter 5 is a 2015 hack and slash role-playing game developed and published by Gameloft. It was released on March 11, 2015 for iOS, Android, Windows Phone and Windows 10 devices. The game serves as a direct sequel to Dungeon Hunter 4 which ended amidst the dying Valenthia city state
https://huggingface.co/datasets/fmars/wiki_stem
Expedia. com is an online travel agency owned by Expedia Group, based in Seattle. The website and mobile app can be used to book airline tickets, hotel reservations, car rentals, cruise ships, and vacation packages
https://huggingface.co/datasets/fmars/wiki_stem
Various anti-spam techniques are used to prevent email spam (unsolicited bulk email). No technique is a complete solution to the spam problem, and each has trade-offs between incorrectly rejecting legitimate email (false positives) as opposed to not rejecting all spam email (false negatives) – and the associated costs in time, effort, and cost of wrongfully obstructing good mail. Anti-spam techniques can be broken into four broad categories: those that require actions by individuals, those that can be automated by email administrators, those that can be automated by email senders and those employed by researchers and law enforcement officials
https://huggingface.co/datasets/fmars/wiki_stem
This page is about client side and other techniques. For server side techniques read the Anti-spam techniques page. People tend to be much less bothered by spam slipping through filters into their mail box (false negatives), than having desired e-mail ("ham") blocked (false positives)
https://huggingface.co/datasets/fmars/wiki_stem
Anti-spam appliances are software or hardware devices integrated with on-board software that implement e-mail spam filtering and/or anti-spam for instant messaging (also called "spim") and are deployed at the gateway or in front of the mail server. They are normally driven by an operating system optimized for spam filtering. Anti-spam appliances have existed in wide area networks and home networks since the early 2000s
https://huggingface.co/datasets/fmars/wiki_stem
Automated Retroactive Minimal Moderation (ARMM) was a program developed by Richard Depew in 1993 to aid in the control of Usenet abuse. Concerned by abusive posts emanating from certain anonymous-posting sites, Depew developed ARMM to allow news administrators to automatically issue cancel messages for such posts. This was a controversial act, as many news administrators and users were concerned about censorship of the netnews medium
https://huggingface.co/datasets/fmars/wiki_stem
Authenticated Received Chain (ARC) is an email authentication system designed to allow an intermediate mail server like a mailing list or forwarding service to sign an email's original authentication results. This allows a receiving service to validate an email when the email's SPF and DKIM records are rendered invalid by an intermediate server's processing. ARC is defined in RFC 8617, published in July 2019, as "Experimental"
https://huggingface.co/datasets/fmars/wiki_stem
Bayesian poisoning is a technique used by e-mail spammers to attempt to degrade the effectiveness of spam filters that rely on Bayesian spam filtering. Bayesian filtering relies on Bayesian probability to determine whether an incoming mail is spam or is not spam. The spammer hopes that the addition of random (or even carefully selected) words that are unlikely to appear in a spam message will cause the spam filter to believe the message to be legitimate—a statistical type II error
https://huggingface.co/datasets/fmars/wiki_stem
Naive Bayes classifiers are a popular statistical technique of e-mail filtering. They typically use bag-of-words features to identify email spam, an approach commonly used in text classification. Naive Bayes classifiers work by correlating the use of tokens (typically words, or sometimes other things), with spam and non-spam e-mails and then using Bayes' theorem to calculate a probability that an email is or is not spam
https://huggingface.co/datasets/fmars/wiki_stem
Bogofilter is a mail filter that classifies e-mail as spam or ham (non-spam) by a statistical analysis of the message's header and content (body). The program is able to learn from the user's classifications and corrections. It was originally written by Eric S
https://huggingface.co/datasets/fmars/wiki_stem
Boxbe is a free service that prioritizes and screens spam in personal email. Users can select which email they want to receive, and which email goes to spam. It presents a challenge to the sender that requires a human response
https://huggingface.co/datasets/fmars/wiki_stem
A challenge–response (or C/R) system is a type of spam filter that automatically sends a reply with a challenge to the (alleged) sender of an incoming e-mail. It was originally designed in 1997 by Stan Weatherby, and was called Email Verification. In this reply, the purported sender is asked to perform some action to assure delivery of the original message, which would otherwise not be delivered
https://huggingface.co/datasets/fmars/wiki_stem
Context filtering is an anti-spam / mail policy method that does not deal with the contents of the mail but rather uses the context of the SMTP connection to decide whether a mail will be accepted or not. This method usually prevents reception of an e-mail in the first place; thus, common anti-spam features like quarantine, redirect or delete can not be applied. This method also distorts statistics of anti-spam programs because it is usually unknown how many mails (Spam or otherwise) would have been received through a certain connection
https://huggingface.co/datasets/fmars/wiki_stem
Since spam occurs primarily because it is so cheap to send, a proposed set of solutions require that senders pay some cost in order to send spam, making it prohibitively expensive for spammers. Stamps Some gatekeeper would sell electronic stamps and keep the proceeds. Or a micropayment, such as electronic money would be paid by the sender to the recipient or their ISP, or some other gatekeeper
https://huggingface.co/datasets/fmars/wiki_stem
CRM114 (full name: "The CRM114 Discriminator") is a program based upon a statistical approach for classifying data, and especially used for filtering email spam. Origin of the name The name comes from the CRM-114 Discriminator in the Stanley Kubrick movie Dr. Strangelove - a piece of radio equipment designed to filter out messages lacking a specific code-prefix
https://huggingface.co/datasets/fmars/wiki_stem
Distributed Checksum Clearinghouse (also referred to as DCC) is a method of spam email detection. The basic logic in DCC is that most spam mails are sent to many recipients. The same message body appearing many times is therefore bulk email
https://huggingface.co/datasets/fmars/wiki_stem
A Domain Name System blocklist, Domain Name System-based blackhole list, Domain Name System blacklist (DNSBL) or real-time blackhole list (RBL) is a service for operation of mail servers to perform a check via a Domain Name System (DNS) query whether a sending host's IP address is blacklisted for email spam. Most mail server software can be configured to check such lists, typically rejecting or flagging messages from such sites. A DNSBL is a software mechanism, rather than a specific list or policy
https://huggingface.co/datasets/fmars/wiki_stem
A DNSWL ("DNS-based whitelist") is a "whitelist" of semi-trusted locations on the Internet. The locations consist of IP addresses which may be reputed with no or low occurrences of spamming. Generic need for whitelisting Natural language understanding is not a mature field
https://huggingface.co/datasets/fmars/wiki_stem
DomainKeys (informally DK) is a deprecated e-mail authentication system designed by Yahoo to verify the domain name of an e-mail sender and the message integrity. Aspects of DomainKeys, along with parts of Identified Internet Mail, were combined to create DomainKeys Identified Mail (DKIM), which is now widely used. Both DomainKeys and DKIM were published in May 2007, DomainKeys as an "historical" protocol, and DKIM as its standards-track replacement
https://huggingface.co/datasets/fmars/wiki_stem
DomainKeys Identified Mail (DKIM) is an email authentication method designed to detect forged sender addresses in email (email spoofing), a technique often used in phishing and email spam. DKIM allows the receiver to check that an email that claimed to have come from a specific domain was indeed authorized by the owner of that domain. It achieves this by affixing a digital signature, linked to a domain name, to each outgoing email message
https://huggingface.co/datasets/fmars/wiki_stem
Greylisting is a method of defending e-mail users against spam. A mail transfer agent (MTA) using greylisting will "temporarily reject" any email from a sender it does not recognize. If the mail is legitimate, the originating server will try again after a delay, and if sufficient time has elapsed, the email will be accepted
https://huggingface.co/datasets/fmars/wiki_stem
Hashcash is a proof-of-work system used to limit E-mail spam and denial-of-service attacks. Hashcash was proposed in 1997 by Adam Back and described more formally in Back's 2002 paper "Hashcash - A Denial of Service Counter-Measure". Background The idea "
https://huggingface.co/datasets/fmars/wiki_stem
The Mail Abuse Prevention System (MAPS) is an organization that provides anti-spam support by maintaining a DNSBL. They provide five black lists, categorising why an address or an IP block is listed: Real-time Blackhole List (RBL), the one for which MAPS is probably best known. Dialup Users List (DUL), blocks of addresses that include many SOHO users
https://huggingface.co/datasets/fmars/wiki_stem
MARID was an IETF working group in the applications area tasked to propose standards for email authentication in 2004. The name is an acronym of MTA Authorization Records In DNS. Background Lightweight MTA Authentication Protocol (LMAP) was a generic name for a set of 'designated sender' proposals that were discussed in the ASRG in the Fall of 2003, including: Designated Mailers Protocol (DMP) Designated Relays Inquiry Protocol (DRIP) Flexible Sender Validation (FSV) MTAMARK Reverse MX (RMX) Sender Policy Framework (SPF)These schemes attempt to list the valid IP addresses that can send mail for a domain
https://huggingface.co/datasets/fmars/wiki_stem
Within the probability theory Markov model, Markovian discrimination in spam filtering is a method used in CRM114 and other spam filters to model the statistical behaviors of spam and nonspam more accurately than in simple Bayesian methods. A simple Bayesian model of written text contains only the dictionary of legal words and their relative probabilities. A Markovian model adds the relative transition probabilities that given one word, predict what the next word will be
https://huggingface.co/datasets/fmars/wiki_stem
MIMEDefang is a GPL licensed framework for filtering e-mail. It uses sendmail's "Milter" API, some C glue code, and some Perl code to let the user write high-performance mail filters in Perl. MIMEDefang can be used to: Block viruses (e
https://huggingface.co/datasets/fmars/wiki_stem
Mollom was a web service that analyzed the quality of content posted to websites. This included comments, contact-form messages, blogs, and forum posts. Mollom screened all contributions before they were posted to participating websites
https://huggingface.co/datasets/fmars/wiki_stem
Nolisting is the name given to a technique to defend electronic mail domain names against e-mail spam. Each domain name on the internet has a series of one or more MX records specifying mail servers responsible for accepting email messages on behalf of that domain, each with a preference. Nolisting is simply the adding of an MX record pointing to a non-existent server as the "primary" (i
https://huggingface.co/datasets/fmars/wiki_stem
policyd-weight is a mail filter for the Postfix mail transfer agent (MTA) written in Perl. It allows postfix to evaluate mail envelope information and to score mail against several DNS-based Blackhole Lists (DNSBL) before the mail is queued. The final score will determine whether a mail is rejected or accepted, in which case it is usually then subject to more resource intensive checks by a virus scanner and spam filter
https://huggingface.co/datasets/fmars/wiki_stem
POPFile is an abandoned free, open-source, cross-platform mail filter originally written in Perl by John Graham-Cumming and maintained by a team of volunteers. It uses a naive Bayes classifier to filter mail. This allows the filter to "learn" and classify mail according to the user's preferences
https://huggingface.co/datasets/fmars/wiki_stem
RealCall is a US-based AI caller identification and call blocking smartphone application, used to detect, engage and block call and SMS scamming and spamming. It has AI algorithms with built-in free reverse phone lookup service and customized answer bots for detection, engagement and blocking of unwanted calls and messages. The app is available for Android and iOS devices
https://huggingface.co/datasets/fmars/wiki_stem
The Scunthorpe problem is the unintentional blocking of online content by a spam filter or search engine because their text contains a string (or substring) of letters that appear to have an obscene or otherwise unacceptable meaning. Names, abbreviations, and technical terms are most often cited as being affected by the issue. The problem arises since computers can easily identify strings of text within a document, but interpreting words of this kind requires considerable ability to interpret a wide range of contexts, possibly across many cultures, which is an extremely difficult task
https://huggingface.co/datasets/fmars/wiki_stem
Sender ID is an historic anti-spoofing proposal from the former MARID IETF working group that tried to join Sender Policy Framework (SPF) and Caller ID. Sender ID is defined primarily in Experimental RFC 4406, but there are additional parts in RFC 4405, RFC 4407 and RFC 4408. Principles of operation Sender ID is heavily based on SPF, with only a few additions
https://huggingface.co/datasets/fmars/wiki_stem
Sender Policy Framework (SPF) is an email authentication method which ensures the sending mail server is authorized to originate mail from the email sender's domain. This authentication only applies to the email sender listed in the "envelope from" field during the initial SMTP connection. If the email is bounced, a message is sent to this address, and for downstream transmission it typically appears in the "Return-Path" header
https://huggingface.co/datasets/fmars/wiki_stem
Sieve is a programming language that can be used for email filtering. It owes its creation to the CMU Cyrus Project, creators of Cyrus IMAP server. The language is not tied to any particular operating system or mail architecture
https://huggingface.co/datasets/fmars/wiki_stem
SMTP proxies are specialized mail transfer agents (MTAs) that, similar to other types of proxy servers, pass SMTP sessions through to other MTAs without using the store-and-forward approach of a typical MTA. When an SMTP proxy receives a connection, it initiates another SMTP session to a destination MTA. Any errors or status information from the destination MTA will be passed back to the sending MTA through the proxy
https://huggingface.co/datasets/fmars/wiki_stem
Apache SpamAssassin is a computer program used for e-mail spam filtering. It uses a variety of spam-detection techniques, including DNS and fuzzy checksum techniques, Bayesian filtering, external programs, blacklists and online databases. It is released under the Apache License 2
https://huggingface.co/datasets/fmars/wiki_stem
TMDA is an open-source software application designed to reduce the amount of junk email a user receives. TMDA's main difference from other anti-spam systems is the use of a challenge/response system that bulk mailing machines and programs are either unwilling (to save bandwidth) or unable (due to lack of programming) to answer. The technical countermeasures used by TMDA to thwart spam include: Whitelists: Whitelists are essentially an ‘accept list’
https://huggingface.co/datasets/fmars/wiki_stem
A TXT record (short for text record) is a type of resource record in the Domain name system (DNS) used to provide the ability to associate arbitrary text with a host or other name, such as human readable information about a server, network, data center, or other accounting information. It is also often used in a more structured fashion to record small amounts of machine-readable data into the DNS. Background A domain may have multiple TXT records associated with it, provided the DNS server implementation supports this
https://huggingface.co/datasets/fmars/wiki_stem
In statistical hypothesis testing, a type I error is the mistaken rejection of an actually true null hypothesis (also known as a "false positive" finding or conclusion; example: "an innocent person is convicted"), while a type II error is the failure to reject a null hypothesis that is actually false (also known as a "false negative" finding or conclusion; example: "a guilty person is not convicted"). Much of statistical theory revolves around the minimization of one or both of these errors, though the complete elimination of either is a statistical impossibility if the outcome is not determined by a known, observable causal process. By selecting a low threshold (cut-off) value and modifying the alpha (α) level, the quality of the hypothesis test can be increased
https://huggingface.co/datasets/fmars/wiki_stem
Vouch by Reference (VBR) is a protocol used in Internet mail systems for implementing sender certification by third-party entities. Independent certification providers vouch for the reputation of senders by verifying the domain name that is associated with transmitted electronic mail. VBR information can be used by a message transfer agent, a mail delivery agent or by an email client
https://huggingface.co/datasets/fmars/wiki_stem
Whoscall is a mobile application that offers caller identification services. It was developed by Gogolook Co. , Ltd
https://huggingface.co/datasets/fmars/wiki_stem
The Advanced Maryland Automatic Network Disk Archiver (Amanda) is an open source computer archiving tool that is able to back up data residing on multiple computers on a network. It uses a client–server model, where the server contacts each client to perform a backup at a scheduled time. : 125-147 Amanda was initially developed at the University of Maryland and is released under a BSD-style license
https://huggingface.co/datasets/fmars/wiki_stem
Arcserve is a provider of data protection, replication and recovery solutions for enterprise and mid-market businesses. Arcserve was founded in 1983 as Cheyenne Software. Software vendor CA Technologies, which was then known as Computer Associates, acquired Cheyenne in 1996 and continued to develop and market the Arcserve product under the same brand
https://huggingface.co/datasets/fmars/wiki_stem
In computing, CloudTran, a transaction management product, enables applications running in distributed computing and cloud computing architectures to embed logical business transactions that adhere to the properties of ACID transactions. Specifically, CloudTran coordinates ACID transactionality for data stored within in-memory data grids (e. g
https://huggingface.co/datasets/fmars/wiki_stem
CompanionLink is a contact and calendar synchronization software that syncs data across smartphone and tablet devices, computers, and web-based applications. The software is developed by Portland, OR-based CompanionLink Software, Inc. CompanionLink Software, Inc
https://huggingface.co/datasets/fmars/wiki_stem
Enterprise Storage OS, also known as ESOS, is a Linux distribution that serves as a block-level storage server in a storage area network (SAN). ESOS is composed of open-source software projects that are required for a Linux distribution and several proprietary build and install time options. The SCST project is the core component of ESOS; it provides the back-end storage functionality
https://huggingface.co/datasets/fmars/wiki_stem
File spanning is the ability to package a single file or data stream into separate files of a specified size. This task implies the ability to re-combine the package files back into the original file or data stream. This is useful when saving large files onto smaller volumes or breaking large files up into smaller files for network messages of limited size (email, newsgroups)
https://huggingface.co/datasets/fmars/wiki_stem
This is a list of file synchronization software for which there are Wikipedia articles. Free and open-source Freeware This is a comparison of the freeware (proprietary software release free of charge) file synchronization software. Commercial This is a comparison of commercial software in the field of file synchronization
https://huggingface.co/datasets/fmars/wiki_stem
Ghost (an acronym for general hardware-oriented system transfer) is a disk cloning and backup tool originally developed by Murray Haszard in 1995 for Binary Research. The technology was acquired in 1998 by Symantec. The backup and recovery functionality has been replaced by Symantec System Recovery (SSR), although the Ghost imaging technology is still actively developed and is available as part of Symantec Ghost Solution Suite
https://huggingface.co/datasets/fmars/wiki_stem
GNOME Storage was a project to replace the traditional file system with a new document store. Storage was part of a larger design for a new desktop environment that was still under development. The current implementation includes natural language access and network transparency
https://huggingface.co/datasets/fmars/wiki_stem
High Performance Storage System (HPSS) is a flexible, scalable, policy-based, software-defined Hierarchical Storage Management product developed by the HPSS Collaboration. It provides scalable hierarchical storage management (HSM), archive, and file system services using cluster, LAN and SAN technologies to aggregate the capacity and performance of many computers, disks, disk systems, tape drives, and tape libraries. Architecture HPSS supports a variety of methods for accessing and creating data
https://huggingface.co/datasets/fmars/wiki_stem
NetVault is a set of data protection software developed and supported by Quest Software. NetVault Backup is a backup and recovery software product. It can be used to protect data and software applications in physical and virtual environments from one central management interface
https://huggingface.co/datasets/fmars/wiki_stem
Novell Storage Manager is a system software package released by Novell in 2004 that uses identity, policy and directory events to automate full lifecycle management of file storage for individual users and organizational groups. By tying storage management to an organization's existing identity infrastructure, it has been pointed out, Novell Storage Manager enables the administration of users across all file servers "as a single pool rather than [in] separate independently managed domains. " Novell Storage Manager is a component of the Novell File Management Suite
https://huggingface.co/datasets/fmars/wiki_stem
Peer to Peer Remote Copy or PPRC is a protocol to replicate a storage volume to another control unit in a remote site. Synchronous PPRC causes each write to the primary volume to be performed to the secondary as well, and the I/O is only considered complete when update to both primary and secondary have completed. Asynchronous PPRC will flag tracks on the primary to be duplicated to the secondary when time permits
https://huggingface.co/datasets/fmars/wiki_stem