text
stringlengths
31
999
source
stringclasses
5 values
The Berkeley SETI Research Center (BSRC) conducts experiments searching for optical and electromagnetic transmissions from intelligent extraterrestrial civilizations. The center is based at the University of California, Berkeley. The Berkeley SETI Research Center has several SETI searches operating at various wavelengths, from radio, through infrared, to visible light
https://huggingface.co/datasets/fmars/wiki_stem
SETI@home ("SETI at home") is a project of the Berkeley SETI Research Center to analyze radio signals with the aim of searching for signs of extraterrestrial intelligence. Until March 2020, it was run as an Internet-based public volunteer computing project that employed the BOINC software platform. It is hosted by the Space Sciences Laboratory at the University of California, Berkeley, and is one of many activities undertaken as part of the worldwide SETI effort
https://huggingface.co/datasets/fmars/wiki_stem
The SETI Institute is a not-for-profit research organization incorporated in 1984 whose mission is to explore, understand, and explain the origin and nature of life in the universe, and to use this knowledge to inspire and guide present and future generations, sharing knowledge with the public, the press, and the government. SETI stands for the "search for extraterrestrial intelligence". The institute consists of three primary centers: The Carl Sagan Center, devoted to the study of life in the universe; the Center for Education, focused on astronomy, astrobiology and space science for students and educators; and the Center for Public Outreach, which produces "Big Picture Science", the institute's general science radio show and podcast, and "SETI Talks", its weekly colloquium series
https://huggingface.co/datasets/fmars/wiki_stem
SETIcon was a public convention organized by the SETI Institute and held twice in Santa Clara, California. It was an interdisciplinary conference, with talks focusing on a wide range of issues related to the search for extraterrestrial intelligence (SETI). The programs included panels with prominent scientists from NASA and SETI; talks by science fiction writers, artists, and actors; and panels to explore controversial issues and compare perspectives
https://huggingface.co/datasets/fmars/wiki_stem
setiQuest is an inactive project of the SETI Institute, whose declared aim is to "globalize the search for extra-terrestrial intelligence and empower a new generation of SETI enthusiasts", by creating means for a deeper involvement from the interested public. The project focuses on amplifying the human potential of SETI enthusiasts, and consists of four main fronts: Software, DSP Algorithms, Citizen Scientists, and Data release. Although there is no present activity on setiQuest per-se, much of the code and raw data products are still available on its successor site
https://huggingface.co/datasets/fmars/wiki_stem
SEVENDIP, which stands for Search for Extraterrestrial Visible Emissions from Nearby Developed Intelligent Populations, was a project developed by the Berkeley SETI Research Center at the University of California, Berkeley that used visible wavelengths to search for extraterrestrial life's intelligent signals from outer space. Between 1997 and 2007, SEVENDIP employed a 30-inch automated telescope located in Lafayette, California, to scan the sky for potential optical interstellar communications in the nanosecond time-scale laser pulses. Another instrument was mounted on Berkeley's 0
https://huggingface.co/datasets/fmars/wiki_stem
Tabby's Star (also known as Boyajian's Star and WTF Star, and designated KIC 8462852 in the Kepler Input Catalog) is an F-type main-sequence star in the constellation Cygnus approximately 1,470 light-years (450 parsecs) from Earth. A distant red dwarf companion has been reported, making Tabby's Star a binary stellar system. Unusual light fluctuations of Tabby's Star, including up to a 22% dimming in brightness, were discovered by citizen scientists as part of the Planet Hunters project
https://huggingface.co/datasets/fmars/wiki_stem
The Galileo Project is an international scientific research project to systematically search for extraterrestrial intelligence or extraterrestrial technology on and near Earth and to identify the nature of anomalous Unidentified Flying Objects/Unidentified Aerial Phenomena (UFOs/UAP). It was launched in 2021 by Harvard University astrophysicist, Avi Loeb, shortly after the ODNI UFO report (prepared by the U. S
https://huggingface.co/datasets/fmars/wiki_stem
The Voyager Golden Records are two identical phonograph records one of each which were included aboard the two Voyager spacecraft launched in 1977. The records contain sounds and images selected to portray the diversity of life and culture on Earth, and are intended for any intelligent extraterrestrial life form who may find them. The records are a time capsule
https://huggingface.co/datasets/fmars/wiki_stem
The waterhole, or water hole, is an especially quiet band of the electromagnetic spectrum between 1420 and 1662 megahertz, corresponding to wavelengths of 21 and 18 centimeters, respectively. It is a popular observing frequency used by radio telescopes in radio astronomy. The strongest hydroxyl radical spectral line radiates at 18 centimeters, and atomic hydrogen at 21 centimeters (the hydrogen line)
https://huggingface.co/datasets/fmars/wiki_stem
The zoo hypothesis speculates on the assumed behavior and existence of technologically advanced extraterrestrial life and the reasons they refrain from contacting Earth. It is one of many theoretical explanations for the Fermi paradox. The hypothesis states that alien life intentionally avoids communication with Earth to allow for natural evolution and sociocultural development, and avoiding interplanetary contamination, similar to people observing animals at a zoo
https://huggingface.co/datasets/fmars/wiki_stem
BIOPAN is a multi-user research program by the European Space Agency (ESA) designed to investigate the effect of the space environment on biological material. The experiments in BIOPAN are exposed to solar and cosmic radiation, the space vacuum and weightlessness, or a selection thereof. Optionally, the experiment temperature can be stabilized
https://huggingface.co/datasets/fmars/wiki_stem
NASA's Biosatellite program was a series of three uncrewed artificial satellites to assess the effects of spaceflight, especially radiation and weightlessness, on living organisms. Each was designed to reenter Earth's atmosphere and be recovered at the end of its mission. Its primary goal was to determine the effects of space environment, particularly weightlessness, on life processes at three levels of organization: basic biochemistry of the cell; structure of growth of cells and tissues; and growth and form of entire plants and animals
https://huggingface.co/datasets/fmars/wiki_stem
Curiosity is a car-sized Mars rover exploring Gale crater and Mount Sharp on Mars as part of NASA's Mars Science Laboratory (MSL) mission. Curiosity was launched from Cape Canaveral (CCAFS) on November 26, 2011, at 15:02:00 UTC and landed on Aeolis Palus inside Gale crater on Mars on August 6, 2012, 05:17:57 UTC. The Bradbury Landing site was less than 2
https://huggingface.co/datasets/fmars/wiki_stem
Dragonfly is a planned spacecraft and NASA mission, which will send a robotic rotorcraft to the surface of Titan, the largest moon of Saturn. It would be the first aircraft on Titan and is intended to make the first powered and fully controlled atmospheric flight on any moon, with the intention of studying prebiotic chemistry and extraterrestrial habitability. It will then use its vertical takeoffs and landings (VTOL) capability to move between exploration sites
https://huggingface.co/datasets/fmars/wiki_stem
Exobiology Radiation Assembly (ERA) was an experiment that investigated the biological effects of space radiation. An astrobiology mission developed by the European Space Agency (ESA), it took place aboard the European Retrievable Carrier (EURECA), an unmanned 4. 5 tonne satellite with a payload of 15 experiments
https://huggingface.co/datasets/fmars/wiki_stem
ExoMars (Exobiology on Mars) is an astrobiology programme of the European Space Agency (ESA). The goals of ExoMars are to search for signs of past life on Mars, investigate how the Martian water and geochemical environment varies, investigate atmospheric trace gases and their sources and, by doing so, demonstrate the technologies for a future Mars sample-return mission. The first part of the programme is a mission launched in 2016 that placed the Trace Gas Orbiter into Mars orbit and released the Schiaparelli EDM lander
https://huggingface.co/datasets/fmars/wiki_stem
EXPOSE is a multi-user facility mounted outside the International Space Station (ISS) dedicated to astrobiology. EXPOSE was developed by the European Space Agency (ESA) for long-term spaceflights and was designed to allow exposure of chemical and biological samples to outer space while recording data during exposure. The results will contribute to our understanding of photobiological processes in simulated radiation climates of planets (e
https://huggingface.co/datasets/fmars/wiki_stem
AntiVermins is a rogue security program dating from about 2007 that claims to be a commercial spyware-removal utility, when in fact it is, itself, adware-advertised. The software installs itself, without consent, in the user's computer and registry. It then sends messages such as "system error, buy this software to fix" or "your system is infected with spyware, buy AntiVermins to clean it", redirecting the user to the software's homepage where he or she is prompted to buy it for about $50
https://huggingface.co/datasets/fmars/wiki_stem
AntiVirus Gold is rogue software developed by ICommerce Solutions S. A. that poses as a legitimate antivirus program
https://huggingface.co/datasets/fmars/wiki_stem
Bargain Buddy is an Adware program developed by Exact Advertising. Bargain Buddy software monitors Internet usage and displays advertisements based on the websites a user views. The software may also display ads for Exact Advertising programs such as FunGameDownloads and PhotoGizmo
https://huggingface.co/datasets/fmars/wiki_stem
ByteDefender also known as ByteDefender Security 2010 is a scareware rogue malware application on Windows that masquerades as a legitimate antivirus program. It uses a false system scanner that produces large deposits of malware and it attempts to scare the users to purchase the full version of the rogue software for the removal of nonexistent and/or unnecessary spyware items. The name of this antispyware program is used to confuse the user looking for the legitimate Bitdefender before downloading the software
https://huggingface.co/datasets/fmars/wiki_stem
ContraVirus is a rogue spyware application that poses as a legitimate anti-spyware program. The application uses a false scanner to force computer users to pay for the removal of non-existent spyware items. It may also be known as ExpertAntivirus
https://huggingface.co/datasets/fmars/wiki_stem
SpySheriff is malware that disguises itself as anti-spyware software. It attempts to mislead the user with false security alerts, threatening them into buying the program. Like other rogue antiviruses, after producing a list of false threats, it prompts the user to pay to remove them
https://huggingface.co/datasets/fmars/wiki_stem
Spyware (a portmanteau for spying software) is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user by violating their privacy, endangering their device's security, or other means. This behaviour may be present in malware and in legitimate software. Websites may engage in spyware behaviours like web tracking
https://huggingface.co/datasets/fmars/wiki_stem
Ultimate Defender is a rogue antivirus program published by Nous-Tech Solutions Ltd. The program is considered malware due to its difficult uninstallation and deceptive operation. It is commonly installed by the Vundo trojan
https://huggingface.co/datasets/fmars/wiki_stem
VirusHeat is malware that disguises itself as a legitimate anti-virus program. VirusHeat tricks users into buying the full version of the program through repeated false alerts and popups, purporting to alert the user that there is a system error or they are infected, and must buy the full version to remove. It was launched on February 8, 2008
https://huggingface.co/datasets/fmars/wiki_stem
VirusProtectPro is a rogue malware program that claims to be a commercial anti-spyware, when in fact it is, itself, adware-advertised. The software installs itself, without consent, on the user's computers and registry. It then sends messages such as "System Error, Buy this software to fix" or "Your System is infected with spyware, buy VirusProtectPro to clean it", redirecting the user to VirusProtectPro's homepage where they are prompted to buy the VirusProtectPro software
https://huggingface.co/datasets/fmars/wiki_stem
Volcano Security Suite is a piece of harmful security software that disguises itself as an antispyware program. It issues a false messages and alerts, and false system scan results on the computer to scare people to pay for the full version of the rogue software. It is a part of FakeVimes family
https://huggingface.co/datasets/fmars/wiki_stem
A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software. The term rootkit is a compound of "root" (the traditional name of the privileged account on Unix-like operating systems) and the word "kit" (which refers to the software components that implement the tool). The term "rootkit" has negative connotations through its association with malware
https://huggingface.co/datasets/fmars/wiki_stem
A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device (e. g. a home router), or its embodiment (e
https://huggingface.co/datasets/fmars/wiki_stem
Festi is a rootkit and a botnet also known by its alias of Spamnost, and is mostly involved in email spam and denial of service attacks. It works under operating systems of the Windows family. Autumn of 2009 was the first time Festi came into the view of the companies engaged in the development and sale of antivirus software
https://huggingface.co/datasets/fmars/wiki_stem
Hupigon (also Graftor) detected as (Backdoor. Win32. Hupigon, Trojan
https://huggingface.co/datasets/fmars/wiki_stem
Mebroot is a master boot record based rootkit used by botnets including Torpig. It is a sophisticated Trojan horse that uses stealth techniques to hide itself from the user. The Trojan opens a back door on the victim's computer which allows the attacker complete control over the computer
https://huggingface.co/datasets/fmars/wiki_stem
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System is a book written by Bill Blunden, published by Jones & Bartlett Publishers in May 2009. The book takes the reader in depth about rootkit technology and uses. It covers topics such as IA-32 assembly, the Windows system architecture, kernel debugging, advanced rootkit development, and much more concerning rootkit technology and how it can be applied onto e
https://huggingface.co/datasets/fmars/wiki_stem
Scareware is a form of malware which uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users into buying unwanted software. Scareware is part of a class of malicious software that includes rogue security software, ransomware and other scam software that tricks users into believing their computer is infected with a virus, then suggests that they download and pay for fake antivirus software to remove it. Usually the virus is fictional and the software is non-functional or malware itself
https://huggingface.co/datasets/fmars/wiki_stem
Rogue security software is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and aims to convince them to pay for a fake malware removal tool that actually installs malware on their computer. It is a form of scareware that manipulates users through fear, and a form of ransomware. Rogue security software has been a serious security threat in desktop computing since 2008
https://huggingface.co/datasets/fmars/wiki_stem
Tapsnake is a scareware scam involving coercion to buy protection from a non-existent computer virus that has been distributed in various ways. It was offered as a game, malware/spyware included transmitting sundry information, particularly GPS location information to unauthorized third parties. The name Tapsnake comes from the computer game Snaker, which has been revised such that the 'snake' responds to touchscreen taps by the user
https://huggingface.co/datasets/fmars/wiki_stem
The Anti-Spyware Coalition (ASC) was a group formed in 2005 with the goal to build a consensus about definitions and best practices in the debate surrounding spyware. Composed of anti-spyware software companies, academics, and consumer groups, the ASC seeks to bring together a diverse array of perspective on the problem of controlling spyware and other potentially unwanted technologies. History Formed in 2005 after the dissolution of the Consortium of Anti-Spyware Technology Vendors (COAST) which broke up over internal dissent
https://huggingface.co/datasets/fmars/wiki_stem
A click path or clickstream is the sequence of hyperlinks one or more website visitors follows on a given site, presented in the order viewed. A visitor's click path may start within the website or at a separate third party website, often a search engine results page, and it continues as a sequence of successive webpages visited by the user. Click paths take call data and can match it to ad sources, keywords, and/or referring domains, in order to capture data
https://huggingface.co/datasets/fmars/wiki_stem
Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic warfare. There is significant debate among experts regarding the definition of cyberwarfare, and even if such a thing exists
https://huggingface.co/datasets/fmars/wiki_stem
Cydoor is a spyware and adware first detected in 2003. Cydoor software The Cydoor software downloads advertisements from the Cydoor servers, to be displayed in the Cydoor-supported software. It is built as a program integrated into the parent application but is not uninstalled along with it
https://huggingface.co/datasets/fmars/wiki_stem
Dark Caracal is a spyware campaign that has been conducted by an unknown group of hackers since at least 2012. The campaign was discovered by the Electronic Frontier Foundation and the mobile security firm Lookout, who published their findings on January 18, 2018. The campaign has mainly used phishing attacks (and in some cases physical access to victims systems) in order to install malicious Android applications, including ones that imitate the look and feel of popular instant messaging applications, on victims systems to gain full control over the devices
https://huggingface.co/datasets/fmars/wiki_stem
Trojan. Emcodec. E is a trojan horse that is mis-represented as an audio and video codec for Windows-based PCs
https://huggingface.co/datasets/fmars/wiki_stem
An evil maid attack is an attack on an unattended device, in which an attacker with physical access alters it in some undetectable way so that they can later access the device, or the data on it. The name refers to the scenario where a maid could subvert a device left unattended in a hotel room – but the concept itself also applies to situations such as a device being intercepted while in transit, or taken away temporarily by airport or law enforcement personnel. Overview Origin In a 2009 blog post, security analyst Joanna Rutkowska coined the term "Evil Maid Attack" due to hotel rooms being a common place where devices are left unattended
https://huggingface.co/datasets/fmars/wiki_stem
The Seventh Edition Unix terminal interface is the generalized abstraction, comprising both an application programming interface for programs and a set of behavioural expectations for users, of a terminal as historically available in Seventh Edition Unix. It has been largely superseded by the POSIX terminal interface. Concepts and overview The terminal interface provided by Seventh Edition Unix and UNIX/32V, and also presented by BSD version 4 as the old terminal driver, was a simple one, largely geared towards teletypewriters as terminals
https://huggingface.co/datasets/fmars/wiki_stem
The Silent 700, introduced in 1971, was a line of portable computer terminals manufactured by Texas Instruments in the 1970s and 1980s. Silent 700s printed with a 5 x 7 dot-matrix heating element onto a roll of heat-sensitive paper. Some models were equipped with an integrated acoustic coupler and modem that could receive data at 30 characters per second
https://huggingface.co/datasets/fmars/wiki_stem
The Tektronix 4010 series was a family of text-and-graphics computer terminals based on storage-tube technology created by Tektronix. Several members of the family were introduced during the 1970s, the best known being the 11-inch 4010 and 19-inch 4014, along with the less popular 25-inch 4016. They were widely used in the computer-aided design market in the 1970s and early 1980s
https://huggingface.co/datasets/fmars/wiki_stem
A terminal mode is one of a set of possible states of a terminal or pseudo terminal character device in Unix-like systems and determines how characters written to the terminal are interpreted. In cooked mode data is preprocessed before being given to a program, while raw mode passes the data as-is to the program without interpreting any of the special characters. The system intercepts special characters in cooked mode and interprets special meaning from them
https://huggingface.co/datasets/fmars/wiki_stem
A virtual console (VC) – also known as a virtual terminal (VT) – is a conceptual combination of the keyboard and display for a computer user interface. It is a feature of some Unix-like operating systems such as Linux, BSD, illumos, UnixWare, and macOS in which the system console of the computer can be used to switch between multiple virtual consoles to access unrelated user interfaces. Virtual consoles date back at least to Xenix and Concurrent CP/M in the 1980s
https://huggingface.co/datasets/fmars/wiki_stem
In open systems, a virtual terminal (VT) is an application service that: Allows host terminals on a multi-user network to interact with other hosts regardless of terminal type and characteristics, Allows remote log-on by local area network managers for the purpose of management, Allows users to access information from another host processor for transaction processing, Serves as a backup facility. PuTTY is an example of a virtual terminal. ITU-T defines a virtual terminal protocol based on the OSI application layer protocols
https://huggingface.co/datasets/fmars/wiki_stem
The VT100 is a video terminal, introduced in August 1978 by Digital Equipment Corporation (DEC). It was one of the first terminals to support ANSI escape codes for cursor control and other tasks, and added a number of extended codes for special features like controlling the status lights on the keyboard. This led to rapid uptake of the ANSI standard, which became the de facto standard for hardware video terminals and later terminal emulators
https://huggingface.co/datasets/fmars/wiki_stem
The VT320 is an ANSI standard computer terminal introduced by Digital Equipment Corporation (DEC) in 1987. The VT320 is the text-only version, while the VT330 adds monochrome ReGIS, Sixel and Tektronix 4010 graphics, and the VT340 adds color. The 300 series replaced the earlier VT200 series, as a lower-cost system better able to compete with a number of VT220 clones that had entered the market
https://huggingface.co/datasets/fmars/wiki_stem
The VT1000 was a monochrome X Window System computer terminal introduced by Digital Equipment Corporation (DEC) in April 1990. The VT1200 replaced the VT1000 later that year, consisting of a code update and a bump in the RAM from 1 to 2 MB. All of the VT1000 series communicated with their host computers over Ethernet, supporting TCP/IP as well as DEC's terminal-oriented Local Area Transport (LAT) protocol
https://huggingface.co/datasets/fmars/wiki_stem
Active-state power management (ASPM) is a power management mechanism for PCI Express devices to garner power savings while otherwise in a fully active state. Predominantly, this is achieved through active-state link power management; i. e
https://huggingface.co/datasets/fmars/wiki_stem
Aggressive Link Power Management (ALPM) is a power management protocol for Advanced Host Controller Interface-compliant (AHCI) Serial ATA (SATA) devices, such as hard disk drives and solid-state drives. Description When enabled via the AHCI controller, this allows the SATA host bus adapter to enter a low-power state during periods of inactivity, thus saving energy. The drawback to this is increased periodic latency as the drive must be re-activated and brought back on-line before it can be used, and this will often appear as a delay to the end-user
https://huggingface.co/datasets/fmars/wiki_stem
Dynamic frequency scaling (also known as CPU throttling) is a power management technique in computer architecture whereby the frequency of a microprocessor can be automatically adjusted "on the fly" depending on the actual needs, to conserve power and reduce the amount of heat generated by the chip. Dynamic frequency scaling helps preserve battery on mobile devices and decrease cooling cost and noise on quiet computing settings, or can be useful as a security measure for overheated systems (e. g
https://huggingface.co/datasets/fmars/wiki_stem
In computer architecture, dynamic voltage scaling is a power management technique in which the voltage used in a component is increased or decreased, depending upon circumstances. Dynamic voltage scaling to increase voltage is known as overvolting; dynamic voltage scaling to decrease voltage is known as undervolting. Undervolting is done in order to conserve power, particularly in laptops and other mobile devices, where energy comes from a battery and thus is limited, or in rare cases, to increase reliability
https://huggingface.co/datasets/fmars/wiki_stem
In electronics and particularly computing, a jumper is a short length of conductor used to close, open or bypass part of an electronic circuit. They are typically used to set up or configure printed circuit boards, such as the motherboards of computers. The process of setting a jumper is often called strapping
https://huggingface.co/datasets/fmars/wiki_stem
VIA LongHaul is a CPU speed throttling and power saving technology developed by VIA Technologies. By executing specialized instructions, software can exercise fine control on the bus-to-core frequency ratio and CPU core voltage. When the system first boots, the ratio and voltage are set to hardware defaults
https://huggingface.co/datasets/fmars/wiki_stem
A memory divider is a ratio which is used to determine the operating clock frequency of computer memory in accordance with front side bus (FSB) frequency, if the memory system is dependent on FSB clock speed. Along with memory latency timings, memory dividers are extensively used in overclocking memory subsystems to find stable, working memory states at higher FSB frequencies. The ratio between DRAM and FSB is commonly referred to as "DRAM:FSB ratio"
https://huggingface.co/datasets/fmars/wiki_stem
Modding is a slang expression derived from the English verb "to modify". The term refers to modification of hardware, software, or anything else, to perform a function not originally intended by the designer, or to achieve bespoke specification or appearance. The term is often used in relation to video games, particularly in regard to creating new or altered content and sharing that via the web
https://huggingface.co/datasets/fmars/wiki_stem
In computing, overclocking is the practice of increasing the clock rate of a computer to exceed that certified by the manufacturer. Commonly, operating voltage is also increased to maintain a component's operational stability at accelerated speeds. Semiconductor devices operated at higher frequencies and voltages increase power consumption and heat
https://huggingface.co/datasets/fmars/wiki_stem
Power management is a feature of some electrical appliances, especially copiers, computers, computer CPUs, computer GPUs and computer peripherals such as monitors and printers, that turns off the power or switches the system to a low-power state when inactive. In computing this is known as PC power management and is built around a standard called ACPI, this supersedes APM. All recent computers have ACPI support
https://huggingface.co/datasets/fmars/wiki_stem
To quiesce is to pause or alter a device or application to achieve a consistent state, usually in preparation for a backup or other maintenance. Description In software applications that modify information stored on disk, this generally involves flushing any outstanding writes; see buffering. With telecom applications, this generally involves allowing existing callers to finish their call but preventing new calls from initiating
https://huggingface.co/datasets/fmars/wiki_stem
SCSI Enclosure Services (SES) is a protocol for more modern SCSI enclosure products. An initiator can communicate with the enclosure using a specialized set of SCSI commands to access power, cooling, and other non-data characteristics. SES devices There are two major classes of SES devices: Attached enclosure services devices allow SES communication through a logical unit within one SCSI disk drive located in the enclosure
https://huggingface.co/datasets/fmars/wiki_stem
Tweaking refers to fine-tuning or adjusting a complex system, usually an electronic device. Tweaks are any small modifications intended to improve a system. In electronics, it is a synonym for "trimming
https://huggingface.co/datasets/fmars/wiki_stem
Underclocking, also known as downclocking, is modifying a computer or electronic circuit's timing settings to run at a lower clock rate than is specified. Underclocking is used to reduce a computer's power consumption, increase battery life, reduce heat emission, and it may also increase the system's stability, lifespan/reliability and compatibility. Underclocking may be implemented by the factory, but many computers and components may be underclocked by the end user
https://huggingface.co/datasets/fmars/wiki_stem
Hardware virtualization is the virtualization of computers as complete hardware platforms, certain logical abstractions of their componentry, or only the functionality required to run various operating systems. Virtualization hides the physical characteristics of a computing platform from the users, presenting instead an abstract computing platform. At its origins, the software that controlled virtualization was called a "control program", but the terms "hypervisor" or "virtual machine monitor" became preferred over time
https://huggingface.co/datasets/fmars/wiki_stem
A computer appliance is a computer system with a combination of hardware, software, or firmware that is specifically designed to provide a particular computing resource. Such devices became known as appliances because of the similarity in role or management to a home appliance, which are generally closed and sealed, and are not serviceable by the user or owner. The hardware and software are delivered as an integrated product and may even be pre-configured before delivery to a customer, to provide a turn-key solution for a particular application
https://huggingface.co/datasets/fmars/wiki_stem
Cross-platform virtualization is a form of computer virtualization that allows software compiled for a specific instruction set and operating system to run unmodified on computers with different CPUs and/or operating systems, through a combination of dynamic binary translation and operating system call mapping. Since the software runs on a virtualized equivalent of the original computer, it does not require recompilation or porting, thus saving time and development resources. However, the processing overhead of binary translation and call mapping imposes a performance penalty, when compared to natively-compiled software
https://huggingface.co/datasets/fmars/wiki_stem
GPU virtualization refers to technologies that allow the use of a GPU to accelerate graphics or GPGPU applications running on a virtual machine. GPU virtualization is used in various applications such as desktop virtualization, cloud gaming and computational science (e. g
https://huggingface.co/datasets/fmars/wiki_stem
libvirt is an open-source API, daemon and management tool for managing platform virtualization. It can be used to manage KVM, Xen, VMware ESXi, QEMU and other virtualization technologies. These APIs are widely used in the orchestration layer of hypervisors in the development of a cloud-based solution
https://huggingface.co/datasets/fmars/wiki_stem
Media Descriptor File (MDF) is a proprietary disc image file format developed for Alcohol 120%, an optical disc authoring program. Daemon Tools, CDemu, MagicISO, PowerDVD, and WinCDEmu can also read the MDF format. A disc image is a computer file replica of the computer files and file system of an optical disc
https://huggingface.co/datasets/fmars/wiki_stem
Memory overcommitment is a concept in computing that covers the assignment of more memory to virtual computing devices (or processes) than the physical machine they are hosted, or running on, actually has. This is possible because virtual machines (or processes) do not necessarily use as much memory at any one point as they are assigned, creating a buffer. If four virtual machines each have 1 GB of memory on a physical machine with 4 GB of memory, but those virtual machines are only using 500 MB, it is possible to create additional virtual machines that take advantage of the 500 MB each existing machine is leaving free
https://huggingface.co/datasets/fmars/wiki_stem
In computer science, memory virtualization decouples volatile random access memory (RAM) resources from individual systems in the data centre, and then aggregates those resources into a virtualized memory pool available to any computer in the cluster. The memory pool is accessed by the operating system or applications running on top of the operating system. The distributed memory pool can then be utilized as a high-speed cache, a messaging layer, or a large, shared memory resource for a CPU or a GPU application
https://huggingface.co/datasets/fmars/wiki_stem
In computing, thin provisioning involves using virtualization technology to give the appearance of having more physical resources than are actually available. If a system always has enough resource to simultaneously support all of the virtualized resources, then it is not thin provisioned. The term thin provisioning is applied to disk layer in this article, but could refer to an allocation scheme for any resource
https://huggingface.co/datasets/fmars/wiki_stem
Virtual disk and virtual drive are software components that emulate an actual disk storage device. Virtual disks and virtual drives are common components of virtual machines in hardware virtualization, but they are also widely used for various purposes unrelated to virtualization, such as for the creation of logical disks. Operation A virtual drive is a software component that emulates an actual disk drive, such as an optical disc drive, a floppy disk drive, or a hard disk drive
https://huggingface.co/datasets/fmars/wiki_stem
The 3Com 3Server was a headless dedicated network-attached storage machine designed to run 3Com local area network (LAN) server software, 3+Share. Background The companion product was the diskless 3Station network workstation, a dedicated client machine. However, 3Servers could also network with standard PC-compatibles and were commonly used in this role
https://huggingface.co/datasets/fmars/wiki_stem
The 7AK7 is a pentode vacuum tube (thermionic valve). According to its manufacturer, Sylvania, it was "designed for service in electronic computers". The tube was developed in 1948, designed at the request of L
https://huggingface.co/datasets/fmars/wiki_stem
In computer architecture, 12-bit integers, memory addresses, or other data units are those that are 12 bits (1. 5 octets) wide. Also, 12-bit central processing unit (CPU) and arithmetic logic unit (ALU) architectures are those that are based on registers, address buses, or data buses of that size
https://huggingface.co/datasets/fmars/wiki_stem
In computer hardware, active hard-drive protection refers to technology that attempts to avoid or reduce mechanical damage to hard disk drives by preparing the disk prior to impact. This approach is mainly used in laptop computers that are frequently carried around and more prone to impacts than desktop computers. Implementation Usually the system consists of accelerometers that alert the system when excess acceleration or vibration is detected
https://huggingface.co/datasets/fmars/wiki_stem
In digital electronics, an address decoder is a binary decoder that has two or more inputs for address bits and one or more outputs for device selection signals. When the address for a particular device appears on the address inputs, the decoder asserts the selection output for that device. A dedicated, single-output address decoder may be incorporated into each device on an address bus, or a single address decoder may serve multiple devices
https://huggingface.co/datasets/fmars/wiki_stem
The Aitken is a future petascale supercomputer installed at the Ames Research Center facility, manufactured by Hewlett Packard Enterprise. It consist of 1,150 HPE SGI 8600 nodes, with an estimated performance of 3. 69 petaflops
https://huggingface.co/datasets/fmars/wiki_stem
The Enhanced Chip Set (ECS) is the second generation of the Amiga computer's chipset, offering minor improvements over the original chipset (OCS) design. ECS was introduced in 1990 with the launch of the Amiga 3000. Amigas produced from 1990 onwards featured a mix of OCS and ECS chips, such as later versions of the Amiga 500 and the Commodore CDTV
https://huggingface.co/datasets/fmars/wiki_stem
In computing, an aperture is a portion of physical address space (i. e. physical memory) that is associated with a particular peripheral device or a memory unit
https://huggingface.co/datasets/fmars/wiki_stem
Appendix H is the name of an infamous appendix in Pentium Processor Family Developer's Manual, Volume 3. This appendix contained reference to documentation only available under a legally binding NDA. This NDAed documentation described various new features introduced in the Pentium processor, notably Virtual Mode Extensions (VME) and 4 MB paging
https://huggingface.co/datasets/fmars/wiki_stem
Artificial Minds: An Exploration of the Mechanisms of Mind is a book written by Stan Franklin and published in 1995 by MIT Press. The book is a wide-ranging tour of the development of artificial intelligence as of the time it was written. As well as discussing the theoretical and philosophical backgrounds of many approaches, it goes into some detail in explaining the workings of many of what the author considers to be the most promising examples of the era
https://huggingface.co/datasets/fmars/wiki_stem
Artificial Reality is a book series by Myron W. Krueger about interactive immersive environments (or virtual realities), based on video recognition techniques, that put a user in full, unencumbered contact with the digital world. He started this work in the late 1960s and is considered to be a key figure in the early innovation of virtual reality
https://huggingface.co/datasets/fmars/wiki_stem
Calendrical Calculations is a book on calendar systems and algorithms for computers to convert between them. It was written by computer scientists Nachum Dershowitz and Edward Reingold and published in 1997 by the Cambridge University Press. A second "millennium" edition with a CD-ROM of software was published in 2001, a third edition in 2008, and a fourth "ultimate" edition in 2018
https://huggingface.co/datasets/fmars/wiki_stem
Computer Graphics: Principles and Practice is a textbook written by James D. Foley, Andries van Dam, Steven K. Feiner, John Hughes, Morgan McGuire, David F
https://huggingface.co/datasets/fmars/wiki_stem
Computers and Intractability: A Guide to the Theory of NP-Completeness is a textbook by Michael Garey and David S. Johnson. It was the first book exclusively on the theory of NP-completeness and computational intractability
https://huggingface.co/datasets/fmars/wiki_stem
Concrete Mathematics: A Foundation for Computer Science, by Ronald Graham, Donald Knuth, and Oren Patashnik, first published in 1989, is a textbook that is widely used in computer-science departments as a substantive but light-hearted treatment of the analysis of algorithms. Contents and history The book provides mathematical knowledge and skills for computer science, especially for the analysis of algorithms. According to the preface, the topics in Concrete Mathematics are "a blend of CONtinuous and disCRETE mathematics"
https://huggingface.co/datasets/fmars/wiki_stem
The first edition of the textbook Data Science and Predictive Analytics: Biomedical and Health Applications using R, authored by Ivo D. Dinov, was published in August 2018 by Springer. The second edition of the book was printed in 2023
https://huggingface.co/datasets/fmars/wiki_stem
Essentials of Programming Languages (EOPL) is a textbook on programming languages by Daniel P. Friedman, Mitchell Wand, and Christopher T. Haynes
https://huggingface.co/datasets/fmars/wiki_stem
The Hacker Ethic and the Spirit of the Information Age is a book released in 2001, and written by Pekka Himanen, with prologue written by Linus Torvalds and the epilogue written by Manuel Castells. Pekka Himanen is a philosopher. Manuel Castells is an internationally well-known sociologist
https://huggingface.co/datasets/fmars/wiki_stem
Hacker's Delight is a software algorithm book by Henry S. Warren, Jr. first published in 2002
https://huggingface.co/datasets/fmars/wiki_stem
How Data Happened: A History from the Age of Reason to the Age of Algorithms is a 2023 non-fiction book written by Columbia University professors Chris Wiggins and Matthew L. Jones. The book explores the history of data and statistics from the end of the 18th century to the present day
https://huggingface.co/datasets/fmars/wiki_stem
How to Design Programs (HtDP) is a textbook by Matthias Felleisen, Robert Bruce Findler, Matthew Flatt, and Shriram Krishnamurthi on the systematic design of computer programs. MIT Press published the first edition in 2001, and the second edition in 2018, which is freely available online and in print. The book introduces the concept of a design recipe, a six-step process for creating programs from a problem statement
https://huggingface.co/datasets/fmars/wiki_stem
Introduction to Algorithms is a book on computer programming by Thomas H. Cormen, Charles E. Leiserson, Ronald L
https://huggingface.co/datasets/fmars/wiki_stem